{"id":40574,"date":"2021-04-23T14:40:51","date_gmt":"2021-04-23T14:40:51","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32228\/Malware-Operators-Use-TLS-46-Of-The-Time-When-Detected.html"},"modified":"2021-04-23T14:40:51","modified_gmt":"2021-04-23T14:40:51","slug":"malware-operators-use-tls-46-of-the-time-when-detected","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/","title":{"rendered":"Malware Operators Use TLS 46% Of The Time When Detected"},"content":{"rendered":"<div class=\"wysiwyg\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"614\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-1024x614.jpg\" alt class=\"wp-image-122031\" srcset=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-1024x614.jpg 1024w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-300x180.jpg 300w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-768x460.jpg 768w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-860x515.jpg 860w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-156x93.jpg 156w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-312x187.jpg 312w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327-640x384.jpg 640w, https:\/\/www.scmagazine.com\/wp-content\/uploads\/2021\/04\/GettyImages-451216438-e1619123502327.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>Urs Holzle, Senior Vice President for Technical Infrastructure at Google, speaks on the Google Cloud Platform during a Google I\/O Developers Conference in San Francisco, California. A large portion of growth in TLS use by malware operators is attributed to increased use of legitimate web and cloud services protected by TLS, including Discord, Pastebin, Github and Google\u2019s cloud services. (Photo by Stephen Lam\/Getty Images)<\/figcaption><\/figure>\n<p>Researchers have found that as Transport Layer Security (TLS) has grown to account for some 98% of all web page visits, use of TLS among malware operators increased from 23% of all <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/malware-variant-becomes-worlds-most-popular-thanks-to-ransomware-surge\/\">malware<\/a> detected in 2020 to nearly 46% today. &nbsp;&nbsp;<\/p>\n<p>In a <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/21\/nearly-half-of-malware-now-use-tls-to-conceal-communications\/\">blog<\/a> post Wednesday, Sophos researchers said malware operators have also been adopting <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ssl-tls-certificate-markets-boom-on-dark-web\/\">TLS<\/a> for essentially the same reasons as legitimate companies: To prevent defenders from detecting and stopping the deployment of malware and data theft.<\/p>\n<p>Sophos linked a large portion of the growth in TLS use by malware operators to the increased use of legitimate web and cloud services protected by TLS, including Discord, Pastebin, Github and Google\u2019s cloud services. These sites have become repositories for malware components, destinations for stolen data and they have been known to send commands to botnets and other malware. Sophos also linked the use of TLS among malware operators to the increased use of Tor and other TLS-based network proxies to encapsulate malicious communications between malware and the threat actors deploying the bad code.&nbsp;<\/p>\n<p>As network and data encryption has become commonplace in protecting personal and enterprise data, Charles Herring, co-founder and chief technology officer of WitFoo, said cybercriminals have increasingly adopted the same advances in encryption to protect their own privacy in carrying out attacks.<\/p>\n<p>\u201cCybersecurity analysts and investigators have had to adjust techniques to account for these obfuscation approaches from criminals,\u201d Herring said. \u201cModern investigations require comprehending, corroborating and evolving data from endpoints, agents, servers, network and cloud data sources. SecOps that historically relied on deep network packet analysis to track down attackers are having to develop skills and tactics in other data domains to cover the gaps left by pervasive encryption.\u201d<\/p>\n<p>Zach Jones, senior director of detection research&nbsp;at WhiteHat Security, said the evolution and growth of TLS has been driven by a clear recognition that TLS serves as a foundational requirement to secure application delivery.<\/p>\n<p>&nbsp;\u201cSetting up TLS for any application \u2013 including malware \u2013 has become very easy,\u201d Jones said. \u201cTherefore it\u2019s a simple way for malware authors to decrease the chance of their command and control communications being flagged as malicious.\u201d<\/p>\n<\/p><\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p> <a href=\"https:\/\/www.scmagazine.com\/tag\/cloud\/\" class=\"button -secondary\">Cloud<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/cybercrime\/\" class=\"button -secondary\">Cybercrime<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/encryption\/\" class=\"button -secondary\">Encryption<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/malware\/\" class=\"button -secondary\">Malware<\/a> <\/section>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32228\/Malware-Operators-Use-TLS-46-Of-The-Time-When-Detected.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8427],"class_list":["post-40574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware Operators Use TLS 46% Of The Time When Detected 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Operators Use TLS 46% Of The Time When Detected 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-23T14:40:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/malware-operators-use-tls-46-of-the-time-when-detected.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"614\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Malware Operators Use TLS 46% Of The Time When Detected\",\"datePublished\":\"2021-04-23T14:40:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/\"},\"wordCount\":440,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/malware-operators-use-tls-46-of-the-time-when-detected.jpg\",\"keywords\":[\"headline,malware,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/\",\"name\":\"Malware Operators Use TLS 46% Of The Time When Detected 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/malware-operators-use-tls-46-of-the-time-when-detected.jpg\",\"datePublished\":\"2021-04-23T14:40:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/malware-operators-use-tls-46-of-the-time-when-detected.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/malware-operators-use-tls-46-of-the-time-when-detected.jpg\",\"width\":1024,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malware-operators-use-tls-46-of-the-time-when-detected\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malware Operators Use TLS 46% Of The Time When Detected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Operators Use TLS 46% Of The Time When Detected 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/","og_locale":"en_US","og_type":"article","og_title":"Malware Operators Use TLS 46% Of The Time When Detected 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-04-23T14:40:51+00:00","og_image":[{"width":1024,"height":614,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/malware-operators-use-tls-46-of-the-time-when-detected.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Malware Operators Use TLS 46% Of The Time When Detected","datePublished":"2021-04-23T14:40:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/"},"wordCount":440,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/malware-operators-use-tls-46-of-the-time-when-detected.jpg","keywords":["headline,malware,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/","url":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/","name":"Malware Operators Use TLS 46% Of The Time When Detected 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/malware-operators-use-tls-46-of-the-time-when-detected.jpg","datePublished":"2021-04-23T14:40:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/malware-operators-use-tls-46-of-the-time-when-detected.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/04\/malware-operators-use-tls-46-of-the-time-when-detected.jpg","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/malware-operators-use-tls-46-of-the-time-when-detected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarecryptography\/"},{"@type":"ListItem","position":3,"name":"Malware Operators Use TLS 46% Of The Time When Detected"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40574"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40574\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40575"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}