{"id":47544,"date":"2022-07-15T18:13:26","date_gmt":"2022-07-15T18:13:26","guid":{"rendered":"https:\/\/www.darkreading.com\/edge-ask-the-experts\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday-"},"modified":"2022-07-15T18:13:26","modified_gmt":"2022-07-15T18:13:26","slug":"what-are-the-risks-of-employees-going-on-a-hybrid-holiday","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/","title":{"rendered":"What Are the Risks of Employees Going on a &#8216;Hybrid Holiday&#8217;?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"50.748229740362\">\n<p><em>Many employees are requesting a &#8220;hybrid holiday&#8221; \u2014 where longer holidays are booked with the intention of spending time working remotely from the travel destination. In a <a href=\"https:\/\/news.virginmediao2.co.uk\/a-desk-in-the-sun-brits-embrace-the-hybrid-holiday-this-half-term\/\" target=\"_blank\" rel=\"noopener\">Virgin Media O2 survey from earlier this year<\/a>, 76% of workers polled said they were considering adding remote-work days around their annual leave to extend their time away.<\/em><\/p>\n<p><strong>Question: What are the risks of employees going on a hybrid holiday?<\/strong><\/p>\n<p><strong>John Ayers, Interim CISO and Vice President of Product, Advanced Detection, &amp; Response at Optiv:<\/strong> Threat actors are like any other criminals \u2014 they do reconnaissance, and social media has become the best recon tool in the trade craft. With employees now looking to combine work with holiday plans, this has only increased the security risks for users and their companies.<\/p>\n<p>Let&#8217;s take an example of going overseas to Rome. It&#8217;s a nice place to visit, but you also need to work. First, Internet is not a &#8220;like for like,&#8221; meaning the type of access you would have there is not like yours at home. Yes, we all have been led to believe <a href=\"https:\/\/www.darkreading.com\/edge-articles\/be-flexible-on-where-people-work-but-not-on-data-privacy\" target=\"_blank\" rel=\"noopener\">coffee shop and hotel Wi-Fi<\/a> is OK to use since COVID \u2014 but it is not.<\/p>\n<p>Second, not all locations are friendly. Most companies should be deploying, or have already deployed, geo-blocking in order to prevent employees from connecting in countries or locations with high risk or out of the US. Geo-blocking is a great tool to prevent and deny all access from a region. Most CISOs today need to protect access to data, which means denying access from devices based on location. They are trying to prevent MitM (<a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-to-protect-your-phone-from-pegasus-and-other-apts\" target=\"_blank\" rel=\"noopener\">man-in-the-middle attack<\/a>). Why is that important? MitM employs someone setting up an access point that might not be what you think it is.<\/p>\n<p>Each time you fire up the laptop or mobile device and log into Amazon or your work email, you are practicing what we call &#8220;data in motion&#8221; using the rogue Wi-Fi connection, which is now collecting all that data.<\/p>\n<p>The risks here are:<\/p>\n<ul>\n<li><strong>Location.<\/strong> You now are advertising where you are.<\/li>\n<li><strong>Browsing history.<\/strong><\/li>\n<li><strong>Purchasing.<\/strong> Yes, the credit card you used was just compromised. How do you avoid that? Tether your device and get an Internet plan with a secure option. I have used <a href=\"https:\/\/protect-us.mimecast.com\/s\/oEk7CQWNOwhXplDvJhxy6aP?domain=travelwifi.com\/\" target=\"_blank\" rel=\"noopener\">TEP Wireless<\/a> because it grants me access wherever I go using an always-on VPN. Check with your company about traveling \u2014 especially out of the country.<\/li>\n<\/ul>\n<p>So, the next time you try to take vacation and look to access your company&#8217;s email and OneDrive, remember this: Using public&nbsp;Wi-Fi is like buying sushi at a gas station \u2014 you never know how sick you will get until you consume it.<\/p>\n<\/div>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/edge-ask-the-experts\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday-\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more employees plan on taking longer holidays and working remotely from the destination for part of that time, organizations have to consider the risks. Like Wi-Fi networks.Read More <a href=\"https:\/\/www.darkreading.com\/edge-ask-the-experts\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday-\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47544","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Are the Risks of Employees Going on a &#039;Hybrid Holiday&#039;? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are the Risks of Employees Going on a &#039;Hybrid Holiday&#039;? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-15T18:13:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What Are the Risks of Employees Going on a &#8216;Hybrid Holiday&#8217;?\",\"datePublished\":\"2022-07-15T18:13:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/\"},\"wordCount\":457,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt02719702bb9974ad\\\/62d18379ab34777c22aa5c2e\\\/vacation-anastasia-nelen-unsplash.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/\",\"name\":\"What Are the Risks of Employees Going on a 'Hybrid Holiday'? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt02719702bb9974ad\\\/62d18379ab34777c22aa5c2e\\\/vacation-anastasia-nelen-unsplash.jpg\",\"datePublished\":\"2022-07-15T18:13:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt02719702bb9974ad\\\/62d18379ab34777c22aa5c2e\\\/vacation-anastasia-nelen-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt02719702bb9974ad\\\/62d18379ab34777c22aa5c2e\\\/vacation-anastasia-nelen-unsplash.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Are the Risks of Employees Going on a &#8216;Hybrid Holiday&#8217;?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are the Risks of Employees Going on a 'Hybrid Holiday'? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/","og_locale":"en_US","og_type":"article","og_title":"What Are the Risks of Employees Going on a 'Hybrid Holiday'? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-15T18:13:26+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What Are the Risks of Employees Going on a &#8216;Hybrid Holiday&#8217;?","datePublished":"2022-07-15T18:13:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/"},"wordCount":457,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/","url":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/","name":"What Are the Risks of Employees Going on a 'Hybrid Holiday'? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg","datePublished":"2022-07-15T18:13:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt02719702bb9974ad\/62d18379ab34777c22aa5c2e\/vacation-anastasia-nelen-unsplash.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-are-the-risks-of-employees-going-on-a-hybrid-holiday\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"What Are the Risks of Employees Going on a &#8216;Hybrid Holiday&#8217;?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47544"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47544\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}