{"id":44844,"date":"2022-01-13T18:00:00","date_gmt":"2022-01-13T18:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes-"},"modified":"2022-01-13T18:00:00","modified_gmt":"2022-01-13T18:00:00","slug":"how-cybercriminals-are-cashing-in-on-the-culture-of-yes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/","title":{"rendered":"How Cybercriminals Are Cashing in on the Culture of &#8216;Yes&#8217;"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span>It&#8217;s hard to say no. To friends asking you to help you move with their truck next weekend, to a second helping of Grandma&#8217;s pumpkin pie, and <\/span><em>especially<\/em><span> to that pop-up window that asks for your personal data online. We&#8217;re wired to always respond with &#8220;yes.&#8221;<\/span><\/p>\n<p><span>And the reason for this behavior is fairly straightforward: The carrot is always more apparent (and attractive) than the stick. Whether it&#8217;s for access to the latest celebrity gossip, updates on local news, or acquiring the latest &#8220;toy of the year&#8221; for your children, the reward is always front of mind. The potential harm of giving out an email or a phone number doesn&#8217;t immediately reveal itself.<\/span><\/p>\n<p><strong>Casualities of the Culture of Yes<\/strong><br \/><span>This default &#8220;yes&#8221; has long been exploited by threat actors. Some attacks cast a wide net to entice everyone, such as the recent <\/span><a href=\"https:\/\/www.darkreading.com\/application-security\/sneaky-android-trojan-siphons-millions-using-premium-sms\" target=\"_blank\" rel=\"noopener\"><span>GriftHorse<\/span><\/a><span> <\/span><span>malware that infected over 10 million Android phones. Notifications promised special offers in exchange for the user&#8217;s phone number, which the scammer then used to surreptitiously sign up the user for a $35-per-month service.<\/span><\/p>\n<p><span>Other malicious action might target specific, powerful individuals, an approach often favored by nation-states. In this approach, phishing emails may promise access to resources or webinars in exchange for emails and passwords. This tactic has been used in several recent hacking efforts associated with Russia and Iran.<\/span><\/p>\n<p><span>And while it may seem isolated to the consumer realm, the issue is affecting enterprises as well. A recent survey showed that <\/span><a href=\"https:\/\/www.sailpoint.com\/press-releases\/new-sailpoint-survey-exposes-concerning-generational-differences-regarding-corporate-email-use-and-cybersecurity-posture\/\" target=\"_blank\" rel=\"noopener\"><span>59% of workers<\/span><\/a><span> are using corporate emails for personal use, opening them up to phishing attacks looking for someone to say yes. A full 46% of Gen Z survey participants would open up the link or attachment in a suspected phishing email, potentially providing a banner day for the authors of the malicious email.<\/span><\/p>\n<p><strong>Continued Reinforcement of the Yes<\/strong><br \/><span>Our culture is also reinforcing the culture of yes through new technology and usage patterns. For example, the rise in &#8220;touchless experiences&#8221; during the pandemic has given new life to QR codes \u2014 if you see it, you scan it. QR codes rely upon the default yes that we&#8217;ve all grown accustomed to. These visual bookmarks, while useful, subject people to the same risks as the GriftHorse campaign: The browser is sent to an unknown, potentially malicious site.<\/span><\/p>\n<p><span>While consumers are learning to be wary of unknown sites and applications, QR codes without guardrails open them back up to potentially dangerous locations and code that seeks to do them harm or can secretly log their location by essentially &#8220;checking them in&#8221; at a particular place and time via device fingerprinting.<\/span><\/p>\n<p><span>This culture of yes, then, presents real dangers to both our privacy and security. But the answer to this moment \u2014 this world in which the default response is yes \u2014 is not to become completely cynical about the world and everyone in it. We must resist the temptation to flip to the other extreme, a default &#8220;no.&#8221; Instead, it&#8217;s more of a reset in our thinking \u2014 an attempt to find balance between extremes as we interact in the digital world.<\/span><\/p>\n<p><strong>How to Find Balance (and Security) for Your Organization<\/strong><br \/><span>Shifting from a culture of yes to a more thoughtful, balanced perspective requires three things: technology, training, and commitment.<\/span><\/p>\n<p><span>First, technology must be used to inform and modify behavior; thoughtful choices then become easier for people than just saying &#8220;yes.&#8221; To combat phishing, for example, clear identification of external emails can help users identify suspicious content. Along with clear identification of risk, phish reporting buttons should be prominent in the interface so that it&#8217;s obvious what to do with suspect email. Doing the legwork for the user funnels them into making good choices. These measures can be enhanced with technology that should be table stakes for organizations already: browser isolation, endpoint detection and response, and the like.<\/span><\/p>\n<p><span>Second, once the technology is in place, we must train our people how to use them effectively. Part of this is informative videos or seminars, but also having a feedback loop such as a Slack channel for informal advice is helpful \u2014 this builds the community awareness and builds rapport between the security team and the rest of the organization. Conducting regular phishing tests will also reinforce good habits and provide qualitative analysis for how culture change is progressing.<\/span><\/p>\n<p><span>Finally, stay committed to your progress. If tactics are switched up too frequently, or if the culture change is not supported fully by leadership, any shift in thinking will likely cause users to revert back to the previous pattern of always saying yes to everything.<\/span><\/p>\n<p><span>Rather than extremes, a thoughtful balance is essential if we are to ensure that our culture is served by our technology. The alternative is to sacrifice our privacy and security in our race to always say &#8220;yes.&#8221;<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes-\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The reward is always front of mind, while the potential harm of giving out a phone number doesn&#8217;t immediately reveal itself.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes-\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44844","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Cybercriminals Are Cashing in on the Culture of &#039;Yes&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Cybercriminals Are Cashing in on the Culture of &#039;Yes&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-13T18:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Cybercriminals Are Cashing in on the Culture of &#8216;Yes&#8217;\",\"datePublished\":\"2022-01-13T18:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\"},\"wordCount\":818,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\",\"name\":\"How Cybercriminals Are Cashing in on the Culture of 'Yes' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg\",\"datePublished\":\"2022-01-13T18:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Cybercriminals Are Cashing in on the Culture of &#8216;Yes&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Cybercriminals Are Cashing in on the Culture of 'Yes' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/","og_locale":"en_US","og_type":"article","og_title":"How Cybercriminals Are Cashing in on the Culture of 'Yes' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-13T18:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Cybercriminals Are Cashing in on the Culture of &#8216;Yes&#8217;","datePublished":"2022-01-13T18:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/"},"wordCount":818,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/","url":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/","name":"How Cybercriminals Are Cashing in on the Culture of 'Yes' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg","datePublished":"2022-01-13T18:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15bbcdf6e3675ee8\/61db4ee1e25675203f22d51f\/Yes_Stepan_Popov_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-cybercriminals-are-cashing-in-on-the-culture-of-yes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How Cybercriminals Are Cashing in on the Culture of &#8216;Yes&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44844"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44844\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}