{"id":41986,"date":"2021-07-27T00:00:00","date_gmt":"2021-07-27T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/new-collaboration-with-adobe-and-mapp.html"},"modified":"2021-07-27T00:00:00","modified_gmt":"2021-07-27T00:00:00","slug":"new-collaboration-with-adobe-and-mapp","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/","title":{"rendered":"New Collaboration with Adobe and MAPP"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/new-collaboration-with-adobe-and-mapp\/new_collaboration_adobe.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/g\/new-collaboration-with-adobe-and-mapp\/new_collaboration_adobe.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Information sharing has never been a challenge in the cybercrime underground. Threat actors routinely trade stolen data, best practices and know-how with each other to increase their chances of success. Yet \u201cabove ground\u201d it has not always been so straightforward. Competing commercial and other considerations sometimes complicate collaborative efforts. When that happens, the only winners are the bad guys.<\/p>\n<p>That\u2019s why Trend Micro has always taken an open, collaborative approach. We\u2019ll partner with law enforcement, academia and industry vendors if it means making our connected, digital world more secure.<\/p>\n<p>In this way, we have deepened our long-running collaboration with <a href=\"https:\/\/blog.adobe.com\/en\/publish\/2021\/07\/27\/adobe-collaborates-trend-micro-microsoft-active-protections-program.html\" target=\"_blank\" rel=\"noopener\">Adobe<\/a> and Trend Micro Research. The move helps distribute Trend Micro vulnerability information about Adobe products to security vendors more quickly so they can enhance protection for their customers.<\/p>\n<p><b>What\u2019s new?<\/b><\/p>\n<p>The speed at which the cybercrime community gets to work is almost impressive. When a new vendor patch is released, it can take threat actors just hours to reverse engineer a patch and develop an exploit. The challenge for organizations is that it often takes them far longer to apply patches\u2014weeks, months or even years longer. One of <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-133a\" target=\"_blank\" rel=\"noopener\">the top 10 vulnerabilities<\/a> exploited during 2016-2019 was from 2012. The top two exploited in 2020 were patched the year before.<\/p>\n<p>It\u2019s therefore increasingly important that we take a holistic approach to security. That means not only discovering and disclosing vulnerabilities, and encouraging prompt patching, but ensuring that security software is updated before a patch is released, so customers are protected from day one.<\/p>\n<p>This is where the <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/mapp\" target=\"_blank\" rel=\"noopener\">Microsoft Active Protections Program<\/a> (MAPP) does great work\u2014providing security vendors with early access to vulnerability information so they can update their AV software, intrusion detection\/protection (IDS\/IPS) and other tools.<\/p>\n<p>Thanks to a new initiative with Adobe, Trend Micro Research will now be providing additional information to participating MAPP vendors. It will usually contain a detailed description of the bug, some source code (or pseudo code), stack traces, detection guidance, and in some cases, Proof of Concepts (PoCs).<\/p>\n<p>The goal is to provide everything needed for security vendors to create a signature or filter that will block exploits of a soon-to-be-patched vulnerability. It\u2019s about arming the security vendor community and our collective customers with the right information at the right time to head off cyber-risk.<\/p>\n<p><b>A long history of collaboration<\/b><\/p>\n<p>Of course, this is just the latest in a long line of collaborative efforts Trend Micro has sought to deliver to make the digital world a safer place. Through the Zero Day Initiative (ZDI), the world\u2019s largest vendor agnostic bug bounty program, Trend Micro incentivizes researchers to find new bugs in vendor code and disclose responsibly. Over the years we\u2019ve disclosed a total of nearly 1,200 vulnerabilities to Adobe. That\u2019s made ZDI the number one source for new disclosures to Adobe over the past six years.<\/p>\n<p>Beyond the day-to-day bug disclosures of the ZDI program, we also host <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2021\/4\/2\/pwn2own-2021-schedule-and-live-results\" target=\"_blank\" rel=\"noopener\">Pwn2Own<\/a>, an annual competition held twice a year that challenges contestants to find new bugs in popular products. The resulting work not only makes the internet a safer place \u2013 it also serves as inspiration to guide the vulnerability research community. There\u2019s a high level of trust required between vendor, researcher and the ZDI team, which is evidenced by the sensitive discussions that go on behind closed doors in the \u201cdisclosure room\u201d at these events. With Adobe, we have had many productive conversations over the years during Pwn2Own disclosures in which Adobe has utilized direct access to the researchers to ask questions and gain deeper knowledge of the vulnerabilities and new exploit techniques being presented. These conversations can help vendors identify bug variants and further harden their software.<\/p>\n<p><b>Going beyond<\/b><\/p>\n<p>The strength, depth and duration of our partnership helps Adobe further to embark on the next stage of the journey\u2014providing Trend engineers with access to PoC files so we can deliver enhanced actionable vulnerability intelligence to the industry via MAPP.<\/p>\n<p>This is one of many industry efforts we\u2019re engaged in on an ongoing basis. &nbsp;<\/p>\n<p>We\u2019re immensely proud of what our research team has achieved, and what we can accomplish to further our mission through collaborations like this with Adobe.&nbsp;<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/new-collaboration-with-adobe-and-mapp.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Collaboration with industry partners is helping secure the digital world by distributing Trend Micro vulnerability information to security vendors more quickly so they can enhance protection for their customers. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41987,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9461,1047,378,9467,6681],"class_list":["post-41986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-articles-news-reports","tag-cyber-crime","tag-endpoints","tag-exploitsvulnerabilities","tag-security-strategies"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Collaboration with Adobe and MAPP 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Collaboration with Adobe and MAPP 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-27T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/new-collaboration-with-adobe-and-mapp.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Collaboration with Adobe and MAPP\",\"datePublished\":\"2021-07-27T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/new-collaboration-with-adobe-and-mapp.jpg\",\"keywords\":[\"Articles, News, Reports\",\"Cyber Crime\",\"endpoints\",\"Exploits&amp;Vulnerabilities\",\"Security strategies\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/\",\"name\":\"New Collaboration with Adobe and MAPP 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/new-collaboration-with-adobe-and-mapp.jpg\",\"datePublished\":\"2021-07-27T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/new-collaboration-with-adobe-and-mapp.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/new-collaboration-with-adobe-and-mapp.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-collaboration-with-adobe-and-mapp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Collaboration with Adobe and MAPP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Collaboration with Adobe and MAPP 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/","og_locale":"en_US","og_type":"article","og_title":"New Collaboration with Adobe and MAPP 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-27T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/new-collaboration-with-adobe-and-mapp.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Collaboration with Adobe and MAPP","datePublished":"2021-07-27T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/new-collaboration-with-adobe-and-mapp.jpg","keywords":["Articles, News, Reports","Cyber Crime","endpoints","Exploits&amp;Vulnerabilities","Security strategies"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/","url":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/","name":"New Collaboration with Adobe and MAPP 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/new-collaboration-with-adobe-and-mapp.jpg","datePublished":"2021-07-27T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/new-collaboration-with-adobe-and-mapp.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/new-collaboration-with-adobe-and-mapp.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-collaboration-with-adobe-and-mapp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"New Collaboration with Adobe and MAPP"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41986"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41986\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41987"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}