{"id":45814,"date":"2022-03-21T22:13:08","date_gmt":"2022-03-21T22:13:08","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell"},"modified":"2022-03-21T22:13:08","modified_gmt":"2022-03-21T22:13:08","slug":"binarly-coordinates-patches-for-3-firmware-flaws-with-dell","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/","title":{"rendered":"Binarly Coordinates Patches for 3 Firmware Flaws With Dell"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"49.42502299908\">\n<p>Firmware security company Binarly has discovered three new arbitrary code execution vulnerabilities in the System Management Mode components on Dell devices. All three memory corruption flaws in Dell BIOS have been assigned &#8220;high&#8221; severity ratings and a score of 8.2 on the Common Vulnerability Score System (CVSS).<\/p>\n<p>Running SMM bypasses built-in protections against modifications, which means attackers could potentially install firmware backdoors into the BIOS. The security issues, if exploited, could also be used to bypass the controls in the Unified Extensible Firmware Interface (UEFI) firmware ecosystem (the software interface between the system&#8217;s operating system and platform firmware) such as Secure Boot and memory isolating for hypervisors.<\/p>\n<p>According to Binarly, exploitation can allow a locally authenticated user to elevate privileges and execute arbitrary code in SMM to install modified firmware or backdoors. Once the firmware has been modified, detecting and removing the malicious code becomes more difficult, Binarly notes.<\/p>\n<p>Affected devices include Dell Edge Gateway 3000 and Dell Inspiron 15 Gaming 7567, Binarly says. <a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-us\/000197057\/dsa-2022-053\" target=\"_blank\" rel=\"noopener\">Dell has updated the BIOS <\/a>to address the issues (CVE-2022-24420, CVE-2022-24421, CVE-2022-24419), and organizations are encouraged to download and update &#8220;at the earliest opportunity.&#8221;<\/p>\n<p>The latest vulnerability announcement comes just a month after Binarly&#8217;s security research team managed the coordinated disclosure of 16 high severity vulnerabilities in HP devices and 23 issues impacting major enterprise vendors.<\/p>\n<p>Binarly refers to all these vulnerabilities as &#8220;repeatable failures&#8221; because of the lack of input sanitization and insecure coding practices. The complexity of the codebase and the widespread adoption makes it difficult to completely address the issues as they are found. The complexity of the firmware supply chain leads to &#8220;an almost infinite source of vulnerabilities,&#8221; Binarly says in its blog post discussing the latest flaws.<\/p>\n<p>&#8220;In many cases, the same vulnerability can be fixed over multiple iterations, and still, the complexity of the attack surface leaves open gaps for malicious exploitation,&#8221; Binarly says.<\/p>\n<\/div>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45814","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Binarly Coordinates Patches for 3 Firmware Flaws With Dell 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Binarly Coordinates Patches for 3 Firmware Flaws With Dell 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-21T22:13:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Binarly Coordinates Patches for 3 Firmware Flaws With Dell\",\"datePublished\":\"2022-03-21T22:13:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/\"},\"wordCount\":324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc7d6a3977fce068d\\\/60e39aacb63a024abacb1bb2\\\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/\",\"name\":\"Binarly Coordinates Patches for 3 Firmware Flaws With Dell 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc7d6a3977fce068d\\\/60e39aacb63a024abacb1bb2\\\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg\",\"datePublished\":\"2022-03-21T22:13:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc7d6a3977fce068d\\\/60e39aacb63a024abacb1bb2\\\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc7d6a3977fce068d\\\/60e39aacb63a024abacb1bb2\\\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Binarly Coordinates Patches for 3 Firmware Flaws With Dell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Binarly Coordinates Patches for 3 Firmware Flaws With Dell 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/","og_locale":"en_US","og_type":"article","og_title":"Binarly Coordinates Patches for 3 Firmware Flaws With Dell 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-21T22:13:08+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Binarly Coordinates Patches for 3 Firmware Flaws With Dell","datePublished":"2022-03-21T22:13:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/"},"wordCount":324,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/","url":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/","name":"Binarly Coordinates Patches for 3 Firmware Flaws With Dell 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg","datePublished":"2022-03-21T22:13:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc7d6a3977fce068d\/60e39aacb63a024abacb1bb2\/computerchip-Edelweiss-AdobeStock_51480075-CP.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/binarly-coordinates-patches-for-3-firmware-flaws-with-dell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Binarly Coordinates Patches for 3 Firmware Flaws With Dell"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45814"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45814\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}