{"id":43886,"date":"2021-11-12T22:55:03","date_gmt":"2021-11-12T22:55:03","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks"},"modified":"2021-11-12T22:55:03","modified_gmt":"2021-11-12T22:55:03","slug":"bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/","title":{"rendered":"BT to Deploy &#8216;Epidemiological AI&#8217; Based on the Spread of Viruses in Humans to Combat Cyberattacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>BT today announced that it has developed an epidemiology-based cybersecurity prototype, \u201cInflame\u201d, which uses deep reinforcement learning to enable enterprises to automatically detect and respond to cyber-attacks before they compromise a network. Using the spread of viruses in human populations as a model to inform its AI, Inflame is a key component in BT\u2019s recently-announced Eagle-i platform.<\/p>\n<p>Epidemiological modelling is typically associated with the spread of viruses and diseases amongst human populations, and has been critical in analysing and managing the spread of COVID-19 over the past 20 months. Using the same principals of epidemiology, BT\u2019s Inflame solution has been developed to understand how computer viruses and cyber-attacks spread across enterprise networks, and how to prevent them from happening.<\/p>\n<p>To develop the technology, security researchers at the BT Labs in Suffolk, UK, built models of enterprise networks which were used to test numerous scenarios based on differing R rates<a href=\"https:\/\/newsroom.bt.com\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyber-attacks\/#_ftn1\" id=\"_ftnref1\">[1]<\/a> of cyber-infection. This testing enabled the research team to understand how these threats can penetrate and compromise a network, and develop optimal automated responses needed to contain and prevent the spread of viruses across them.<\/p>\n<p>The deep reinforcement training and learning undertaken in the development of Inflame means the solution can automatically model and respond to a detected threat within an enterprise network. These responses are also underpinned by \u2018attack lifecycle\u2019 modelling, which assesses real-time security alerts against established patterns to understand the current stage of an ongoing cyber-attack. This insight is used to predict the next stages of an attack and rapidly identify the best response to prevent it from progressing any further.<\/p>\n<p>BT recently announced its transformational cyber defence platform \u2018<a href=\"http:\/\/www.bt.com\/look-again\">Eagle-i&#8217;<\/a>, which uses AI to provide real-time detection of issues and intelligent automated responses. The platform has been designed to self-learn from the intelligence provided by each intervention, so that it constantly improves its threat knowledge and dynamically refines how it protects other users going forward.<\/p>\n<p>\u201cWe know the risk of cyber-attack is higher than ever and has intensified significantly during the pandemic. Enterprises now need to look to new cybersecurity solutions that can understand the risk and consequence of an attack, and quickly respond before it\u2019s too late,\u201d said Howard Watson, Chief Technology Officer, BT. \u201cEpidemiological testing has played a vital role in curbing the spread of infection during the pandemic, and Inflame uses the same principles to understand how current and future digital viruses spread through networks. Inflame will play a key role in how BT\u2019s Eagle-i platform automatically predicts and identifies cyber-attacks before they impact, protecting customers\u2019 operations and reputation.\u201d<\/p>\n<p><a href=\"https:\/\/newsroom.bt.com\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyber-attacks\/#_ftnref1\" id=\"_ftn1\">[1]<\/a> In epidemiology, the R number is used to quantify the spread of infectious diseases in a population<\/p>\n<p><strong>Contacts<\/strong><\/p>\n<p>Mike Witts, Head of Technology Communications, BT<\/p>\n<p>+44 (0)7795986120<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"4c21252729623b2538383f0c2e38622f2321\">[email&nbsp;protected]<\/a><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using the spread of viruses in human populations as a model to inform its AI, Inflame is a key component in BT\u2019s recently-announced Eagle-i platform.Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-43886","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BT to Deploy &#039;Epidemiological AI&#039; Based on the Spread of Viruses in Humans to Combat Cyberattacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BT to Deploy &#039;Epidemiological AI&#039; Based on the Spread of Viruses in Humans to Combat Cyberattacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-12T22:55:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"BT to Deploy &#8216;Epidemiological AI&#8217; Based on the Spread of Viruses in Humans to Combat Cyberattacks\",\"datePublished\":\"2021-11-12T22:55:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/\"},\"wordCount\":474,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/\",\"name\":\"BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2021-11-12T22:55:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BT to Deploy &#8216;Epidemiological AI&#8217; Based on the Spread of Viruses in Humans to Combat Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-12T22:55:03+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"BT to Deploy &#8216;Epidemiological AI&#8217; Based on the Spread of Viruses in Humans to Combat Cyberattacks","datePublished":"2021-11-12T22:55:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/"},"wordCount":474,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/","url":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/","name":"BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2021-11-12T22:55:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bt-to-deploy-epidemiological-ai-based-on-the-spread-of-viruses-in-humans-to-combat-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"BT to Deploy &#8216;Epidemiological AI&#8217; Based on the Spread of Viruses in Humans to Combat Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43886"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43886\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}