{"id":47406,"date":"2022-07-06T20:36:59","date_gmt":"2022-07-06T20:36:59","guid":{"rendered":"http:\/\/9c0fd5dc-dc3d-4ce4-908e-3e1ecb1a5fe8"},"modified":"2022-07-06T20:36:59","modified_gmt":"2022-07-06T20:36:59","slug":"apple-previews-lockdown-mode-a-new-extreme-security-feature","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","title":{"rendered":"Apple previews &#8220;Lockdown Mode,&#8221; a new extreme security feature"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/\" alt=\"apple-lockdown-mode-update-2022-hero-inline-jpg-large-2x\" height=\"1679.632465543645\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Apple<\/span><\/figcaption><\/figure>\n<p>Apple on Wednesday <a href=\"https:\/\/www.apple.com\/newsroom\/2022\/07\/apple-expands-commitment-to-protect-users-from-mercenary-spyware\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">shared details<\/a> of a new, extreme security option called &#8220;Lockdown Mode&#8221; for Apple device users who face serious, sophisticated digital threats.&nbsp;<\/p>\n<p>Lockdown Mode will be available this fall with <a href=\"https:\/\/www.zdnet.com\/article\/how-to-install-the-ios-16-developer-beta-and-why-you-should-wait\/\" rel=\"follow\">iOS 16<\/a>, iPadOS 16 and macOS Ventura. The new feature is designed for the few users &#8212; such as journalists, activists or government officials &#8212; who may be targets of NSO Group or other private companies developing state-sponsored mercenary spyware.&nbsp;<\/p>\n<p>Turning on Lockdown Mode hardens defenses on your device and strictly limits certain functionalities, reducing the ways your device could be exploited by cyberattacks. When it launches, the feature will offer the following protections:&nbsp;<\/p>\n<ul>\n<li>Messages: Most message attachment types other than images are blocked. Some features, like link previews, are disabled.&nbsp; <\/li>\n<li>Web browsing: Certain complex web technologies, like just-in-time (JIT) JavaScript compilation, are disabled unless the user excludes a trusted site from Lockdown Mode. <\/li>\n<li>Apple services: Incoming invitations and service requests, including FaceTime calls, are blocked if the user has not previously sent the initiator a call or request. <\/li>\n<li>Wired connections with a computer or accessory are blocked when iPhone is locked. <\/li>\n<li>Configuration profiles cannot be installed, and the device cannot enroll into mobile device management (MDM), while Lockdown Mode is turned on.<\/li>\n<\/ul>\n<p>Ivan Krsti\u0107, Apple&#8217;s head of Security Engineering and Architecture, called Lockdown Mode &#8220;a groundbreaking capability.&#8221;&nbsp;<\/p>\n<p>&#8220;While the vast majority of users will never be the victims of highly targeted cyberattacks, we will work tirelessly to protect the small number of users who are,&#8221; Krsti\u0107 said in a statement. &#8220;That includes continuing to design defenses specifically for these users, as well as supporting researchers and organizations around the world doing critically important work in exposing mercenary companies that create these digital attacks.&#8221;&nbsp;<\/p>\n<p>To improve the feature over time, Apple has established a new category within the Apple Security Bounty program to reward researchers who find Lockdown Mode bypasses. Bounties are doubled for qualifying findings in Lockdown Mode, up to a maximum of $2 million.&nbsp;<\/p>\n<p>Back in November, Apple<a href=\"https:\/\/www.zdnet.com\/article\/google-details-commercial-spyware-that-targets-both-android-and-ios-devices\/\" rel=\"follow\"> filed a lawsuit<\/a> against<a href=\"https:\/\/www.zdnet.com\/article\/nso-groups-pegasus-spyware-used-against-journalists-political-activists-worldwide-report\/\" rel=\"follow\"> NSO Group<\/a> and its parent company, seeking a permanent injunction banning NSO Group from using any Apple software, services, or devices. The complaint provided information on how NSO Group infected victims&#8217; Apple devices with its Pegasus spyware. At the time, Apple also said it would donate Apple $10 million, as well as any damages from the lawsuit, to organizations working on cybersurveillance research and advocacy.<\/p>\n<p>On Wednesday, the company said it would make the donation to the<a href=\"https:\/\/www.fordfoundation.org\/work\/our-grants\/about-the-dignity-and-justice-fund\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"> Dignity and Justice Fund<\/a>, a private foundation established and advised by the Ford Foundation dedicated to advancing equity worldwide. With the donation, the Dignity and Justice Fund will offer grants this year and next to initiatives that help expose mercenary spyware and protect potential targets. <\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lockdown Mode is designed for users, such as journalists or activists, who face serious digital threats from NSO Group or other private companies developing state-sponsored mercenary spyware.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47406","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple previews &quot;Lockdown Mode,&quot; a new extreme security feature 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple previews &quot;Lockdown Mode,&quot; a new extreme security feature 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-06T20:36:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple previews &#8220;Lockdown Mode,&#8221; a new extreme security feature\",\"datePublished\":\"2022-07-06T20:36:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\"},\"wordCount\":475,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\",\"name\":\"Apple previews \\\"Lockdown Mode,\\\" a new extreme security feature 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\",\"datePublished\":\"2022-07-06T20:36:59+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-previews-lockdown-mode-a-new-extreme-security-feature\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple previews &#8220;Lockdown Mode,&#8221; a new extreme security feature\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple previews \"Lockdown Mode,\" a new extreme security feature 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","og_locale":"en_US","og_type":"article","og_title":"Apple previews \"Lockdown Mode,\" a new extreme security feature 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-06T20:36:59+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple previews &#8220;Lockdown Mode,&#8221; a new extreme security feature","datePublished":"2022-07-06T20:36:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/"},"wordCount":475,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","url":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","name":"Apple previews \"Lockdown Mode,\" a new extreme security feature 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","datePublished":"2022-07-06T20:36:59+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/","contentUrl":"https:\/\/www.zdnet.com\/article\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-previews-lockdown-mode-a-new-extreme-security-feature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple previews &#8220;Lockdown Mode,&#8221; a new extreme security feature"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47406"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47406\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}