{"id":41791,"date":"2021-07-16T00:00:00","date_gmt":"2021-07-16T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/this-week-in-security-news-july-16-2021.html"},"modified":"2021-07-16T00:00:00","modified_gmt":"2021-07-16T00:00:00","slug":"this-week-in-security-news-july-16-2021-vp-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/","title":{"rendered":"This Week in Security News &#8211; July 16, 2021 VP, Threat Intelligence"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/week-in-security-news_lrg.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/week-in-security-news_lrg.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn about the underground exploit market and how organizations can protect their systems against N-day vulnerabilities being bought and sold in the underground. Also, read how scammers are falsely promising social media verification for money or personal information.<\/p>\n<p>Read on:<\/p>\n<p><span class=\"body-subhead-title\"><b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/news\/vulnerabilities-and-exploits\/trends-and-shifts-in-the-underground-n-day-exploit-market\">Trends and Shifts in the Underground N-Day Exploit Market<\/a><\/b><\/span><\/p>\n<p>The cybercriminal underground hosts a vast market of&nbsp;zero-day and N-day exploits, where the price for an exploit is often dictated by how long it has been out and whether a patch for the exploited vulnerability is available. Over the past two years, Trend Micro scoured underground forums for N-day exploits to determine how long they stayed in the market and examined their life cycle to see whether malicious actors strictly favored newer exploits or also had uses for older ones.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/scams-make-getting-verified-on-instagram-facebook-twitter-a-minefield\/\" target=\"_blank\" rel=\"noopener\">Scams Make Getting Verified on Instagram, Facebook, Twitter a Minefield<\/a><\/span><\/b><\/p>\n<p>Almost every major platform offers verification in some form. Originally intended to authenticate accounts deemed to be of public interest, the badges have morphed into status symbols that give social media users bragging rights. That&#8217;s provided ample opportunity for scammers, who manipulate aspiring but unsuspecting users pursuing careers as influencers or creators. Scammers and hackers try to lure social media users who want to get verified into handing over their personal information.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/main-considerations-for-securing-enterprise-5g-networks.html\">Main Considerations for Securing Enterprise 5G Networks<\/a><\/span><\/b><\/p>\n<p>5G brings countless benefits to enterprises through its scalability, speed and connectivity. However, these very same features might amplify the damage caused by threats if malicious actors infiltrate 5G systems. Security should be a prime concern for enterprises that use 5G networks. In this blog, learn more about the pressing security considerations for enterprise 5G networks.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.databreachtoday.com\/malware-exploits-livestream-app-a-17071\" target=\"_blank\" rel=\"noopener\">Malware Exploits Live Stream App<\/a><\/span><\/b><\/p>\n<p>Newly uncovered malware dubbed &#8220;BioPass&#8221; is targeting Chinese online gambling companies to capture private data from their clients, Trend Micro says. The malware exploits popular livestreaming and video recording app Open Broadcaster Software Studio to steal victims&#8217; web browser and instant messaging data, which can potentially be used for further exploitation.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/tesla-recalls-vehicles-in-china-due-to-safety-glitch.html\">Tesla \u201cRecalls\u201d Vehicles in China due to Safety Glitch<\/a><\/span><\/b><\/p>\n<p>China had Tesla recall more than 200,000 of its Model 3 and Model Y cars because of a software glitch that could enable passengers to accidentally activate autopilot. However, the recall is not traditional\u2014customers won\u2019t have to return their purchased Teslas for a refund or upgrade, instead the glitch will be patched remotely through an update free of charge. This blog further explores the potential security risks of connected cars.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-only-half-of-organisations-can-effectively-defend-against-attacks-warns-report\/\" target=\"_blank\" rel=\"noopener\">Ransomware: Only Half of Organizations Can Effectively Defend Against Attacks, Warns Report<\/a><\/span><\/b><\/p>\n<p>According to a new report from Trend Micro, organizations are failing to notice suspicious activity that could indicate a ransomware attack &#8211; but there are ways to improve your defenses. For example, the report warns that many organizations struggle with detecting the suspicious activity associated with ransomware and attacks that could provide early evidence that cyber criminals have compromised the network.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/with-5g-coming-its-time-to-plug-security-gaps.html\">With 5G Coming, It\u2019s Time to Plug Security Gaps<\/a><\/span><\/b><\/p>\n<p>Businesses primarily choose private networks to exercise greater control\u2014enabling them to lower traffic latency while enhancing availability, security, privacy and compliance. In this context, security will be an increasingly important differentiator for operators. With 5G introducing new risks, many are finding they don\u2019t have the visibility, tooling or resources to manage such networks securely. A new report from Trend Micro and GSMA Intelligence highlights many of these challenges.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/threatpost.com\/solarwinds-hotfix-zero-day-active-attack\/167704\/\" target=\"_blank\" rel=\"noopener\">SolarWinds Issues Hotfix for Zero-Day Flaw Under Active Attack<\/a><\/span><\/b><\/p>\n<p>SolarWinds has issued a hotfix for a zero-day remote code execution (RCE) vulnerability already under active, yet limited, attack on some of the company\u2019s customers. SolarWinds does not currently know many customers may be directly affected by the flaw, nor has it identified the ones who were targeted. The company is recommending that all customers using the affected products update now, which can be done by accessing the company\u2019s customer portal.