{"id":39567,"date":"2021-02-12T19:42:13","date_gmt":"2021-02-12T19:42:13","guid":{"rendered":"http:\/\/9845545e-5d8f-431f-97c4-573836802ff2"},"modified":"2021-02-12T19:42:13","modified_gmt":"2021-02-12T19:42:13","slug":"apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/","title":{"rendered":"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/05\/23\/91921ae6-029f-4f0d-a4f5-0c08432e8766\/phishing-safe-browsing.jpg\" class alt=\"Google Safe Browsing phishing alert\"><\/span><figcaption><span class=\"caption\"><\/span><\/figcaption><\/figure>\n<p>Apple&#8217;s upcoming iOS 14.5 release will ship with a feature that will re-route all Safari&#8217;s Safe Browsing traffic through Apple-controlled proxy servers as a workaround to preserve user privacy and prevent Google from learning the IP addresses of iOS users.<\/p>\n<p>The new feature, spotted by a Reddit user earlier this week and covered in a report from&nbsp;<a href=\"https:\/\/the8-bit.com\/apple-proxies-google-safe-browsing-privacy\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">8-bit<\/a>, has been&nbsp;<a href=\"https:\/\/twitter.com\/othermaciej\/status\/1359736220809531393\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">formally confirmed<\/a>&nbsp;by Maciej Stachowiak, Head of Webkit Engineering at Apple.<\/p>\n<p>The new feature will work only when users activate the &#8220;Fraudulent Website Warning&#8221; option in the iOS Safari app settings.<\/p>\n<p>This enables support for Google&#8217;s Safe Browsing technology in Safari. The Safe Browsing technology works by taking an URL the user is trying to access, sending the URL in an anonymized state to Google&#8217;s Safe Browsing servers, where Google accesses the site and scans for threats.<\/p>\n<p>If malware, phishing forms, or other threats are found on the site, Google tells the user&#8217;s Safari browser to block access to the site and show a fullscreen red warning.<\/p>\n<p>While years ago, when Google launched the Safe Browsing API, the company knew what sites a user was accessing; in recent years, Google has taken several steps to anonymize data sent from user&#8217;s devices via the Safe Browsing feature.<\/p>\n<p>But while Google has anonymized URL strings, by sending the link in a cropped and hashed state, Google still sees the IP address from where a Safe Browsing check comes through.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Apple&#8217;s new feature basically takes all these Safe Browsing checks and passes them through an Apple-owned proxy server, making all requests appear as coming from the same IP address.<\/p>\n<p>Many would call the move useless, as Google would still be unable to see what URL the user was checking, but the feature is consistent with other measures Apple has been taking lately, focusing on improving its users&#8217; privacy.<\/p>\n<p>Many of these features have often encroached and disturbed Google&#8217;s huge presence in the user analytics and tracking sector.<\/p>\n<p>This includes pioneering broad anti-tracking features in Safari, and forcing app makers to add &#8220;<a href=\"https:\/\/www.zdnet.com\/article\/new-privacy-and-security-features-announced-at-apples-wwdc-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">privacy labels<\/a>&#8221; to their App Store listings, a requirement that Google has mysteriously avoided by simply&nbsp;<a href=\"https:\/\/spencerdailey.com\/2021\/02\/10\/google-itself-is-now-telling-users-their-apps-are-out-of-date-despite-no-updates-being-available\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">not updating any of its apps since last year<\/a>.<\/p>\n<p>iOS 14.5 is currently in beta and is expected to be released in the coming months.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iOS 14.5 is currently in beta.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39568,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-39567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-12T19:42:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google\",\"datePublished\":\"2021-02-12T19:42:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/\"},\"wordCount\":406,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/\",\"name\":\"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg\",\"datePublished\":\"2021-02-12T19:42:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg\",\"width\":1000,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/","og_locale":"en_US","og_type":"article","og_title":"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-12T19:42:13+00:00","og_image":[{"width":1000,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google","datePublished":"2021-02-12T19:42:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/"},"wordCount":406,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/","url":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/","name":"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg","datePublished":"2021-02-12T19:42:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg","width":1000,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple will proxy Safe Browsing traffic on iOS 14.5 to hide user IPs from Google"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39567"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39567\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39568"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}