{"id":43250,"date":"2021-10-06T17:00:00","date_gmt":"2021-10-06T17:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/risk\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity"},"modified":"2021-10-06T17:00:00","modified_gmt":"2021-10-06T17:00:00","slug":"why-not-sharing-is-caring-when-it-comes-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/","title":{"rendered":"Why Not Sharing Is Caring When It Comes to Cybersecurity"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>It&#8217;s no secret that people overshare online \u2014 how many social media posts have you seen about what people had for breakfast or some other scrap of banal information? While the addiction to sharing is often innocuous, it can also have dire implications for cybersecurity, especially at a time when cybercriminals are actively scanning those details for footholds to infiltrate a company or organization. <\/p>\n<p>Employees with access to sensitive company information need to remember that oversharing and failing to observe proper data protection protocols can lead to a devastating breach. The number one rule: If they see something suspicious, always report it immediately. Here are a few tips for ensuring your employees keep vital information safe.<\/p>\n<p><strong>1. Not Sharing Is Caring<\/strong><br \/>\n<br \/>The urge to share personal information online is understandable \u2014 we&#8217;re naturally drawn to details about friends, family, and even total strangers, and we receive positive reinforcement through likes, comments, and other forms of engagement. While it&#8217;s possible to share securely, the sheer amount of information that people publish on the Internet makes it much easier for hackers to leverage that information to manipulate victims and gain access to secure systems. <\/p>\n<p>According to a <a href=\"https:\/\/f.hubspotusercontent20.net\/hubfs\/1670277\/%5BCollateral%5D%20Tessian%20Research\/%5BTessian%20Research%5D%20How%20to%20Hack%20a%20Human\/%5BTessian%20Research%5D%20How%20to%20Hack%20a%20Human.pdf?__hstc=170273983.07709b405533ff4d8b6272e0c44b5c7f.1630259122032.1630259122032.1630259122032.1&amp;__hssc=170273983.1.1630259122032&amp;__hsfp=2267641084\" target=\"_blank\" rel=\"noopener\">survey<\/a> conducted by Tessian, 90% of employees share personal and professional information on social media while almost one-third post business travel photos and updates. This gives cybercriminals a huge trove of information to exploit. Consider just a few examples: Employees often post pictures of their work badges, which contain serial numbers, barcodes, and other types of information that hackers can steal. They post pictures of boarding passes during business trips, which reveal passport numbers and contact information. And they make announcements about work trips and events, which tell cybercriminals where they&#8217;ll be and for how long. <\/p>\n<p>While public posts are a major source of exploitable information for cybercriminals, an even more pressing threat comes from hackers impersonating personnel within targeted companies to convince employees to send sensitive information voluntarily. <\/p>\n<p><strong>2. Beware &#8220;Insider&#8221; Threats<\/strong><br \/>\n<br \/>The most stubborn cybersecurity issue companies face is the consistent effectiveness of social engineering \u2014 a general type of cyberattack which works by convincing employees that they&#8217;re communicating with a colleague, vendor, trusted website, or some other legitimate entity and manipulating them into divulging private information. The vast majority of successful cyberattacks use some form of social engineering, which is why employee education has become one of the most effective ways to keep companies secure. <\/p>\n<p>Social engineering can take the form of either an internal or external threat. According to Verizon&#8217;s &#8220;<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2021\/2021-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noopener\">2021 Data Breach Investigations Report<\/a>&#8221; (DBIR), internal cyberattacks constitute around one-fifth of breaches \u2014 a proportion that has decreased since 2018. However, the DBIR notes that external attacks &#8220;may initially resemble an internal threat \u2026 even though the call may be coming from inside the house, there is still a stranger on the line.&#8221; This overlap between internal and external threats is why employees must be circumspect about any interaction that leads to a request for sensitive information \u2014 they should always ask for credentials, confirm the request is legitimate, and remember that the inconvenience of a delay is far less harmful than the consequences of a cyberattack. <\/p>\n<p>Finally, if employees ever believe they have accidentally shared information with an actor who might pose a security threat, they shouldn&#8217;t hesitate to report it. Doing so may be difficult and embarrassing but hoping the threat will go away on its own is far worse. <\/p>\n<p><strong>3. How to Be a Responsible Steward of Sensitive Information<\/strong><br \/>The relentless success of social engineering attacks demonstrates that companies still have a long way to go to build cyber aware workforces. According to the FBI, the most common type of cybercrime is phishing, <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">accounting<\/a> for almost two and a half times more attacks than the nearest competitor. Meanwhile, by far the costliest type of attack is business email compromise (BEC) \u2014 the infiltration of an email account to either steal private information or trick employees into doing so by impersonating an authority figure. <\/p>\n<p>Employees can avoid falling into these traps. First, they should remember that credential theft is among the most ubiquitous cyberattacks (according to this year&#8217;s DBIR, stolen credentials were used in 61% of breaches). Second, they should avoid sending company information to outside locations such as personal email accounts. And third, they shouldn&#8217;t overshare on social media or anywhere else. <\/p>\n<p>Companies put a lot of faith in their employees when it comes to the management of sensitive information. While this is a weighty responsibility, it&#8217;s also an empowering reminder that all employees can keep their organizations safe if they know which information needs to stay private, how to vet those they communicate with, and how to recognize a suspicious interaction. The employees who observe these guidelines will be capable of preventing cybercriminals from stealing valuable information and infiltrating their organizations.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/risk\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three key tips to help ensure your employees keep vital information safe.Read More <a href=\"https:\/\/www.darkreading.com\/risk\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-43250","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Not Sharing Is Caring When It Comes to Cybersecurity 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Not Sharing Is Caring When It Comes to Cybersecurity 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Why Not Sharing Is Caring When It Comes to Cybersecurity\",\"datePublished\":\"2021-10-06T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/\"},\"wordCount\":814,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/IW_LOGO_Thumbnail.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/\",\"name\":\"Why Not Sharing Is Caring When It Comes to Cybersecurity 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/IW_LOGO_Thumbnail.jpeg\",\"datePublished\":\"2021-10-06T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/IW_LOGO_Thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/IW_LOGO_Thumbnail.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Not Sharing Is Caring When It Comes to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Not Sharing Is Caring When It Comes to Cybersecurity 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why Not Sharing Is Caring When It Comes to Cybersecurity 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-06T17:00:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Why Not Sharing Is Caring When It Comes to Cybersecurity","datePublished":"2021-10-06T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/"},"wordCount":814,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/","url":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/","name":"Why Not Sharing Is Caring When It Comes to Cybersecurity 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg","datePublished":"2021-10-06T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg","contentUrl":"https:\/\/beta.darkreading.com\/images\/IW_LOGO_Thumbnail.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/why-not-sharing-is-caring-when-it-comes-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Not Sharing Is Caring When It Comes to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43250"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43250\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}