{"id":41473,"date":"2021-06-24T21:40:00","date_gmt":"2021-06-24T21:40:00","guid":{"rendered":"https:\/\/www.darkreading.com\/endpoint\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/d\/d-id\/1341395"},"modified":"2021-06-24T21:40:00","modified_gmt":"2021-06-24T21:40:00","slug":"d3fend-framework-seeks-to-lay-foundation-for-cyber-defense","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/","title":{"rendered":"D3FEND Framework Seeks to Lay Foundation for Cyber Defense"},"content":{"rendered":"<p>First ATT&amp;CK, now D3FEND.<\/p>\n<p>On June 22, federal research and development organization MITRE released its initial framework for creating a common language for defensive capabilities and technologies, dubbed D3FEND, in much the same way that the organization&#8217;s ATT&amp;CK framework has created a foundation for analyzing and discussing attacker tactics.<\/p>\n<p>Funded by the National Security Agency, the framework aims to define specific atomic security capabilities \u2014 also known as &#8220;digital artifacts&#8221; \u2014 so that researchers, cybersecurity professionals, and vendors can analyze the capabilities of specific products, match attack techniques to defenses, and conduct research on specific scenarios. By breaking down cybersecurity products into their capabilities, the D3FEND matrix can help buyers make decisions based on technical features, not marketing.<\/p>\n<p>MITRE hopes to hit a &#8220;semantic sweet spot&#8221; \u2014 specific enough to give cybersecurity professionals the information they need but general enough for the framework to be applied broadly, says Peter Kaloroumakis, the creator of D3FEND and principal cybersecurity engineer at MITRE.<\/p>\n<p>&#8220;I could see an organization would use this to get a lot of diversity in their defenses \u2014 they might want two or three different products for a certain functionality,&#8221; he says. &#8220;Other companies might want to retain only one product in order to save budget. That is one of the things that we are hopeful with the model \u2014 that there will be a lot of use cases.&#8221;<\/p>\n<p>The <a href=\"https:\/\/www.mitre.org\/publications\/project-stories\/d3fend-knowledge-graph-guides-security-architects-better-cyber-defenses\" target=\"_blank\" data-mce-href=\"https:\/\/www.mitre.org\/publications\/project-stories\/d3fend-knowledge-graph-guides-security-architects-better-cyber-defenses\" rel=\"noopener\">D3FEND framework<\/a> is the latest effort by cybersecurity organizations to create a defensive framework to advance cybersecurity. The National Institute of Standards and Technology (NIST) has created its own Cybersecurity Framework that focuses on defensive stages \u2014 identify, protect, detect, respond, and recover \u2014 and the security controls, standards, and practices relevant to those efforts. Educational organizations, such as the SANS Institute and the OWASP Project, have created lists of common vulnerabilities and programming errors. Other efforts include security maturity frameworks to measure an organization&#8217;s progress based on its procedures.<\/p>\n<p>However, <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/nsa-funds-development-and-release-of-d3fend-framework\/d\/d-id\/1341357\" target=\"_blank\" data-mce-href=\"https:\/\/www.darkreading.com\/threat-intelligence\/nsa-funds-development-and-release-of-d3fend-framework\/d\/d-id\/1341357\" rel=\"noopener\">D3FEND<\/a> will focus on the security controls available through products and capabilities custom-created by companies. Broken down into 17 different defensive actions in five broad categories \u2014 harden, detect, isolate, deceive, and evict \u2014 the D3FEND database has nearly 100 specific security controls, tactics, and functions organized along the lines of MITRE&#8217;s popular ATT&amp;CK framework, which <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/mitre-adds-macos-more-data-types-to-attandck-framework\/d\/d-id\/1340870\" target=\"_blank\" data-mce-href=\"https:\/\/www.darkreading.com\/threat-intelligence\/mitre-adds-macos-more-data-types-to-attandck-framework\/d\/d-id\/1340870\" rel=\"noopener\">hit version 9 in April<\/a>. While ATT&amp;CK views adversaries as collections of their specific tactics, D3FEND views defensive practices and products by their digital artifacts.<\/p>\n<p>The result will be a many-to-many relationship, with each product having many digital artifacts, and each digital artifact being included in many products. The focus is not how well a product performs a function but whether that function is present in the product, Kaloroumakis says.<\/p>\n<p>&#8220;One thing to think about is there are thousands of cybersecurity vendors, and each one might have a number of products, and some of those products have dozens of discrete functions that they perform,&#8221; he says. &#8220;When you are comparing one product or a group of products to another group of products, it can be overwhelming to determine the functions that each one performs.