{"id":38904,"date":"2020-12-21T17:18:33","date_gmt":"2020-12-21T17:18:33","guid":{"rendered":"http:\/\/1b187661-5757-4084-afef-ed8becc66f29"},"modified":"2020-12-21T17:18:33","modified_gmt":"2020-12-21T17:18:33","slug":"security-vendors-its-time-to-come-clean-about-intrusions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/","title":{"rendered":"Security vendors: It\u2019s time to come clean about intrusions"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2020\/12\/16\/dc42246f-3837-4adc-a3e5-42589943ca8a\/thumbnail\/770x578\/b05abf3285126a09518492e0ea524ee2\/solarwinds-hq.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The intrusion into SolarWinds, FireEye, and multiple US Government agencies continues to roil the cybersecurity world. In the past week, a slew of additional details have emerged about the scope of the intrusions with more surely to come.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">SolarWinds Coverage<\/span> <\/h3>\n<\/p><\/div>\n<p>Security vendors spend all their time talking about security, but not in a way that&#8217;s useful right now. As we wrote in our prior blog, no vendor should turn what happened to these companies into a marketing opportunity. Let us repeat for emphasis: no vendor should turn what happened to these companies into a marketing opportunity. Other security vendors should also understand that this is not a time to throw stones at FireEye &#8212; a breach like this could happen to any vendor.&nbsp;<\/p>\n<p>But security vendors do need to have a conversation with customers. Security leaders need answers.&nbsp;<\/p>\n<p>Security vendors are notoriously close mouthed about attempted intrusions against them as a vendor. Despite a series of intrusions on vendors &#8212;&nbsp;<a href=\"https:\/\/www.wired.com\/2011\/08\/how-rsa-got-hacked\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">RSA and Lockheed Martin<\/a>,&nbsp;<a href=\"https:\/\/fortune.com\/2017\/06\/27\/petya-ransomware-ukraine-medoc\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">MeDoc<\/a>,&nbsp;<a href=\"https:\/\/krebsonsecurity.com\/2020\/12\/u-s-treasury-commerce-depts-hacked-through-solarwinds-compromise\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">SolarWinds<\/a>, and&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3600893\/fireeye-breach-explained-how-worried-should-you-be.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FireEye<\/a>&nbsp;&#8212; it is virtually impossible to get a vendor to talk about what they deal with. And as the prior examples demonstrate that vendor intrusions are often a mechanism into their customers as well. Here&#8217;s why this matters now:&nbsp;<\/p>\n<p><strong>If the threat actors went after FireEye &#8212; what other security vendors did they go after?&nbsp;<\/strong><\/p>\n<p><strong>Does anyone doubt that other security vendors were on the list of potential targets?&nbsp;<\/strong><\/p>\n<p>End users should ask the following of their security vendors:&nbsp;<\/p>\n<ul readability=\"4\">\n<li readability=\"0\">\n<p>Does the vendor use SolarWinds? If so, what specific products are in use?&nbsp;<\/p>\n<\/li>\n<li readability=\"4\">\n<p>Does the vendor have any (3rd parties) suppliers, partners, contractors, or outsourcers that use SolarWinds? If so, what specific products and versions are in use?&nbsp;<\/p>\n<\/li>\n<li readability=\"1\">\n<p>If the vendor does use SolarWinds, did they detect any evidence of this activity? If they don&#8217;t use SolarWinds have they checked to be thorough?&nbsp;<\/p>\n<\/li>\n<\/ul>\n<ul readability=\"-0.5\">\n<li readability=\"2\">\n<p>For companies that aren&#8217;t using SolarWinds &#8212; how would those vendors thwart a similar intrusion? Does the vendor have plans to do a red team, purple team, or tabletop exercise to figure that out?&nbsp;<\/p>\n<\/li>\n<\/ul>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Some other interesting security vendor questions:&nbsp;<\/p>\n<ul readability=\"3\">\n<li readability=\"3\">\n<p>&nbsp;The intrusions began in March &#8212; if someone reverses signatures, IOCs, and other detection rules, <strong>are they going to discover any that were created by a security vendor prior to this being public?&nbsp;<\/strong><\/p>\n<\/li>\n<li readability=\"0\">\n<p>If the vendor did see this &#8212; what is their notification process like for SolarWinds? What is their process for notification in situations like this for their vendors?&nbsp;<\/p>\n<\/li>\n<li readability=\"0\">\n<p>What are the most successful intrusions against them they have experienced? What did they do as a result? What changes were made?&nbsp;<\/p>\n<\/li>\n<\/ul>\n<p>This is an opportunity for vendors to offer transparency &#8212; and demonstrate empathy &#8212; by sharing that what happens to them, also happens to their customers, their competitors, and their peers. FireEye has largely received community praise for the openness and transparency exhibited when announcing its breach. Sharing lessons learned, anti-patterns, and changes made as a result will help everyone get better.&nbsp;<\/p>\n<p>Other vendors should learn this lesson and recognize that this is a community.&nbsp;<\/p>\n<p>To understand the business and technology trends critical to 2021, download Forrester&#8217;s complimentary 2021\u202fPredictions Guide\u202f<a href=\"https:\/\/go.forrester.com\/predictions-2021\/?utm_source=zdnet&amp;utm_medium=pr&amp;utm_campaign=predictions_2021\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>. &nbsp; &nbsp; &nbsp;<\/p>\n<p><em>This post was written by VP, Principal Analyst Jeff Pollard and Principal Analyst Sandy Carielli, and it originally appeared&nbsp;<a href=\"https:\/\/go.forrester.com\/blogs\/security-vendors-its-time-to-come-clean-about-intrusions\/?utm_source=zdnet&amp;utm_medium=pr&amp;utm_campaign=cio20\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>.&nbsp;<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/security-vendors-its-time-to-come-clean-about-intrusions\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No vendor should turn what happened in the intrusion into SolarWinds, FireEye, and multiple US Government agencies into a marketing opportunity.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38905,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-38904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security vendors: It\u2019s time to come clean about intrusions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security vendors: It\u2019s time to come clean about intrusions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T17:18:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendors-its-time-to-come-clean-about-intrusions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Security vendors: It\u2019s time to come clean about intrusions\",\"datePublished\":\"2020-12-21T17:18:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendors-its-time-to-come-clean-about-intrusions.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/\",\"name\":\"Security vendors: It\u2019s time to come clean about intrusions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendors-its-time-to-come-clean-about-intrusions.jpg\",\"datePublished\":\"2020-12-21T17:18:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendors-its-time-to-come-clean-about-intrusions.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendors-its-time-to-come-clean-about-intrusions.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendors-its-time-to-come-clean-about-intrusions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security vendors: It\u2019s time to come clean about intrusions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security vendors: It\u2019s time to come clean about intrusions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/","og_locale":"en_US","og_type":"article","og_title":"Security vendors: It\u2019s time to come clean about intrusions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-21T17:18:33+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendors-its-time-to-come-clean-about-intrusions.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Security vendors: It\u2019s time to come clean about intrusions","datePublished":"2020-12-21T17:18:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/"},"wordCount":589,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendors-its-time-to-come-clean-about-intrusions.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/","url":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/","name":"Security vendors: It\u2019s time to come clean about intrusions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendors-its-time-to-come-clean-about-intrusions.jpg","datePublished":"2020-12-21T17:18:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendors-its-time-to-come-clean-about-intrusions.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendors-its-time-to-come-clean-about-intrusions.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/security-vendors-its-time-to-come-clean-about-intrusions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Security vendors: It\u2019s time to come clean about intrusions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38904"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38904\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38905"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}