{"id":48028,"date":"2022-08-17T15:29:04","date_gmt":"2022-08-17T15:29:04","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33743\/Vulnerability-Wholesaler-Cuts-Disclosure-Times-Over-Poor-Quality-Patches.html"},"modified":"2022-08-17T15:29:04","modified_gmt":"2022-08-17T15:29:04","slug":"vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","title":{"rendered":"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/\" alt=\"zdi-timeleines-for-incomplete-patches.png\" height=\"568.7919463087248\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Trend Micro Zero Day Initiative<\/span><\/figcaption><\/figure>\n<p>The Zero Day Initiative (ZDI), a vulnerability wholesaler, has reduced its disclosure timelines for incomplete patches in a bid to push vendors into improving the quality of their security updates.&nbsp;<\/p>\n<p>ZDI, a brand owned by security firm Trend Micro, is making the move because of what says is a &#8220;disturbing&#8221; decrease in patch quality and a rise in vague communications about patches.&nbsp;<\/p>\n<p>The impact on enterprises is that they can&#8217;t accurately estimate the risk to their systems and they&#8217;re wasting money on applying incomplete patches that are re-released down the track and need re-applying a second time around. &nbsp;<\/p>\n<p>ZDI&#8217;s standard disclosure timeline gives software vendors 120 days to release a patch, but it&#8217;s now introducing shorter timelines for &#8220;failed patches&#8221; that it will be monitoring. &nbsp; &nbsp;<\/p>\n<p>&#8220;Moving forward, we will be tracking failed patches more closely and will make future policy adjustments based on the data we collect,&#8221; says Brian Gorenc, senior director of ZDI.<\/p>\n<p>For failed patches, ZDI will give vendors 30 days to address the flaw if it&#8217;s critical, the patch is easily circumvented, and if exploitation is expected. Vendors will have 60 days to address critical and high severity issues if the patch provides some defence and exploitation is possible. They will get 90 days for all other vulnerabilities below these severity ratings and there&#8217;s no imminent threat of exploitation.&nbsp;<\/p>\n<p>&#8220;Over the last few years, we&#8217;ve noticed a disturbing trend \u2013 a decrease in patch quality and a reduction in communications surrounding the patch. This has resulted in enterprises losing their ability to accurately estimate the risk to their systems. It&#8217;s also costing them money and resources as bad patches get re-released and thus re-applied,&#8221; <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2022\/8\/11\/new-disclosure-timelines-for-bugs-from-faulty-patches\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Gorenc says in a blogpost<\/a>.<\/p>\n<p>Google Project Zero researcher Maddie Stone has also called out software vendors for releasing incomplete patches. She estimated <a href=\"https:\/\/www.zdnet.com\/article\/google-half-of-zero-day-exploits-linked-to-poor-software-fixes\/\" rel=\"follow\">half of the 18 zero-day or previously undisclosed flaws in the first half of 2022<\/a> could have been avoided with more comprehensive patching and regression tests. Some of those bugs are fixed initially but regress over time.<\/p>\n<p>Because the root cause issue was not addressed, attackers were able to revisit and expose the original vulnerability through a different path, she said.<\/p>\n<p>Stone&#8217;s <a href=\"https:\/\/www.usenix.org\/sites\/default\/files\/conference\/protected-files\/engima2021_slides_stone.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">analysis of 24 zero-days in 2020<\/a> revealed that six were variants of previously disclosed vulnerabilities, and three were incompletely patched vulnerabilities. As she pointed out, incomplete patches make it easier for attackers to exploit users with zero-days.<\/p>\n<p>It&#8217;s not just the quality of patches but the lack of information vendors provide about vulnerabilities. <a href=\"https:\/\/www.darkreading.com\/risk\/patch-madness-vendor-bug-advisories-broken\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Via Dark Reading<\/a>, ZDI&#8217;s Dustin Childs is critical of Microsoft&#8217;s <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/11\/09\/vulnerability-descriptions-in-the-new-version-of-the-security-update-guide\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">decision in 2020<\/a> to remove executive summaries in its Security Update Guide (SUG) each Patch Tuesday. In its place, iMicrosoft only makes available Common Vulnerability Severity Scale (CVSS) scores on a scale of 0 to 10. &nbsp;<\/p>\n<p>In a talk at Black Hat 2022, Childs said that defenders lose the context they used to have to determine risk, along with details about, for example, what security feature was bypassed.&nbsp; &nbsp;<\/p>\n<p>He also estimated that in ZDI&#8217;s program, which has disclosed 10,000 bugs since 2005, between 10% to 20% of the bugs researchers analyse are due to a faulty or incomplete patch.<\/p>\n<p>Childs also drew attention to the reality that each Common Vulnerabilities and Exposures (CVE) identifier does not equate to a single vulnerability. Vendors often report that an update with a single CVE addresses multiple security issues.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33743\/Vulnerability-Wholesaler-Cuts-Disclosure-Times-Over-Poor-Quality-Patches.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[256],"class_list":["post-48028","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-17T15:29:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches\",\"datePublished\":\"2022-08-17T15:29:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\"},\"wordCount\":583,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\",\"name\":\"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\",\"datePublished\":\"2022-08-17T15:29:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-17T15:29:04+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches","datePublished":"2022-08-17T15:29:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/"},"wordCount":583,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","keywords":["headline,hacker,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","url":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","name":"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","datePublished":"2022-08-17T15:29:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/","contentUrl":"https:\/\/www.zdnet.com\/article\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/vulnerability-wholesaler-cuts-disclosure-times-over-poor-quality-patches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"Vulnerability Wholesaler Cuts Disclosure Times Over Poor Quality Patches"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48028","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48028"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48028\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}