{"id":48408,"date":"2022-09-12T21:28:40","date_gmt":"2022-09-12T21:28:40","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/how-machine-learning-can-boost-network-visibility-for-ot-teams"},"modified":"2022-09-12T21:28:40","modified_gmt":"2022-09-12T21:28:40","slug":"how-machine-learning-can-boost-network-visibility-for-ot-teams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/","title":{"rendered":"How Machine Learning Can Boost Network Visibility for OT Teams"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The goal of neural networking in cybersecurity is to be able to detect unusual behavior and patterns, especially within OT assets and networks. Detecting unusual behaviors often leads to the discovery that you have been compromised or something has been misconfigured.<\/p>\n<p>&#8220;Having visibility into your industrial assets and networks is the first step to understanding your overall OT cybersecurity posture,&#8221; says Pete Lund, vice president of products for OT security at infrastructure cybersecurity specialist Opswat.<\/p>\n<p>To take advantage of such abilities, Opswat unveiled its AI-powered network visibility solution, Neuralyzer. The software tool leverages machine learning (ML) to learn the communication patterns between assets and networks to determine what &#8220;normal&#8221; activity is. This enables OT workers to remain focused on the primary tasks at hand, and only alert them when abnormal activity occurs.<\/p>\n<p>&#8220;Neural networks have the ability to learn in a similar way as the human brain, and so they can spot red flags on your behalf like a second set of eyes,&#8221; Lund explains. &#8220;The ML in Neuralyzer can identify the type of device or asset on the network, providing asset visibility.&#8221;<\/p>\n<h2 class=\"regular-text\">Machine Learning Looks for Assets and Anomalies<\/h2>\n<p>One application of ML in Neuralyzer is the ability to identify the type of device\/asset on the network, called the asset visibility feature.<\/p>\n<p>For <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/manufacturing-firms-learn-cybersecurity-the-hard-way\" target=\"_blank\" rel=\"noopener\">asset visibility<\/a>, most tools use the device fingerprint (DFP) is usually used to discover and\/or profile the device. Typical OT devices, unlike IT devices, do not have a browser installed, so browser fingerprint (an effective approach for DFP in IT) usually will not work for the OT environment.<\/p>\n<p>&#8220;Through extensive research and experiments, our team has worked out a selected feature set and ML algorithm that works best \u2014 in terms of accuracy, performance, and required inputs \u2014 for classifying the device type,&#8221; explains Lund.<\/p>\n<p>He says that another application for ML&nbsp;is to detect anomalies on the network connectivity and activity of a particular device or of the whole network.<\/p>\n<p>Neuralyzer can model the device or devices and their network connections as a graph, then use the 1D convolutional neural network for anomalies detection.<\/p>\n<p>&#8220;Network traffic dissection and anomaly detection are good use cases for ML and neural networks,&#8221; Lund says. &#8220;Network traffic dissection would be a feasible approach for DFP in the OT.&#8221;<\/p>\n<p>He points out anomaly detection is an important aspect in OT environment visibility.<\/p>\n<p>&#8220;An anomaly might not only relate to integrity \u2014 for example, a network breach \u2014 but it might also relate to the availability or normal operation of the assets, which is crucial to the OT environment,&#8221; Lund says.<\/p>\n<h2 class=\"regular-text\">Neural Networks Offer Multiple Cybersecurity Advantages<\/h2>\n<p>Bud Broomhead, CEO at automated IoT cyber hygiene provider Viakoo, says neural networks, like any other technology, can be used both <a href=\"https:\/\/www.darkreading.com\/application-security\/7-ways-ai-and-ml-are-helping-and-hurting-cybersecurity\" target=\"_blank\" rel=\"noopener\">for improving and for defeating cybersecurity<\/a>.<\/p>\n<p>&#8220;Many examples exist on how neural networks can be trained to produce bad outcomes, or be fed data to disrupt systems,&#8221; he explains. &#8220;Yet the massive improvement in efficiency \u2014 for example, detecting cyber threats in seconds, or finding threat actors within a crowd almost immediately \u2014 will be needed for many years ahead to overcome the resource gaps present in cybersecurity.&#8221;<\/p>\n<p>Neural networks can analyze complex systems and make intelligent decisions on how to present and classify them. In other words, they take a lot of raw data and turn it into meaningful insights.<\/p>\n<p>&#8220;Simply having an asset inventory does not show you the combination of them in a tightly coupled workflow \u2014 yet that is what businesses need to prioritize the vulnerability and risk of these systems,&#8221; Broomhead says. <\/p>\n<p>John Bambenek, principal threat hunter at Netenrich, a security and operations analytics SaaS company, adds that neural networks allow for statistical analysis well beyond the capacity of a human.<\/p>\n<p>&#8220;Given enough data points and thorough and effective training, they can classify normal and abnormal quickly, allowing an analyst to follow up on events that would not be detected otherwise,&#8221; he says. <\/p>\n<p>Bambenek says he doesn&#8217;t see neural networks as reliable for asset discovery or vulnerability management, however.<\/p>\n<p>&#8220;If an asset isn&#8217;t visible in DHCP logs, there isn&#8217;t a good deal of data to otherwise find it,&#8221; he points out. &#8220;Risk management, on the other hand, can find abnormal and then categorize the risky behavior using other available context to give the business risk answers.&#8221;<\/p>\n<p>Broomhead says even detecting subtle changes to OT system behavior can enable a neural network to see when maintenance is needed, when cyber threats occur, and how environmental changes cause the system to react.<\/p>\n<p>&#8220;Especially in times like now when there are limited human resources to keep OT systems operating safely and securely, neural networks are a force-multiplier that many organizations have some to rely on,&#8221; he says.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-machine-learning-can-boost-network-visibility-for-ot-teams\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Opswat says its new tool uses neural networks to protect critical environments through AI-assisted asset discovery, network visibility, and risk management.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/how-machine-learning-can-boost-network-visibility-for-ot-teams\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-48408","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Machine Learning Can Boost Network Visibility for OT Teams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Machine Learning Can Boost Network Visibility for OT Teams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-12T21:28:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Machine Learning Can Boost Network Visibility for OT Teams\",\"datePublished\":\"2022-09-12T21:28:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\"},\"wordCount\":798,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\",\"name\":\"How Machine Learning Can Boost Network Visibility for OT Teams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg\",\"datePublished\":\"2022-09-12T21:28:40+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Machine Learning Can Boost Network Visibility for OT Teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Machine Learning Can Boost Network Visibility for OT Teams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/","og_locale":"en_US","og_type":"article","og_title":"How Machine Learning Can Boost Network Visibility for OT Teams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-12T21:28:40+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Machine Learning Can Boost Network Visibility for OT Teams","datePublished":"2022-09-12T21:28:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/"},"wordCount":798,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/","url":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/","name":"How Machine Learning Can Boost Network Visibility for OT Teams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg","datePublished":"2022-09-12T21:28:40+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1ea2273c2f70d345\/631f9ed453349d7801bff98a\/neuralnetwork-Sergey_Tarasov-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-machine-learning-can-boost-network-visibility-for-ot-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How Machine Learning Can Boost Network Visibility for OT Teams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48408"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48408\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}