{"id":43424,"date":"2021-10-15T15:01:51","date_gmt":"2021-10-15T15:01:51","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32730\/Critical-Infrastruture-Security-Dubbed-Abysmal-By-Researchers.html"},"modified":"2021-10-15T15:01:51","modified_gmt":"2021-10-15T15:01:51","slug":"critical-infrastruture-security-dubbed-abysmal-by-researchers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/","title":{"rendered":"Critical Infrastruture Security Dubbed Abysmal By Researchers"},"content":{"rendered":"<p>The &#8220;abysmal&#8221; state of security for industrial control systems (ICSs) is putting critical services at serious risk, new research finds.&nbsp; <\/p>\n<p>You only need to look at the chaos caused by a ransomware attack launched against <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline<\/a> this year &#8212; leading to panic buying and fuel shortages across part of the US &#8212; to see what real-world disruption cyber incidents can trigger, and their consequences can go far beyond the damage one company has to repair. &nbsp; <\/p>\n<p>It was only last month that the <a href=\"https:\/\/porthouston.com\/wp-content\/uploads\/Port-Houston-Statement-_-Cybersecurity-Attack-Thwarted_-Sept-23-2021-_Final-.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Port of Houston<\/a> fended off a cyberattack and there is no reason to believe cyberattacks on operational technology (OT) won&#8217;t continue &#8212; or, perhaps, become more common.&nbsp; <\/p>\n<p>On Friday, <a href=\"https:\/\/cloudsek.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CloudSEK<\/a> published a new report exploring ICSs and their security posture in light of recent cyberattacks against industrial, utility, and manufacturing targets. The research focuses on ICSs available through the internet.<\/p>\n<p>&#8220;While nation-state actors have an abundance of tools, time, and resources, other threat actors primarily rely on the internet to select targets and identify their vulnerabilities,&#8221; the team notes. &#8220;While most ICSs have some level of cybersecurity measures in place, human error is one of the leading reasons due to which threat actors are still able to compromise them time and again.&#8221; <\/p>\n<p>Some of the most common issues allowing initial access cited in the report include weak or default credentials, outdated or unpatched software vulnerable to bug exploitation, credential leaks caused by third parties, shadow IT, and the leak of source code.&nbsp; <\/p>\n<p>After conducting web scans for vulnerable ICSs, the team says that &#8220;hundreds&#8221; of vulnerable endpoints were found.&nbsp; <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>CloudSEK highlighted four cases that the company says represents the current issues surrounding industrial and critical service cybersecurity today: <\/p>\n<p><strong>An Indian water supply management company:<\/strong> Software accessible with default manufacturer credentials allowed the team to access the water supply management platform. Attackers could have tampered with water supply calibration, stop water treatments, and manipulate the chemical composition of water supplies.&nbsp; <\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/\" class=\"lazy\" alt=\"screenshot-2021-10-12-at-16-23-48.png\" data-original=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d9067b98677331c889877d723b45c46f608d3ee6\/2021\/10\/12\/6f99a4d2-071b-4337-8f8d-713c2abc16a7\/screenshot-2021-10-12-at-16-23-48.png?fit=bounds&amp;auto=webp\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d9067b98677331c889877d723b45c46f608d3ee6\/2021\/10\/12\/6f99a4d2-071b-4337-8f8d-713c2abc16a7\/screenshot-2021-10-12-at-16-23-48.png?fit=bounds&amp;auto=webp\" class alt=\"screenshot-2021-10-12-at-16-23-48.png\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> CloudSEK <\/span><\/figcaption><\/figure>\n<p><strong>The Indian government: <\/strong>Sets of mail server credentials belonging to the Indian government were found on GitHub.&nbsp; <\/p>\n<p><strong>A gas transport company:<\/strong> This critical service provider&#8217;s web server, responsible for managing and monitoring gas transport trucks, was vulnerable to an SQL injection attack and administrator credentials were available in plaintext.&nbsp; <\/p>\n<p><strong>Central view:<\/strong> The team also found hardcoded credentials belonging to the Indian government on a web server supporting monitors for CCTV footage across different services and states in the country.&nbsp; <\/p>\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) was informed of CloudSEK&#8217;s findings, as well as associated international agencies.&nbsp; <\/p>\n<p>&#8220;Owing to an increase in remote work and online businesses, most cybersecurity efforts have been focused on IT security,&#8221; says Sparsh Kulshrestha, Senior Security Analyst at CloudSEK. &#8220;However, the recent OT attacks have been a timely reminder of why traditional industries and critical infrastructure need renewed attention, given that they form the bedrock of our societies and our economies.&#8221; <\/p>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32730\/Critical-Infrastruture-Security-Dubbed-Abysmal-By-Researchers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2780],"class_list":["post-43424","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlineflawscada"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical Infrastruture Security Dubbed Abysmal By Researchers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Infrastruture Security Dubbed Abysmal By Researchers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-15T15:01:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Critical Infrastruture Security Dubbed Abysmal By Researchers\",\"datePublished\":\"2021-10-15T15:01:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/\"},\"wordCount\":523,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-security-dubbed-abysmal-by-researchers\\\/\",\"keywords\":[\"headline,flaw,scada\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/\",\"name\":\"Critical Infrastruture Security Dubbed Abysmal By Researchers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-security-dubbed-abysmal-by-researchers\\\/\",\"datePublished\":\"2021-10-15T15:01:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-security-dubbed-abysmal-by-researchers\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/critical-infrastructure-security-dubbed-abysmal-by-researchers\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critical-infrastruture-security-dubbed-abysmal-by-researchers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,scada\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawscada\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Critical Infrastruture Security Dubbed Abysmal By Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Infrastruture Security Dubbed Abysmal By Researchers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/","og_locale":"en_US","og_type":"article","og_title":"Critical Infrastruture Security Dubbed Abysmal By Researchers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-15T15:01:51+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Critical Infrastruture Security Dubbed Abysmal By Researchers","datePublished":"2021-10-15T15:01:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/"},"wordCount":523,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/","keywords":["headline,flaw,scada"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/","url":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/","name":"Critical Infrastruture Security Dubbed Abysmal By Researchers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/","datePublished":"2021-10-15T15:01:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/","contentUrl":"https:\/\/www.zdnet.com\/article\/critical-infrastructure-security-dubbed-abysmal-by-researchers\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/critical-infrastruture-security-dubbed-abysmal-by-researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,scada","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawscada\/"},{"@type":"ListItem","position":3,"name":"Critical Infrastruture Security Dubbed Abysmal By Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43424"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43424\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}