{"id":42193,"date":"2021-08-06T00:00:00","date_gmt":"2021-08-06T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/this-week-in-security-news-august-6-2021.html"},"modified":"2021-08-06T00:00:00","modified_gmt":"2021-08-06T00:00:00","slug":"this-week-in-security-news-august-6-2021-vp-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/","title":{"rendered":"This Week in Security News &#8211; August 6, 2021 VP, Threat Intelligence"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/week-in-security-news_lrg.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/week-in-security-news_lrg.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, learn how false advertisers use spam browser notifications to gain ad revenue. Also, read about the results from Trend Micro\u2019s first half 2021 biannual Cyber Risk Index report.<\/p>\n<p>Read on:<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/browser-notification-spam-tricks-clicks-for-ad-revenue.html\">Browser Notification Spam Tricks Clicks for Ad Revenue<\/a><\/span><\/b><\/p>\n<p>False advertisers are taking advantage of browser notifications in a unique case of click fraud that takes advantage of more people being stuck at home and searching for streaming content. Trend Micro noticed an increase in this type of spam beginning in late February. Upon further investigation, researchers found something interesting and unique about this browser notification scheme. Instead of leading to anything malicious, the pop-up takes engaged users to legitimate security software websites.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.scmagazine.com\/news\/cloud\/survey-of-3600-businesses-worldwide-calls-cloud-computing-an-elevated-risk?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=SCUS_Newswire_%7B%7B%27now%27%7Cdate%3A%27%25Y%25m%25d%27%7D%7D&amp;hmSubId=%7B%7Bcontact.cms_id_encrypted%7D%7D&amp;email_hash=%7B%7Bcontact.email%7Cmd5%7D%7D&amp;oly_enc_id=4579B5148445B7X\" target=\"_blank\" rel=\"noopener\">Survey of 3,600 businesses worldwide calls cloud computing an \u2018elevated risk\u2019<\/a><\/span><\/b><\/p>\n<p>Trend Micro released a study that said cloud computing was among the top two infrastructure risks for businesses. The other was organizational misalignment and complexity. The biannual Cyber Risk Index (CRI) gave cloud computing a 6.77, ranking it as an \u201celevated risk\u201d on the CRI\u2019s 10-point scale. Many survey respondents say they spend &#8220;considerable resources&#8221; managing third-party risks like cloud providers.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/homeland-security-dhs-releases-new-cybersecurity-rules.html\">Homeland Security Releases New Cybersecurity Rules<\/a><\/span><\/b><\/p>\n<p>The Department of Homeland Security\u2019s (DHS) Transportation Security Administration (TSA) released its second security directive, requiring the owners and operators of TSA-designated critical pipelines to implement specific mitigation measures to protect against ransomware attacks and other threats to IT and OT systems. It also requires owners and operators to develop and implement a cybersecurity contingency and recovery plan as well as to conduct a cybersecurity architecture design review.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.npr.org\/2021\/08\/02\/1023801277\/your-facebook-account-was-hacked-getting-help-may-take-weeks-or-299\" target=\"_blank\" rel=\"noopener\">Your Facebook Account Was Hacked. Getting Help May Take Weeks \u2014 Or $299<\/a><\/span><\/b><\/p>\n<p>Users lately have grown frustrated with their Facebook accounts getting hacked and the company not responding to requests for getting accounts back. Victims desperate to get access back go as far as buying an Oculus VR set for $299 in attempt to reach customer service through the Facebook owned VR company.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/first-half-1h-2021-cyber-risk-index-cri.html\">The First Half of 2021 Cyber Risk Index<\/a><\/span><\/b><\/p>\n<p>This week, Trend Micro released its biannual Cyber Risk Index (CRI). The survey now includes North America, Europe, Asia-Pacific and South America, bringing a truly global view of the cyber risk organizations are dealing with today. The CRI is a collaborative effort between Trend Micro and the Ponemon Institute surveying businesses of all sizes and in many industries. The CRI looks to identify the cyber risk level organizations have based on two areas: cyber preparedness and cyber threats.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.crn.com\/slide-shows\/security\/14-top-cybersecurity-trends-to-expect-at-black-hat-conference\" target=\"_blank\" rel=\"noopener\">14 Top Cybersecurity Trends to Expect at Black Hat Conference<\/a><\/span><\/b><\/p>\n<p>As Black Hat Conference 2021 kicks off amid vendor cancellations and a surge in COVID-19 cases in Las Vegas, CRN speaks with 14 prominent executives to see what cybersecurity trends they expect to be the talk of this year\u2019s event. I shared my thoughts on living-off-the-land attacks with CRN for this article.