{"id":47930,"date":"2022-08-11T14:00:00","date_gmt":"2022-08-11T14:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/iot\/the-time-is-now-for-iot-security-standards"},"modified":"2022-08-11T14:00:00","modified_gmt":"2022-08-11T14:00:00","slug":"the-time-is-now-for-iot-security-standards","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/","title":{"rendered":"The Time Is Now for IoT Security Standards"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The Internet of Things&nbsp;industry&#8217;s lack of cybersecurity standards is nothing new. We\u2019ve been at this for years. However, with the number of devices expected to surpass <a href=\"https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/\">2<\/a><a href=\"https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/\" target=\"_blank\" rel=\"noopener\">5.4 billion by 2030<\/a>, and given the recent increase in cyberattacks and threats, it\u2019s clear the situation has risen to crisis levels. <\/p>\n<p>This perfect storm of threats can be extinction-level events for organizations and have detrimental effects on natural resources, economies, governments, and much more. Unfortunately, such threats often begin with unsecured connected devices. Acting as a double-edged sword, connected devices play a crucial role industrywide in day-to-day business operations and solutions, but pose a grave security risk to both enterprises and consumers. <\/p>\n<p>Whose responsibility is it to keep these applications secure? The public sector often points the finger at vendors and brands, but it also has a responsibility to carefully research and choose its vendors and partners. Technology companies, for their part, are responsible for helping to mitigate vulnerabilities and privacy and security flaws. While both the private and public sectors can agree that we must address these issues and create a more secure environment, the solution, however, is where the real challenges lie. <\/p>\n<h2 class=\"regular-text\">Synchronized Security Standards<\/h2>\n<p>There are many reasons why today\u2019s devices and mobile applications are insecure, but they all boil down to one thing: There hasn\u2019t been one set of cybersecurity standards until now. <a href=\"https:\/\/www.darkreading.com\/iot\" target=\"_blank\" rel=\"noopener\">IoT<\/a> product manufacturers must make it a priority to test and certify their products against these security standards to show their consumers that their product offerings have gone through a security certification process. For innovation to evolve, there\u2019s a critical need for to follow a set of global, synchronized security standards that will keep everyone on the same page and bring clarity to the future of <a href=\"https:\/\/www.darkreading.com\/physical-security\/is-your-home-or-small-business-built-on-secure-foundations-think-again-\" target=\"_blank\" rel=\"noopener\">IoT security<\/a>. <\/p>\n<p>Brands and manufacturers can hire the best security leadership, bolster security infrastructure, and even mandate companywide cybersecurity training, it&#8217;s but it&#8217;s simply not enough. An industry standard would provide predictable and understandable frameworks to incorporate security into mobile apps and IoT devices \u2014 from inception, to testing and third-party validation before going to market, to end use. <\/p>\n<p>With more unique cybersecurity events happening as major world events occur, the time has come to double down on security efforts. Testing and third-party validation is the way to go, giving peace of mind to organizations, partners, and customers. <\/p>\n<h2 class=\"regular-text\">Hackers&#8217; Affinity for IoT devices<\/h2>\n<p>It\u2019s a never-ending game of cat and mouse \u2014 as innovation increases and we become ever-more connected, hackers continue to bring their A games. With more connected devices and buildings becoming interoperable, hackers have become more sophisticated, using connected devices to gain access to \u2014 and wreak havoc on \u2014 critical infrastructure. Both B2B and B2C businesses must prioritize offering customers secured products, and customers should be made aware of such options and processes. Transparency of security processes and availability of secured products is crucial to achieving a more secure world. <\/p>\n<h2 class=\"regular-text\">Remote Working \u2013 It\u2019s Not All Fun and Games<\/h2>\n<p>The global pandemic summoned the age of <a href=\"https:\/\/www.darkreading.com\/remote-workforce\" target=\"_blank\" rel=\"noopener\">remote work<\/a>. As a result, there&#8217;s been an uptick in employees using personal smartphones and laptops while logging onto company VPNs to perform their job duties. This presents an increasingly high security risk, but organizations that provide managed devices with a zero-trust model in mind, secured VPNs, and connected devices that have undergone certification and testing will avoid potential security breaches. <\/p>\n<h2 class=\"regular-text\">Lack of Data-Sharing Across the Industry<\/h2>\n<p>Today&#8217;s data-sharing efforts across the industry are insufficient and shine a light on a critical aspect of today\u2019s cybersecurity challenges: sharing and making use of information. The time has come for the global industry to unite, collaborate, and embrace a set of baseline security requirements. This includes data sharing, to help build a more secure cybersecurity landscape and, therefore, a safer world. This can be achieved through testing and third-party validation of IoT devices, in addition to fostering a community \u2014 a global think tank of security thought leaders \u2014 that is tenaciously looking to advance the greater security ecosystem through sharing crucial data and engaging in creative brainstorming. <\/p>\n<h2 class=\"regular-text\">Forming a United Front to Fight Cybercrime<\/h2>\n<p>Many in the cybersecurity industry have found themselves at a crossroads: Either continue operating as individual entities, all pining for the same goals, or begin tackling cybercrime head-on as a united front by joining those that have already unified under a harmonized set of security standards.<\/p>\n<p>Further implementing standardized solutions industrywide will not only create additional industry standards, but will also continue to hold companies accountable to those standards. Such security standards and guidelines are centered on compliance, transparency, and visibility. By further cultivating a community in which ideas about security solutions are shared, organizations can be on \u2014 or close to \u2014 the same page and therefore in a more secure place. Harmonizing standards and solutions brings higher visibility and clarity to the state of security at any given point in time and paints a better picture of what the future holds. Hackers have a harder time keeping up, and, as an added bonus, the industry is able to foster greater transparency with partners and customers.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/iot\/the-time-is-now-for-iot-security-standards\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Industry standards would provide predictable and understandable IoT security frameworks. Read More <a href=\"https:\/\/www.darkreading.com\/iot\/the-time-is-now-for-iot-security-standards\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47930","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Time Is Now for IoT Security Standards 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Time Is Now for IoT Security Standards 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-11T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Time Is Now for IoT Security Standards\",\"datePublished\":\"2022-08-11T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/\"},\"wordCount\":867,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f6a686f3f90120f\\\/62f00beace6f4a0ee9e636ec\\\/IoT_Aleksey_Funtap_Alamy_.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/\",\"name\":\"The Time Is Now for IoT Security Standards 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f6a686f3f90120f\\\/62f00beace6f4a0ee9e636ec\\\/IoT_Aleksey_Funtap_Alamy_.jpg\",\"datePublished\":\"2022-08-11T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f6a686f3f90120f\\\/62f00beace6f4a0ee9e636ec\\\/IoT_Aleksey_Funtap_Alamy_.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt9f6a686f3f90120f\\\/62f00beace6f4a0ee9e636ec\\\/IoT_Aleksey_Funtap_Alamy_.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-time-is-now-for-iot-security-standards\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Time Is Now for IoT Security Standards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Time Is Now for IoT Security Standards 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/","og_locale":"en_US","og_type":"article","og_title":"The Time Is Now for IoT Security Standards 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-11T14:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Time Is Now for IoT Security Standards","datePublished":"2022-08-11T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/"},"wordCount":867,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/","url":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/","name":"The Time Is Now for IoT Security Standards 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg","datePublished":"2022-08-11T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt9f6a686f3f90120f\/62f00beace6f4a0ee9e636ec\/IoT_Aleksey_Funtap_Alamy_.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-time-is-now-for-iot-security-standards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The Time Is Now for IoT Security Standards"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47930"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47930\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}