{"id":44615,"date":"2021-12-28T17:33:00","date_gmt":"2021-12-28T17:33:00","guid":{"rendered":"https:\/\/www.darkreading.com\/endpoint\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions"},"modified":"2021-12-28T17:33:00","modified_gmt":"2021-12-28T17:33:00","slug":"av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/","title":{"rendered":"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>INNSBRUCK, Austria, Dec. 28, 2021 \/PRNewswire\/ &#8212; The independent ISO-certified security testing lab AV-Comparatives has released its December 2021 Business Security Test Report and awarded an &#8220;Approved Business Product&#8221; accreditation to 19 antivirus solutions.<\/p>\n<p>The Business Security Test is the most comprehensive investigation of corporate endpoint security solutions on the market. To be named as an Approved Business Product, antivirus solutions must achieve a 90% score on the Malware Protection Test, with zero false alarms, and 90% in the Real-World Protection Test, with less than one hundred false alarms.<\/p>\n<p>To earn AV-Comparative&#8217;s certification, tested products must also be free of major performance issues, with an impact score below 40, and fix all reported bugs.<\/p>\n<p>The 19 solutions which were recognised with an Approved Business Product Award are: Acronis, Avast, Bitdefender, Cisco, CrowdStrike, Cybereason, Elastic, ESET, FireEye, Fortinet, G Data, K7, Kaspersky, Malwarebytes, Microsoft, Panda, Sophos, VIPRE and VMware.<\/p>\n<p>Peter Stelzhammer, Co-Founder of AV-Comparatives, said: &#8220;We congratulate the vendors whose products have qualified for an Approved Business Product Award. AV-Comparatives is fully independent and provides an unparalleled assessment of the antivirus products available on the market.&#8221;<\/p>\n<p>&#8220;In times of home offices and targeted attacks, protection against cyber crime is becoming increasingly important. Businesses looking for antivirus and endpoint security solutions should regard our test as a guide to the best products on the market. The threat landscape is constantly changing, so it is important to understand the performance of solutions that exist to keep organisations safe from external threats.&#8221;<\/p>\n<p>The latest Business Main-Test contains the results of the Business Real-World Protection Test conducted between August and November, as well as the Business Malware Protection Test in September, Business Performance Test from November. It also incorporates Product Reviews.<\/p>\n<p>Here are details of the AV-Comparatives tests:<\/p>\n<p><strong>Real-World Protection Test<\/strong>: This mimics online malware attacks that a typical business user might encounter when surfing the internet.<\/p>\n<p><strong>Malware Protection Test<\/strong>: This assessment considers a scenario in which the malware pre-exists on the disk or enters the test system via a local area network or removable device, rather than directly from the internet.<\/p>\n<p><strong>Performance Test<\/strong>: An examination of the impact each product has on the system&#8217;s performance, such as how much it slows down normal use of the PC while performing tasks.<\/p>\n<p>A False Positives Test is also conducted to discover if the product incorrectly identifies legitimate software as harmful.<\/p>\n<p>Each product that was involved in the test was also reviewed. Some are suitable for small businesses, whilst others are designed for large enterprises.<\/p>\n<p>Like all AV-Comparatives&#8217; public test reports, the Enterprise and Business Endpoint Security Report is available to everyone for free: <a href=\"https:\/\/www.av-comparatives.org\/tests\/business-security-test-2021-august-november\/#management-summary\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/www.av-comparatives.org\/tests\/business-security-test-2021-august-november\/#management-summary<\/a> <\/p>\n<p><strong>About AV-Comparatives<\/strong>: AV-Comparatives is an independent organisation offering systematic testing to examine the efficacy of security software products and mobile security solutions. Using one of the largest sample collection systems worldwide, it has created a real-world environment for truly accurate testing.<\/p>\n<p>AV-Comparatives offers freely accessible av-test results to individuals, news organisations and scientific institutions. Certification by AV-Comparatives provides a globally recognised official seal of approval for software performance.<\/p>\n<p><strong>Media Contact:<\/strong> <br \/>Peter Stelzhammer<br \/>phone: +43 720115542<br \/>e-mail: <a href=\"https:\/\/www.darkreading.com\/cdn-cgi\/l\/email-protection#630e06070a022302154e000c0e13021102170a1506104d0c1104\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"__cf_email__\" data-cfemail=\"442921202d2504253269272b2934253625302d3221376a2b3623\">[email&nbsp;protected]<\/span><\/a> <\/p>\n<p>SOURCE AV-Comparatives<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Business Security Test is a comprehensive investigation of corporate endpoint security solutions on the market.Read More <a href=\"https:\/\/www.darkreading.com\/endpoint\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44615","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-28T17:33:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions\",\"datePublished\":\"2021-12-28T17:33:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/\"},\"wordCount\":530,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/\",\"name\":\"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2021-12-28T17:33:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-28T17:33:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions","datePublished":"2021-12-28T17:33:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/"},"wordCount":530,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/","url":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/","name":"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2021-12-28T17:33:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/av-comparatives-reveals-results-of-long-term-tests-of-19-leading-endpoint-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44615"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44615\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}