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/supply-chain-attacks-from-a-managed-detection-and-response-persp.html\">Supply Chain Attacks from a Managed Detection and Response Perspective<\/a><\/span><\/b><\/p>\n<p>Many organizations now use tools and IT solutions that allow centralized management of endpoints, making it possible to update, troubleshoot, and deploy applications from a remote location. However, this convenience comes at a price \u2014 malicious actors can target the primary hub and gain access to the whole system. Even more concerning, cybercriminals can bypass security measures by focusing on their target\u2019s supply chain. This blog entry looks at two examples of recent supply chain attacks.<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/www.inforisktoday.com\/ransomware-attackers-eying-pure-data-leakage-model-a-17198\" target=\"_blank\" rel=\"noopener\">Ransomware Attackers Eying &#8216;Pure Data-Leakage Model&#8217;<\/a><\/span><\/b><\/p>\n<p>In this video interview, Bob McArdle, director of cybercrime research at Trend Micro, discusses how some threat actors are moving to a pure data-leakage model; the move to ban or restrict ransomware discussions and recruitment on some leading Russian-language cybercrime forums; how ransomware operations are continuing to refine their business model to target bigger organizations; why banning payments to ransomware groups would do little more than &#8220;revictimize victims.&#8221;<\/p>\n<p><b><span class=\"body-subhead-title\"><a href=\"https:\/\/qz.com\/2042596\/us-government-agencies-fail-to-meet-basic-cybersecurity-standards\/\" target=\"_blank\" rel=\"noopener\">US Government Agencies Are Failing to Meet Even Basic Cybersecurity Standards<\/a><\/span><\/b><\/p>\n<p>The cyber defenses of key&nbsp;US&nbsp;federal agencies remain&nbsp;woefully inadequate, according to&nbsp;a Senate oversight report. Thanks to a string of recent high-profile hacks, the agencies likely have a narrow window in which to act while the bureaucracy\u2019s leadership is motivated enough&nbsp;to modernize cyber defenses. William Malik, VP of infrastructure strategies at Trend Micro, said surveys have shown most organizations don\u2019t patch their IT vulnerabilities until there\u2019s a serious attack or near-miss.<\/p>\n<p>What are your thoughts on our Cyber Risk Index results? Share in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/www.twitter.com\/@JonLClay\" target=\"_blank\" rel=\"noopener\">@JonLClay<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/this-week-in-security-news-august-6-2021.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, learn how false advertisers use spam browser notifications to gain ad revenue. Also, read about the results from Trend Micro\u2019s first half 2021 biannual Cyber Risk Index report. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42194,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9520,9521,9511,9508,9522,9523],"class_list":["post-42193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-expert-perspective","tag-trend-micro-research-network"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News - August 6, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News - August 6, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-06T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News &#8211; August 6, 2021 VP, Threat Intelligence\",\"datePublished\":\"2021-08-06T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/\"},\"wordCount\":782,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Expert Perspective\",\"Trend Micro Research : Network\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/\",\"name\":\"This Week in Security News - August 6, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg\",\"datePublished\":\"2021-08-06T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News &#8211; August 6, 2021 VP, Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News - August 6, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News - August 6, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-06T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News &#8211; August 6, 2021 VP, Threat Intelligence","datePublished":"2021-08-06T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/"},"wordCount":782,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cloud","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Expert Perspective","Trend Micro Research : Network"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/","name":"This Week in Security News - August 6, 2021 VP, Threat Intelligence 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg","datePublished":"2021-08-06T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/this-week-in-security-news-august-6-2021-vp-threat-intelligence.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-august-6-2021-vp-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News &#8211; August 6, 2021 VP, Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42193"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42194"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}