{"id":44864,"date":"2022-01-18T05:34:49","date_gmt":"2022-01-18T05:34:49","guid":{"rendered":"http:\/\/d8e60189-6491-48cd-aa6e-8b6ccc75b126"},"modified":"2022-01-18T05:34:49","modified_gmt":"2022-01-18T05:34:49","slug":"nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/","title":{"rendered":"NSW will not use iVote again for elections until &#8216;extensive reconfiguration&#8217; is made"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>The NSW Electoral Commission (NSWEC) has announced it will not use the iVote system again until &#8220;extensive reconfiguration and testing&#8221; is undertaken.<\/p>\n<p>During local elections last month, an unknown number of voters <a href=\"https:\/\/www.zdnet.com\/article\/no-surprise-nsw-ivote-fails-during-local-council-elections\/\">were unable to cast a vote<\/a> due to the state&#8217;s iVote online voting system suffering a failure for a portion of the voting period. In the immediate aftermath, the NSWEC attributed the iVote online voting system failure to a higher-than-expected elector load, with around 650,000 people using the system during the local elections last month.<\/p>\n<p>&#8220;Almost triple the number of voters have used iVote at these elections than any previous election,&#8221; NSWEC said at the time.<\/p>\n<p>Just before the year wrapped up, the state&#8217;s electoral commissioner revealed the iVote system failure during the state&#8217;s local elections last month <a href=\"https:\/\/www.zdnet.com\/article\/nswec-finds-ivote-system-failure-may-have-impacted-three-local-election-outcomes\/\">may have materially impacted councillor elections<\/a> in Kempsey, Singleton, and the City of Shellharbour.&nbsp; <\/p>\n<p>Providing another update yesterday, the electoral commissioner John Schmidt said the iVote system would not be used until the issues experienced last month were rectified. The NSWEC said it was still undertaking a comprehensive review and analysis of the root cause of the problem that surfaced on the iVote system.<\/p>\n<p>Schmidt explained that there is currently no backup support available to enable iVote to be offered at state or local government by-elections in the near future, and that the NSWEC would focus on preparing the system for use at the 2023 state general election.&nbsp; <\/p>\n<p>The electoral commissioner also said he was still going ahead with seeking a court declaration about the validity of the results in three councillor elections. The election declaration, if approved, would mean the currently elected councillors for the impacted councils would serve in the interim. <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>The declaration will not be a determination that these three elections are valid more generally, however, the NSWEC previously noted.<\/p>\n<p>&#8220;Finalising the Supreme Court proceedings, completing the iVote system review, and implementing any remediations and improvements, are critical to ensuring the problems that occurred at the December local government elections do not occur again,&#8221; the NSWEC said.<\/p>\n<p>&#8220;In light of the above, the Electoral Commissioner is of the view that it is neither feasible nor appropriate to approve the use of iVote again until those actions are completed.&#8221;<\/p>\n<p>Dr Vanessa Teague, a cryptographer with a particular interest in privacy and election security, has repeatedly warned of the flaws within the iVote system.<\/p>\n<p>&#8220;Every serious investigation of iVote found serious problems,&#8221;&nbsp;<a href=\"https:\/\/threadreaderapp.com\/thread\/1467075347170541571.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Teague tweeted<\/a>&nbsp;last month in light of the most recent iVote failure.<\/p>\n<p>Starting in&nbsp;<a href=\"https:\/\/arxiv.org\/abs\/1504.05646\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">2015<\/a>, she and her colleagues found&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/flaws-found-in-nsw-ivote-system-yet-again\/\">numerous flaws in iVote<\/a>, problems that NSWEC have often&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/nsw-electoral-commission-claims-it-is-safe-from-second-swissvote-flaw\/\">downplayed<\/a>.&nbsp;<\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/nsw-will-not-use-ivote-system-for-elections-until-extensive-reconfiguration-is-made\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSWEC has sent iVote to the bench as it works to rectify the system&#8217;s issues by next year&#8217;s state general election.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44864","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSW will not use iVote again for elections until &#039;extensive reconfiguration&#039; is made 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSW will not use iVote again for elections until &#039;extensive reconfiguration&#039; is made 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-18T05:34:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSW will not use iVote again for elections until &#8216;extensive reconfiguration&#8217; is made\",\"datePublished\":\"2022-01-18T05:34:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\"},\"wordCount\":459,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\",\"name\":\"NSW will not use iVote again for elections until 'extensive reconfiguration' is made 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-01-18T05:34:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSW will not use iVote again for elections until &#8216;extensive reconfiguration&#8217; is made\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSW will not use iVote again for elections until 'extensive reconfiguration' is made 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/","og_locale":"en_US","og_type":"article","og_title":"NSW will not use iVote again for elections until 'extensive reconfiguration' is made 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-18T05:34:49+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSW will not use iVote again for elections until &#8216;extensive reconfiguration&#8217; is made","datePublished":"2022-01-18T05:34:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/"},"wordCount":459,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/","url":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/","name":"NSW will not use iVote again for elections until 'extensive reconfiguration' is made 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-01-18T05:34:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/7e7d8f9a61272e0ec87d9c8fd6e5273977309609\/2021\/05\/12\/2db1a99a-b95f-4f4e-b41e-f0dc6337440a\/voting-australia.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nsw-will-not-use-ivote-again-for-elections-until-extensive-reconfiguration-is-made\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"NSW will not use iVote again for elections until &#8216;extensive reconfiguration&#8217; is made"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44864"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44864\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}