{"id":45428,"date":"2022-02-24T01:40:08","date_gmt":"2022-02-24T01:40:08","guid":{"rendered":"http:\/\/b5114b8f-9ffa-4886-8080-6477bb85743a"},"modified":"2022-02-24T01:40:08","modified_gmt":"2022-02-24T01:40:08","slug":"fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","title":{"rendered":"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon"},"content":{"rendered":"<p>Cybersecurity giant Fortinet found that <a href=\"https:\/\/www.zdnet.com\/article\/log4j-zero-day-flaw-what-you-need-to-know-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">Log4j<\/a> had nearly 50 times the activity volume compared to ProxyLogon based on peak 10-day average volume in the second half of 2021. The finding was part of the company&#8217;s&nbsp;<a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/report-q1-2022-threat-landscape.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">FortiGuard Labs Global Threat Landscape Report<\/a>&nbsp;released this week.&nbsp;<\/p>\n<p>The Fortinet report also spotlighted attacks on Linux systems, many of which come in the form of executable and linkable format (ELF) binaries.<\/p>\n<p>&#8220;The rate of new Linux malware signatures in Q4 quadrupled that of Q1 2021 with ELF variant Muhstik, RedXOR malware, and even Log4j being examples of threats targeting Linux. The prevalence of ELF and other Linux malware detections doubled during 2021,&#8221; the report explained.&nbsp;<\/p>\n<p>&#8220;This growth in variants and volume suggests that Linux malware is increasingly part of adversaries&#8217; arsenal.&#8221;<\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\" class=\"lazy\" alt=\"screen-shot-2022-02-23-at-8-33-03-pm.png\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/img\/resize\/296f9a4daa69f3eb8a8d99843af7fc25b851d8ea\/2022\/02\/24\/c33913f5-d50d-4682-9c86-0ef06c0f8024\/screen-shot-2022-02-23-at-8-33-03-pm.png?width=470&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/296f9a4daa69f3eb8a8d99843af7fc25b851d8ea\/2022\/02\/24\/c33913f5-d50d-4682-9c86-0ef06c0f8024\/screen-shot-2022-02-23-at-8-33-03-pm.png?width=470&amp;fit=bounds&amp;format=pjpg&amp;auto=webp\" class alt=\"screen-shot-2022-02-23-at-8-33-03-pm.png\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Fortinet <\/span><\/figcaption><\/figure>\n<p>Threat actors are also evolving their use of botnets beyond DDoS attacks. Instead of being &#8220;primarily monolithic,&#8221; Fortinet said botnets &#8220;are now multipurpose attack vehicles leveraging a variety of more sophisticated attack techniques, including ransomware.&#8221;&nbsp;<\/p>\n<p>&#8220;For example, threat actors, including operators of botnets like Mirai, integrated exploits for the Log4j vulnerability into their attack kits. Also, botnet activity was tracked associated with a new variant of the RedXOR malware, which targets Linux systems for data exfiltration. Detections of botnets delivering a variant of&nbsp;<a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/omicron-variant-lure-used-to-distribute-redline-stealer?utm_source=blog&amp;utm_campaign=RedLine\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">RedLine Stealer malware<\/a>&nbsp;also surged in early October morphing to find new targets using a COVID-themed file,&#8221; the report said.&nbsp;<\/p>\n<p>The report went into detail about how cyberattackers are maximizing attack vectors associated with remote work and learning. Fortinet saw an explosion in various forms of browser-based malware that appeared in the form of phishing lures as well as scripts that inject code or redirect users to malicious sites.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">more Log4j<\/span> <\/h3>\n<\/p><\/div>\n<p>The researchers split the distribution mechanisms into three broad categories: Microsoft Office executables (MSExcel\/, MSOffice\/), PDF files, and browser scripts (HTML\/, JS\/).<\/p>\n<p>&#8220;Such techniques continue to be a popular way for cybercriminals to exploit people&#8217;s desire for the latest news about the pandemic, politics, sports, or other headlines, and to then find entryways back to corporate networks. With hybrid work and learning remaining a reality, there are fewer layers of protection between malware and would-be victims,&#8221; Fortinet said.&nbsp;<\/p>\n<p>When it comes to ransomware Fortinet said it continues to see a mix of new and old ransomware strains used in attacks.<\/p>\n<p>FortiGuard Labs said it &#8220;observed a consistent level of malicious activity involving multiple ransomware strains, including new versions of Phobos, Yanluowang and BlackMatter.&#8221;&nbsp;<\/p>\n<p>Researchers with Fortinet noted that the Log4j vulnerabilities and others were one example of how quickly cybercriminals and nation states move in exploiting widespread flaws.&nbsp;<\/p>\n<p>Derek Manky, chief of security insights and global threat alliances at FortiGuard Labs, said new and evolving attack techniques span the entire kill chain but especially in the weaponization phase, showing an evolution to a more advanced persistent cybercrime strategy that is more destructive and unpredictable.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Fortinet report also spotlighted an increasing number of attacks on Linux systems.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45428","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fortinet: Log4j had nearly 50x activity volume of ProxyLogon 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-24T01:40:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon\",\"datePublished\":\"2022-02-24T01:40:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\"},\"wordCount\":504,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\",\"name\":\"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\",\"datePublished\":\"2022-02-24T01:40:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\",\"contentUrl\":\"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","og_locale":"en_US","og_type":"article","og_title":"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-24T01:40:08+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon","datePublished":"2022-02-24T01:40:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/"},"wordCount":504,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","url":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","name":"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","datePublished":"2022-02-24T01:40:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/","contentUrl":"https:\/\/www.zdnet.com\/article\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-log4j-had-nearly-50x-activity-volume-of-proxylogon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Fortinet: Log4j had nearly 50x activity volume of ProxyLogon"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45428"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45428\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}