{"id":43340,"date":"2021-10-11T18:18:01","date_gmt":"2021-10-11T18:18:01","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/handling-threat-intelligence-across-billions-of-data-points"},"modified":"2021-10-11T18:18:01","modified_gmt":"2021-10-11T18:18:01","slug":"handling-threat-intelligence-across-billions-of-data-points","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/","title":{"rendered":"Handling Threat Intelligence Across Billions of Data Points"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Most large, well-known organizations are under constant cybersecurity threats. This is why threat intelligence is arguably important enough to warrant its own team. But threat intelligence involves many factors&nbsp;that, more than ever, demand a newer, sophisticated approach. It begins with figuring out how data can be best used to fight security threats.<\/p>\n<p>\nThreat intelligence has many facets. Various and diverse entities can include websites, apps, back-office systems, user accounts, and many more entry or access points. These systems can all have complex associations and relationships \u2013 not just with each other but also over time. The amount of data that can be collected is practically infinite for large organizations.\n<\/p>\n<p>\nIn fact, these&nbsp;data sets can be billions to trillions of combinations of data points. Looked at disparately, these data entities can be meaningless. But understanding how they might relate can be highly revealing. As a result, a graph database is ideal for unraveling the mystery of sprawling data.\n<\/p>\n<p><strong><br \/>\nWhy a Graph Database?<br \/>\n<br \/><\/strong>A common relational database degrades in performance the more data there is. In particular, it&nbsp;performs even more poorly in handling relational operations of complicated data. Simply put, relational databases are outdated and not built to the task of traversing billions or more data points or to relating data to each other.\n<\/p>\n<p>\nAs a result, graph databases&nbsp;\u2013 though they have been around for a while&nbsp;\u2013 have recently grown in popularity. Threat intelligence happens to be an ideal use case to throw at a graph database. They are specifically built to uncover relationships between data and between data sets, not just to pull up data. How they work can get complex. The important takeaway is graph databases are different than RDBMS databases because they store deep relationship characteristics about data within data itself.\n<\/p>\n<p><strong><br \/>\nBasic Data Capability Needs<br \/>\n<br \/><\/strong>Central to a graph database solution is the ability to write data and query the data with speed. An organization, like a government agency or multinational company, might have billions or more data points, so they might require a database to support batch offline importing of data generated each day. This is because tens of billions of relational data might be generated daily. This data needs to be written to the database in hours so the system is ready again for the next day.\n<\/p>\n<p>\nNext, it is ideal for the graph database to support online, real-time queries. Query performance should be possible within milliseconds. Filtering capabilities are also essential. For example, a data scientist will most likely need to query database vertices and edges by property.\n<\/p>\n<p>\nSo, essentially, the graph database to be used should allow writing data in real time and offline and querying online graph data. These basics are fundamental for big data analytics involving large-scale threat intelligence.\n<\/p>\n<p><strong><br \/>\nModularity in Graph Databases<br \/>\n<br \/><\/strong>Another important factor to consider when figuring out graph database structure how much data will need to be handled. As mentioned, a large organization, especially with numerous assets where data points are captured or stored, usually generate tens of billions or even a trillion graph data entities.\n<\/p>\n<p>\nSeparation of a compute and storage engine is ideal. Each can then be scaled and managed independently. Scalability support adds convenience and can enable redundancy. DevOps might also need to factor in whether they want the ability to scale their clusters online without stopping service in a production environment.\n<\/p>\n<p><strong><br \/>\nBasics of Graphing for Threat Intelligence<br \/>\n<br \/><\/strong>If we break down threat opportunities and protection points into their network layers, we can begin to define how graph models can help. For example, a bottom layer might consist of hash values in files as a point of weakness and file storage and transport as a defense layer opportunity. Next up might be the IP or domain name as a threat point whereas its network layer can be seen as a point of defense. We can do this up to a mobile phone number and its user being a threat point, and authentication of the user and device being points of defense.\n<\/p>\n<p>\nFor each of these layer points, a hacker and cybersecurity response team are normally in adversarial roles. This can be used to begin to define modeling. Typically, there was no great way to link them via any specific relationship. With a graph database, using vertices, edges, and properties, this becomes possible. We can form a three-dimensional hierarchical network to understand attack methods, tools used, and more.\n<\/p>\n<p>\nFor example, a connected device requires the network layer, device layer, account layer, and a user layer. For each of these layers, the device will have its own identification. With the help of the graph database, we can complete a three-dimensional risk recognition for this device.\n<\/p>\n<p>\nRelationships between an account and a device should be weighted. For example, if an account usually uses a device, we can conclude the account is strongly linked with the device. So the weight of the relationship should be higher. Similarly, if an account uses a device to commit criminal activity, it can mean the account is weakly linked with the device. So the weight of this relationship is lower.\n<\/p>\n<p>\nSuch defined edges do not just have weight properties. They should also have time properties. This way you can more greatly correlate account usage with devices across typical times they are used versus the opposite.\n<\/p>\n<p><strong>Getting Started with Graph Databases<br \/>\n<br \/><\/strong>As illustrated, there is complexity in interrelating data sets for meaningful big data. This is true across applications, from threat intelligence to real-time recommendations. However, seasoned programmers can easily get started. Open source graph database projects are available to test the waters.\n<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/handling-threat-intelligence-across-billions-of-data-points\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Graph databases can play a role in threat intelligence and unraveling sprawling data.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/handling-threat-intelligence-across-billions-of-data-points\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-43340","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Handling Threat Intelligence Across Billions of Data Points 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Handling Threat Intelligence Across Billions of Data Points 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-11T18:18:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Handling Threat Intelligence Across Billions of Data Points\",\"datePublished\":\"2021-10-11T18:18:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/\"},\"wordCount\":946,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6d67a22118007750\\\/616472f4452a7b79909d5176\\\/graph-data-relationships-H9EB4D.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/\",\"name\":\"Handling Threat Intelligence Across Billions of Data Points 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6d67a22118007750\\\/616472f4452a7b79909d5176\\\/graph-data-relationships-H9EB4D.jpg\",\"datePublished\":\"2021-10-11T18:18:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6d67a22118007750\\\/616472f4452a7b79909d5176\\\/graph-data-relationships-H9EB4D.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6d67a22118007750\\\/616472f4452a7b79909d5176\\\/graph-data-relationships-H9EB4D.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/handling-threat-intelligence-across-billions-of-data-points\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Handling Threat Intelligence Across Billions of Data Points\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Handling Threat Intelligence Across Billions of Data Points 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/","og_locale":"en_US","og_type":"article","og_title":"Handling Threat Intelligence Across Billions of Data Points 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-11T18:18:01+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Handling Threat Intelligence Across Billions of Data Points","datePublished":"2021-10-11T18:18:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/"},"wordCount":946,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/","url":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/","name":"Handling Threat Intelligence Across Billions of Data Points 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg","datePublished":"2021-10-11T18:18:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6d67a22118007750\/616472f4452a7b79909d5176\/graph-data-relationships-H9EB4D.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/handling-threat-intelligence-across-billions-of-data-points\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Handling Threat Intelligence Across Billions of Data Points"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43340"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43340\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}