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/july-patch-tuesday--dns-server--exchange-server-vulnerabilities-.html\">July Patch Tuesday: DNS Server, Exchange Server Vulnerabilities Cause Problems<\/a><\/span><\/b><\/p>\n<p>After two relatively quiet months, July has proven to be another busy month for Microsoft security bulletins. A total of 117 bulletins were issued for various security vulnerabilities fixed in the July Patch Tuesday cycle. Thirteen of these were rated as Critical, 103 as Important, and one was classified as Moderate. Fifteen were submitted via the Trend Micro Zero Day Initiative.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.cyberscoop.com\/schneider-electric-plc-vulnerability-ransomware\/\" target=\"_blank\" rel=\"noopener\">Researchers Find Big Flaw in a Schneider Electric ICS System Popular in Building Systems, Utilities<\/a><\/span><\/b><\/p>\n<p>A vulnerability in Schneider Electric computer control systems, popular in heating, air conditioning and other building systems, could allow hackers to take control of them. The remote code execution vulnerability puts millions of devices at risk. The vulnerability could be used to deploy a variety of attacks, from launching ransomware to altering the commands to machinery.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/survey-phishing-ransomware-attacks-are-top-concerns.html\">Survey: Phishing &amp; Ransomware Attacks are Top Concerns<\/a><\/span><\/b><\/p>\n<p>The latest research report from Osterman Research, How to Reduce the Risk of Phishing and Ransomware, included a survey that shows phishing and ransomware are two of the top threats cyber professionals are concerned about every single day and can lead to significant challenges for the victim organization.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.bankinfosecurity.com\/constant-ransomware-business-refinements-boosting-profits-a-17066\" target=\"_blank\" rel=\"noopener\">Constant Ransomware Business Refinements Boosting Profits<\/a><\/span><\/b><\/p>\n<p>One of the unfortunate success stories of the coronavirus era has been ransomware, as evidenced by its ability to dominate headlines during the pandemic. Credit criminals find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service while too many of their targets still fail to get the basics right.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/etsi-publishes-iot-testing-specs-for-mqtt-coap.html\">ETSI Publishes IoT Testing Specs for MQTT, COAP<\/a><\/span><\/b><\/p>\n<p>On June 25, 2021, ETSI released its new IoT Testing Specifications completed by the organization\u2019s committee on Methods for Testing and Specifications. The documents contain seven standards addressing the testing of the IoT MQ Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) protocols and the foundational security IoT-Profile.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/no-filter--exposing-the-tactics-of-instagram-account-hackers.html\">#NoFilter: Exposing the Tactics of Instagram Account Hackers<\/a><\/span><\/b><\/p>\n<p>This blog examines another Instagram account hacking campaign carried out by individual actors or by hacking groups. For maximum impact, the hackers behind this campaign hound social media influencers, a pattern that has also been seen in past campaigns. Having amassed thousands, if not millions, of followers and often earning from brand deals, affiliate marketing, and other means, influencers have a lot to lose should their accounts get compromised.<\/p>\n<p>What are your thoughts on the cybercriminal underground exploit market? Share in the comments below or follow me on Twitter to continue the conversation: @JonLClay.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/this-week-in-security-news-july-16-2021.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trends and Shifts in the Underground N-Day Exploit Market and Scams Make Getting Verified on Social Media a Minefield. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41792,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9461,1252,1047,6502,378,9460,306],"class_list":["post-41791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-articles-news-reports","tag-cloud","tag-cyber-crime","tag-cyber-threats","tag-endpoints","tag-expert-perspective","tag-network"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News - July 16, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News - July 16, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News &#8211; July 16, 2021 VP, Threat Intelligence\",\"datePublished\":\"2021-07-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\"},\"wordCount\":1104,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg\",\"keywords\":[\"Articles, News, Reports\",\"cloud\",\"Cyber Crime\",\"cyber threats\",\"endpoints\",\"Expert Perspective\",\"Network\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\",\"name\":\"This Week in Security News - July 16, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg\",\"datePublished\":\"2021-07-16T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News &#8211; July 16, 2021 VP, Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News - July 16, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News - July 16, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-16T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News &#8211; July 16, 2021 VP, Threat Intelligence","datePublished":"2021-07-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/"},"wordCount":1104,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg","keywords":["Articles, News, Reports","cloud","Cyber Crime","cyber threats","endpoints","Expert Perspective","Network"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/","name":"This Week in Security News - July 16, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg","datePublished":"2021-07-16T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/this-week-in-security-news-july-16-2021-vp-threat-intelligence.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-july-16-2021-vp-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News &#8211; July 16, 2021 VP, Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41791"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41792"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}