{"id":43110,"date":"2020-11-26T00:00:00","date_gmt":"2020-11-26T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/ciso\/20\/k\/beat-cybercriminal-at-their-own-game.html"},"modified":"2020-11-26T00:00:00","modified_gmt":"2020-11-26T00:00:00","slug":"beat-cybercriminals-at-their-own-game","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/","title":{"rendered":"Beat Cybercriminals at Their Own Game"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/20\/k\/beat-cybercriminals-at-own.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/20\/k\/beat-cybercriminals-at-own.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/focus-on-the-biggest-security-threats-not-the-most-publicized\/\" target=\"_blank\" rel=\"noopener\">According to Gartner<\/a>, vulnerability exploitation is the cause of most information security breaches, and any breach can harm your business, diminish customer trust, impact revenue, and depress shareholder value. A single attack that takes advantage of a vulnerability can also lead to costly fines for non-compliance with data protection regulations like the <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/capabilities\/solutions-for\/gdpr-compliance.html\">General Data Protection Regulation (GDPR)<\/a>.<\/p>\n<p>The Trend Micro\u2122 Trend Micro Zero Day Initiative\u2122 (ZDI), a leading bug bounty program and number one global public discloser of vulnerabilities, reported the total number of publicly disclosed vulnerabilities in 2019 was 1,095\u2014with ZDI disclosing 52% of all cases. And all indicators suggest that the number identified but not reported is even higher.<\/p>\n<p>But where do you find the time and resources to identify and patch vulnerabilities when cybersecurity skills are in such short supply?<\/p>\n<p><span class=\"main-subtitle-black\"><span class=\"rte-red-text\">&#8220;(ICS)2 estimates that the number of unfilled cybersecurity jobs will reach an unprecedented <a href=\"https:\/\/www.nytimes.com\/2018\/11\/07\/business\/the-mad-dash-to-find-a-cybersecurity-force.html\" target=\"_blank\" rel=\"noopener\">3.5 million by 2021<\/a>. &#8220;<\/span><\/span><\/p>\n<p><span class=\"body-subhead-title\">What can you do?<\/span><\/p>\n<p><b>Create a prioritized patching process<\/b><\/p>\n<p>Patching every vulnerability immediately throughout your ecosystem is impossible for most organizations. Instead, industry analysts recommend focusing on aligning vulnerability management priorities with the biggest security threats by focusing first on vulnerabilities that are also actively being exploited in the wild. Another factor will be the level of potential impact associated with any given vulnerability. Those that are not only being exploited in the wild, but also designated as \u201ccritical\u201d or \u201cimportant\u201d due to the degree of compromise they enable, will certainly warrant attention before all others.<\/p>\n<p><b>Protect vulnerabilities as soon as they are disclosed<\/b><\/p>\n<p>Vulnerability research gives security companies the information needed to build protections into their products and services\u2014reducing the time lag between vulnerability disclosure and protecting sensitive business applications, including those that are not easily patchable.<\/p>\n<p>Trend Micro\u2019s exclusive access to vulnerability information from both its internal research, as well as the ZDI, enables us to deliver immediate post-disclosure coverage (protection across multiple IT layers after a vulnerability is disclosed and before the patch has been applied). And for Trend Micro\u2122 TippingPoint\u2122 customers, we are able to deliver pre-emptive protection on average 81 days in advance of a vendor patch.<\/p>\n<p><b>Our approach to vulnerabilities<\/b><\/p>\n<p>Our research is put to work in two very important ways. First, responsibly disclosing new vulnerabilities to the vendors of the affected software and systems allows them to proactively provide corresponding patches in a timely manner. Then, for our customers, extending protection to cover the gap between vulnerability disclosure and patch application, as well as out-of-support and un-patchable systems.<\/p>\n<p>Trend Micro offers the breadth and depth of vulnerability research integrated into its solutions to deliver maximum protection through:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">The world\u2019s largest vendor-agnostic bug bounty program<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Comprehensive coverage across operating systems, devices, and applications\u2014as well as IoT and IIoT, including ICS\/SCADA<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Immediate protection upon vulnerability disclosure with virtual patching<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Extensive research capabilities including vulnerability analysis, malware and exploit analysis, security product development, and custom research<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Market-leading security solutions across cloud, server, network, endpoints, email, and IoT<\/span><\/li>\n<\/ul>\n<p>Read Trend Micro\u2019s vulnerability research e-book, <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/20\/k\/TM_Vulnerability_Research_eBook_2020.pdf\"><span class=\"bs-modal\">Beat Cybercriminals at Their Own Game<\/span><\/a>, to learn more about how you can streamline vulnerability management for reduced risk and maximum protection.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/20\/k\/beat-cybercriminal-at-their-own-game.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The fight against cybercrime never ends, but there\u2019s a valuable resource that can give you an advantage\u2014continuous research into the vulnerabilities across your diverse technology infrastructure.\u00a0Get a leg up in the vulnerability race with our guide. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43111,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9527,9529],"class_list":["post-43110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beat Cybercriminals at Their Own Game 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beat Cybercriminals at Their Own Game 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-26T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"641\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Beat Cybercriminals at Their Own Game\",\"datePublished\":\"2020-11-26T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg\",\"keywords\":[\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\",\"name\":\"Beat Cybercriminals at Their Own Game 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg\",\"datePublished\":\"2020-11-26T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Expert Perspective\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-expert-perspective\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Beat Cybercriminals at Their Own Game\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beat Cybercriminals at Their Own Game 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/","og_locale":"en_US","og_type":"article","og_title":"Beat Cybercriminals at Their Own Game 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-26T00:00:00+00:00","og_image":[{"width":641,"height":350,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Beat Cybercriminals at Their Own Game","datePublished":"2020-11-26T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg","keywords":["Trend Micro CISO : Expert Perspective","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/","url":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/","name":"Beat Cybercriminals at Their Own Game 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg","datePublished":"2020-11-26T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/beat-cybercriminals-at-their-own-game.jpg","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/beat-cybercriminals-at-their-own-game\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Expert Perspective","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-expert-perspective\/"},{"@type":"ListItem","position":3,"name":"Beat Cybercriminals at Their Own Game"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43110"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43110\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43111"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}