&#8221;<\/p>\n<p>When firewalls started adding additional capabilities \u2014 for example, examining traffic by protocol and sandboxing files \u2014 the D3FEND framework could have documented the additional features in a way that allowed cybersecurity professionals to easily see the additional coverage. Rather than relying on vendors to define a next-generation firewall in a meaningful way, cybersecurity professionals would instead know what each product could do.<\/p>\n<p>&#8220;Firewalls started doing protocol analysis, pulling out files and tracking them \u2014 now we can specify, now we can do file analysis,&#8221; Kaloroumakis says. &#8220;If you are a higher level, and not a cyber expert necessarily, but you are responsible for making sure the money is spent well.&#8221; <\/p>\n<p>MITRE has opened up the D3FEND framework for comments and hopes to spur additional analyses of how effectively products provide coverage against particular attacks. <\/p>\n<p>&#8220;The initial audience we have for D3FEND is these cybersecurity architects or security architects that are looking at all the trade-offs,&#8221; Kaloroumakis says. &#8220;They may not be in operations, but they understand and architect the operations part of security.&#8221;<\/p>\n<p>The D3FEND framework will likely interact with the cybersecurity market in interesting ways. In the past, groups that evaluate security products <a href=\"https:\/\/www.darkreading.com\/perimeter\/open-security-tests-gain-momentum-with-more-lab-partners\/d\/d-id\/1334610\" target=\"_blank\" data-mce-href=\"https:\/\/www.darkreading.com\/perimeter\/open-security-tests-gain-momentum-with-more-lab-partners\/d\/d-id\/1334610\" rel=\"noopener\">have met with pushback<\/a>. MITRE&#8217;s ATT&amp;CK framework \u2014 and the occasional evaluations the nonprofit organization performs of products against specific adversaries&#8217; methods \u2014 has already led to press releases trumpeting performance on these tests. <\/p>\n<p>Will companies agree on which of their products have a particular feature? Kaloroumakis is not sure.<\/p>\n<p>&#8220;In general, it is hard to get everyone to agree on everything,&#8221; he says. &#8220;However, from my perspective, I think that MITRE is well positioned because it is a not-for-profit organization and we are impartial with our contracts with the government.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/d\/d-id\/1341395?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The MITRE project, funded by the National Security Agency, aims to create a foundation for analyzing and discussing cyber defenses and could shake up the vendor community. Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/d\/d-id\/1341395?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-41473","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D3FEND Framework Seeks to Lay Foundation for Cyber Defense 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D3FEND Framework Seeks to Lay Foundation for Cyber Defense 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-24T21:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"432\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"D3FEND Framework Seeks to Lay Foundation for Cyber Defense\",\"datePublished\":\"2021-06-24T21:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/\"},\"wordCount\":818,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/\",\"name\":\"D3FEND Framework Seeks to Lay Foundation for Cyber Defense 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"datePublished\":\"2021-06-24T21:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D3FEND Framework Seeks to Lay Foundation for Cyber Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D3FEND Framework Seeks to Lay Foundation for Cyber Defense 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/","og_locale":"en_US","og_type":"article","og_title":"D3FEND Framework Seeks to Lay Foundation for Cyber Defense 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-24T21:40:00+00:00","og_image":[{"width":432,"height":435,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"D3FEND Framework Seeks to Lay Foundation for Cyber Defense","datePublished":"2021-06-24T21:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/"},"wordCount":818,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/","url":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/","name":"D3FEND Framework Seeks to Lay Foundation for Cyber Defense 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"datePublished":"2021-06-24T21:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/d3fend-framework-seeks-to-lay-foundation-for-cyber-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"D3FEND Framework Seeks to Lay Foundation for Cyber Defense"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41473"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}