{"id":44537,"date":"2021-12-22T10:28:00","date_gmt":"2021-12-22T10:28:00","guid":{"rendered":"http:\/\/425e6323-5ca3-41b7-865e-a97af8729ad4"},"modified":"2021-12-22T10:28:00","modified_gmt":"2021-12-22T10:28:00","slug":"this-ransomware-strain-just-started-targeting-lots-more-businesses","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/","title":{"rendered":"This ransomware strain just started targeting lots more businesses"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>The relatively new Pysa ransomware was the dominant strain behind file-encrypting attacks in November and saw a 400% rise in attacks on government organizations, according to an analysis by security company NCC Group.&nbsp;<\/p>\n<p>Pysa is one of the ransomware gangs utilizing double extortion to pressure victims to pay an extortion demand and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-experts-question-massive-pysamespinoza-victim-dump\/\">dumped leaks from 50 previously compromised organizations last month<\/a>. Overall in November, the number of Pysa attacks increased 50%, which means it overtook Conti to the join Lockbit in the top two the most common versions of the malware. Conti and Lockbit were the dominant strains since August, <a href=\"https:\/\/newsroom.nccgroup.com\/news\/ncc-group-monthly-threat-pulse-november-2021-439934\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">according to NCC Group<\/a>.&nbsp;<\/p>\n<p>Inexplicably, the Pysa leaks data from targets weeks or months after attempting to extort them. The large-scale data dump followed joint US and EU law enforcement action against <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-suspected-revil-ransomware-affiliates-arrested\/\" target=\"_blank\" rel=\"noopener\">some members of the REvil ransomware gang<\/a>, which were <a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" target=\"_blank\" rel=\"noopener\">behind the attack on IT vendor Kaseya<\/a>.&nbsp; &nbsp; &nbsp;<\/p>\n<p>Also known as Mespinoza, the Pysa gang <a href=\"https:\/\/www.zdnet.com\/article\/this-ransomware-gang-hunts-for-evidence-of-crime-to-pressure-victims-into-paying-a-ransom\/\">seeks out evidence of crime among targets<\/a> to use as leverage during typically multi-million dollar extortion negotiations.&nbsp;<\/p>\n<p>The FBI started tracking Pysa activity in March 2020 in ransomware attacks against government, institutions, private, and healthcare sectors. The group often employs phishing techniques for credentials to compromise Remote Desktop Protocol (RDP) connections.&nbsp;<\/p>\n<p>Pysa targets high-value finance, government and healthcare organizations, notes NCC Group.&nbsp;<\/p>\n<p>Across all ransomware gangs, victims from North America reached 154 during the month, of which 140 were US organizations, while European victims numbered 96 in November. The industrials sector was the most targeted in November while attacks on the technology sector decreased 38%.&nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>NCC Group also spotlights a Russian-speaking ransomware gang called Everest Group that&#8217;s pushing new boundaries in double-extortion by not only threatening to leak files but providing their customers with access to victims IT infrastructure. Instead of pursuing a ransom, the group instead sold third-party access to the target&#8217;s network, creating a new way to monetize a compromised target. If it proves lucrative, this could become a trend next year, NCC Group warns.&nbsp;<\/p>\n<p>&#8220;In November, the group offered paid access to the IT infrastructure of their victims, as well as threatening to release stolen data if the victim refused to pay a ransom,&#8221; it notes.&nbsp;<\/p>\n<p>&#8220;While selling ransomware-as-a-service has seen a surge in popularity over the last year, this is a rare instance of a group forgoing a request for a ransom and offering access to IT infrastructure &#8212; but we may see copycat attacks in 2022 and beyond.&#8221;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gang typically targets finance, government and healthcare organisations.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44537","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This ransomware strain just started targeting lots more businesses 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This ransomware strain just started targeting lots more businesses 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-22T10:28:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This ransomware strain just started targeting lots more businesses\",\"datePublished\":\"2021-12-22T10:28:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/\"},\"wordCount\":425,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/\",\"name\":\"This ransomware strain just started targeting lots more businesses 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-12-22T10:28:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-ransomware-strain-just-started-targeting-lots-more-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This ransomware strain just started targeting lots more businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This ransomware strain just started targeting lots more businesses 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/","og_locale":"en_US","og_type":"article","og_title":"This ransomware strain just started targeting lots more businesses 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-22T10:28:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This ransomware strain just started targeting lots more businesses","datePublished":"2021-12-22T10:28:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/"},"wordCount":425,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/","url":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/","name":"This ransomware strain just started targeting lots more businesses 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-12-22T10:28:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-ransomware-strain-just-started-targeting-lots-more-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"This ransomware strain just started targeting lots more businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44537"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44537\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}