{"id":42392,"date":"2021-08-18T00:00:00","date_gmt":"2021-08-18T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/tokyo-olympics-leveraged-in-cybercrime-attack.html"},"modified":"2021-08-18T00:00:00","modified_gmt":"2021-08-18T00:00:00","slug":"tokyo-olympics-leveraged-in-cybercrime-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/","title":{"rendered":"Tokyo Olympics Leveraged in Cybercrime Attack"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/article-large-tile.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/article-large-tile.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>In the past, whenever a global event such as the Olympics is held, there have been cybercriminals who try to take advantage of the buzz.<\/p>\n<p><span class=\"body-subhead-title\">Threats to the Olympics<\/span><br \/>As we have reported in the past on various Olympic-related threats, the Olympics, like other large-scale sporting events, has become a target for cybercriminals to take advantage of. Compared to other threats that take advantage of global events, Olympic threats are not much different in terms of methods, but rather cybercriminals are using traditional tactics to take advantage of popular online searches and events related to the Olympics. It&#8217;s more like cybercriminals are taking advantage of traditional tactics. Past Olympic threats have used a variety of tactics, including the following:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Emails and messages containing Olympic-related topics that lead to malicious sites or attachments that can be opened<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Using SEO poisoning, links to phishing sites and other malicious sites are displayed at the top of search results pages when searching for Olympic-related keywords. General users can easily believe that these sites are legitimate, and suffer damage such as having their personal information collected from the sites they visit, or being infected with malware.<\/span><\/li>\n<\/ul>\n<p>If you are a fan of the Olympics and encounter one of these threats, you could suffer a great deal of damage without even realizing it. Malware can be created on a user&#8217;s computer by a defaced sports site, spam email messages can contain malicious links and attachments, and fake video streaming sites can prompt users to purchase fake security software. In other words, it&#8217;s not a good idea.<\/p>\n<p>Another possible scam is to offer Olympic-related items that are not normally given away for free, and to lure users by claiming that they are available at a special discount. As a result, the user may suffer financial damage due to the fake purchase procedure, and the personal information entered may also be collected.<\/p>\n<p>Olympic-related information can be obtained from official Olympic sites, sponsor sites, etc. Be careful not to click on Olympic-related links via e-mail, instant messenger (IM), or social media messages. It&#8217;s also important to note that cyber criminals will not be able to get to your SEO page. It is also important to note that cyber criminals use SEO poisoning tactics to display malicious links at the top of search results pages. These malicious links can lead users to malware infections or to specially crafted websites and web pages. An example of this is the case of the Vancouver 2010 Winter Olympics. In this case, a malicious link was displayed at the top of the search engine results page. The malicious link pretended to be a site to update Windows Media Player, but in fact, it contained a malware.<\/p>\n<p>In the past Olympics, we have seen fake ticket sale sites and fraudulent sites that use free tickets as bait. However, the Tokyo Olympics will be held without spectators in many venues, so the same tactics will not work. Instead, the possibility of fake sites such as TV broadcasts and streaming Internet distribution will increase.<\/p>\n<p><b>Here is a summary of other possible Olympic-related cybercrime tactics<\/b><\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">During the Games: fake live streaming and videos, Twitter hashtag hijacking, scams using scandalous images of Olympic athletes and social networking accounts, fake apps, etc.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Post-closing: Scams that use the words and deeds of Olympic athletes as well as auctions of their personal belongings.<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">How to Avoid Being a Victim<\/span><\/p>\n<p>Considering the possibility of advertisements and suspicious sites being included in web search results through methods such as SEO poisoning, it is safer to directly browse official sites that you have bookmarked in advance or news sites that you use on a regular basis. If you use search sites, you may be able to avoid suspicious sites by carefully checking the URLs of search results. If you want to watch the Olympics via the Internet, the first thing you should be aware of is that you should only watch the games streaming from the official sites or affiliated sites. For this year&#8217;s Tokyo Games, NHK+, gorin.jp, and TVer are the official streaming sites. Lesser-known streaming sites, especially those that claim to be &#8220;unrestricted video sites,&#8221; are likely to be traps set by cyber criminals, and you should be very careful when clicking on them. Inadvertently clicking on such sites may result in the infection of malware or the fraudulent acquisition of personal information.<\/p>\n<p><span class=\"body-subhead-title\">Trend Micro&#8217;s Countermeasures<\/span><\/p>\n<p>Countermeasures against fake websites: Trend Micro uses Web Reputation System (WRS) technology to block fraudulent sites such as fake sites and phishing sites that have been used to promote the Olympics. In addition, phishing e-mails that lead to unauthorized sites are filtered using E-Mail Reputation (ERS) technology.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/tokyo-olympics-leveraged-in-cybercrime-attack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just before the opening of the Tokyo Olympics, we confirmed an attack that directed users from a fake TV broadcast schedule page to browser notification spam. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42393,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9521,9511,9508,9534,9585,9535],"class_list":["post-42392","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-latest-news","tag-trend-micro-research-spam","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tokyo Olympics Leveraged in Cybercrime Attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tokyo Olympics Leveraged in Cybercrime Attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"566\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tokyo Olympics Leveraged in Cybercrime Attack\",\"datePublished\":\"2021-08-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Spam\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/\",\"name\":\"Tokyo Olympics Leveraged in Cybercrime Attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg\",\"datePublished\":\"2021-08-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg\",\"width\":566,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tokyo-olympics-leveraged-in-cybercrime-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tokyo Olympics Leveraged in Cybercrime Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tokyo Olympics Leveraged in Cybercrime Attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/","og_locale":"en_US","og_type":"article","og_title":"Tokyo Olympics Leveraged in Cybercrime Attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-18T00:00:00+00:00","og_image":[{"width":566,"height":278,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tokyo Olympics Leveraged in Cybercrime Attack","datePublished":"2021-08-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Latest News","Trend Micro Research : Spam","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/","url":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/","name":"Tokyo Olympics Leveraged in Cybercrime Attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg","datePublished":"2021-08-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/tokyo-olympics-leveraged-in-cybercrime-attack.jpg","width":566,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tokyo-olympics-leveraged-in-cybercrime-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Tokyo Olympics Leveraged in Cybercrime Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42392"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42392\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42393"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}