{"id":43574,"date":"2021-10-22T00:00:00","date_gmt":"2021-10-22T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/j\/workshop-aws-s3-bucket-malware-scanning.html"},"modified":"2021-10-22T00:00:00","modified_gmt":"2021-10-22T00:00:00","slug":"workshop-aws-s3-bucket-for-malware-scanning","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/","title":{"rendered":"Workshop: AWS S3 Bucket for Malware Scanning"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/j\/workshop-aws-s3-bucket-for-malware-scanning\/aws-s3-bucket-malware-scanningartboard-1.jpg\"><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/s3-protection.awsworkshop.io\/images\/TM_logo.png\" alt=\"Trend Micro\"><\/p>\n<h3 id=\"welcome\">Welcome<\/h3>\n<p>Welcome to the <strong>AWS S3 Bucket Malware Scanning with Trend Micro<\/strong> hands-on workshop.<\/p>\n<p>In this workshop, you will learn how to scan your objects that are being uploaded to Amazon S3 buckets for malware and integrate into your custom workflows, by automating with your current resources, directly in your AWS environment.<\/p>\n<p>Using Trend Micro &#8211; Cloud One, AWS S3, AWS Lambda, AWS SQS, AWS SNS and AWS Cloud Formation, you\u2019ll get hands-on experience implementing an automated Cloud Formation security stack to provide Data Security capabilities to your Amazon S3 buckets.<\/p>\n<hr>\n<h3 id=\"who-is-trend-micro\">Who is Trend Micro?<\/h3>\n<p>We\u2019re a global leader in cybersecurity that helps make the world safe for exchanging digital information. Leveraging over 30 years of security expertise, global threat research, and continuous innovation, Trend Micro enables resilience for businesses, governments, and consumers. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.<\/p>\n<p>Our threat researchers and data scientists use the latest techniques to analyze data and identify threats in real time. This is achieved through augmented cyber intelligence\u2014which combines the focused findings from artificial intelligence (AI) and machine learning with knowledge from threat experts who are constantly researching the latest tactics, techniques, and procedures (TTPs) used by cybercriminals. We rapidly and accurately collate this wealth of global threat intelligence using automated security analytics to customize protection against the threats that are most likely to impact you. To maintain this immense scale of threat protection, we\u2019ve created one of the world\u2019s most extensive cloud-based infrastructures, delivering automatic correlation of threats across multiple security layers for customized protection, giving you threat visibility across platforms, security layers, and users globally.<\/p>\n<p> <iframe src=\"https:\/\/www.youtube.com\/embed\/vh-hA2IwDhI\" allowfullscreen title=\"YouTube Video\">[embedded content]<\/iframe>\n<\/p>\n<hr>\n<h3 id=\"learning-objectives\">Learning Objectives<\/h3>\n<ul>\n<li>Learn how to build a cloud native architecture to protect objects stored in Amazon S3 buckets<\/li>\n<li>Understand how to build a seamless security architecture in the applications workflow to protect files being uploaded by customers across the globe<\/li>\n<li>Familiarize users with the deployment, configuration, and usage of Cloud One &#8211; File Storage Security to easily deploy in AWS environments<\/li>\n<li>Identify what data flow profiles require automated antimalware scanning as part of the data processing pipelines<\/li>\n<\/ul>\n<hr>\n<h3 id=\"expected-duration\">Expected Duration:<\/h3>\n<hr>\n<h3 id=\"who-should-attend\">Who should attend<\/h3>\n<ul>\n<li>Site Reliability Engineers (SREs)<\/li>\n<li>Developers<\/li>\n<li>DevOps Engineers<\/li>\n<li>Cloud Architects<\/li>\n<li>Solution Architects<\/li>\n<li>Information Security<\/li>\n<li>GRC teams<\/li>\n<li>Tech leads and Program Managers (PM)<\/li>\n<\/ul>\n<hr>\n<h3 id=\"additional-help\">Additional Help<\/h3>\n<p>For any additional help please reach out to:<\/p>\n<ul>\n<li>Fernando Cardoso &#8211; (fernando_cardoso@trendmicro.com)<\/li>\n<li>Felipe Costa &#8211; (felipe_costa@trendmicro.com)<\/li>\n<\/ul>\n<p>\n<a href=\"mailto:fernando_cardoso@trendmicro.com;felipe_costa@trendmicro.com?subject=Feedback%20AWS%20S3%20bucket%20malware%20scanning%20with%20Trend%20Micro%20Workshop\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"btn btn-default\"> Talk to us <i class=\"fas fa-paper-plane\"><\/i><br \/>\n<\/a> <a href=\"https:\/\/github.com\/aws-samples\/aws-modernization-for-s3-protection\/issues\/new\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"btn btn-default\"> <i class=\"fas fa-bug\"><\/i> Report an issue or feature request<br \/>\n<\/a>\n<\/p>\n<p>Built with <i class=\"far fa-heart\"><\/i> by Trend Micro<\/p>\n<hr>\n<p>Before we dive in, let\u2019s go through a refresher on the core concepts explored in this workshop \u261d\ufe0f<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/j\/workshop-aws-s3-bucket-malware-scanning.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this workshop, you will learn how to scan your objects that are being uploaded to Amazon S3 buckets for malware and integrate into your custom workflows, by automating with your current resources, directly in your AWS environment. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43575,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9505,9501,9617,9571],"class_list":["post-43574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-aws","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-file-storage-security","tag-trend-micro-devops-how-to"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Workshop: AWS S3 Bucket for Malware Scanning 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workshop: AWS S3 Bucket for Malware Scanning 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png\" \/>\n\t<meta property=\"og:image:width\" content=\"258\" \/>\n\t<meta property=\"og:image:height\" content=\"89\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Workshop: AWS S3 Bucket for Malware Scanning\",\"datePublished\":\"2021-10-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\"},\"wordCount\":467,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png\",\"keywords\":[\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : File Storage Security\",\"Trend Micro DevOps : How To\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\",\"name\":\"Workshop: AWS S3 Bucket for Malware Scanning 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png\",\"datePublished\":\"2021-10-22T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png\",\"width\":258,\"height\":89},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : AWS\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-aws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Workshop: AWS S3 Bucket for Malware Scanning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workshop: AWS S3 Bucket for Malware Scanning 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/","og_locale":"en_US","og_type":"article","og_title":"Workshop: AWS S3 Bucket for Malware Scanning 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-22T00:00:00+00:00","og_image":[{"width":258,"height":89,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Workshop: AWS S3 Bucket for Malware Scanning","datePublished":"2021-10-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/"},"wordCount":467,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png","keywords":["Trend Micro DevOps : AWS","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : File Storage Security","Trend Micro DevOps : How To"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/","url":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/","name":"Workshop: AWS S3 Bucket for Malware Scanning 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png","datePublished":"2021-10-22T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/workshop-aws-s3-bucket-for-malware-scanning.png","width":258,"height":89},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/workshop-aws-s3-bucket-for-malware-scanning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : AWS","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-aws\/"},{"@type":"ListItem","position":3,"name":"Workshop: AWS S3 Bucket for Malware Scanning"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43574"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43574\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43575"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}