{"id":48785,"date":"2022-10-07T14:35:58","date_gmt":"2022-10-07T14:35:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33920\/Feds-Ink-26-Million-Contract-For-Deception-Platform-For-Defense.html"},"modified":"2022-10-07T14:35:58","modified_gmt":"2022-10-07T14:35:58","slug":"feds-ink-26-million-contract-for-deception-platform-for-defense","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/","title":{"rendered":"Feds Ink $26 Million Contract For Deception Platform For Defense"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/06\/062222_pentagon.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The federal government has awarded a contract to CounterCraft for a new deception platform that will be deployed throughout the Department of Defense.<\/p>\n<p>The contract, which was awarded through the General Services Administration and could be worth up to $26 million, will give DoD component agencies access to the vendor\u2019s proprietary deception platform in order to detect and monitor network traffic produced by malicious hackers targeting defense networks.<\/p>\n<p>According to federal procurement records, the <a href=\"https:\/\/sam.gov\/opp\/4bc1c04c1ca34d22a902053fb3f574aa\/view\">contract is designed<\/a> to serve three purposes: provide deception capabilities that can detect unauthorized breaches or access to U.S. government networks, alert agencies and study attackers; support integration of the solution into U.S. government networks with the ability to add new components or scale the platform over time; and train agencies on how to set up and deploy the platform to bolster threat intelligence on the tactics, techniques and procedures of different threat actors.<\/p>\n<p>The deception tech is needed, the government claims, because DoD cybersecurity officials \u201ccurrently lack the technological platform and capabilities to withstand and gather intelligence from an ongoing cyber-attack.&#8221; The current response involves turning off connected systems, something that prevents them from learning more about the behaviors of adversaries targeting defense networks.<\/p>\n<p>\u201cThe current preferred defensive action is to disconnect an internet or network connected system during an attack. Disconnecting stops the ability of network operators from being able to gather telemetry data and characteristics of the attack,\u201d the award justification states. \u201cCyber operations must leverage purpose-built and shaped terrain \u2013 decoy endpoints, networks, and artifacts \u2013 to deceive, disorient, and disrupt malicious cyber actors and impose cost and risk on our adversaries. CCSI\u2019s software\/licenses are intended to leverage cyber deception methodologies and capabilities to address these concerns.\u201d<\/p>\n<p>The contract is an outgrowth of a project that initially began under the Defense Innovation Unit, <a href=\"https:\/\/www.scmagazine.com\/analysis\/careers\/diu-seeks-a-thought-leader-to-oversee-cutting-edge-cyber-tech-work-for-us-military\">an office housed within DoD<\/a> that acts as an incubator for emerging IT and cybersecurity technologies for the government and partners with Silicon Valley startups and other nontraditional contractors.<\/p>\n<p>The underlying technology was part of a $679,000 prototype platform developed by CounterCraft and DIU for the Air Force in 2021, creating sophisticated deception environments that detect malicious cyber activity. According to DIU, it was tested in military wargames with national and NATO-level red teams.<\/p>\n<p>Patrick Gould, deputy director of the DIU\u2019s cyber portfolio, told SC Media earlier this year that the office is often able to shepherd prototype technologies from the design stage to broader adoption throughout federal agencies in such a short time largely due to a <a href=\"https:\/\/www.scmagazine.com\/feature\/emerging-technology\/why-the-pentagon-remains-both-the-best-and-worst-customer-for-tech-innovators\">unique acquisition process<\/a> that eschews many of the traditional bureaucratic requirements that dominate contracting in other parts of the federal government.<\/p>\n<p>\u201cWe try to make it as commercially friendly as possible, so we try to mirror what those vendors are seeing specifically in the security realm, like if any other CISO was coming to them and saying \u2018hey I want to use your capability,\u2019\u201d said Gould.<\/p>\n<p>The contact was awarded on a sole-source basis, meaning it was not competitively bid. The GSA claims that the government conducted extensive research and no other vendor is capable of providing these services, largely because CounterCraft\u2019s platform is proprietary, has already been highly modified and other vendors would be restricted to operating the commercial-off-the-shelf version of the software.<\/p>\n<p>The agency also said they published a pre-solicitation synopsis of the requirements on federal contracting sites in August but have not received any responses from other vendors indicating they can meet the requirements.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33920\/Feds-Ink-26-Million-Contract-For-Deception-Platform-For-Defense.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48786,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9175],"class_list":["post-48785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusacyberwarmilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Feds Ink $26 Million Contract For Deception Platform For Defense 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Feds Ink $26 Million Contract For Deception Platform For Defense 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-07T14:35:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/06\/062222_pentagon.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Feds Ink $26 Million Contract For Deception Platform For Defense\",\"datePublished\":\"2022-10-07T14:35:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/\"},\"wordCount\":590,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg\",\"keywords\":[\"headline,government,usa,cyberwar,military\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/\",\"name\":\"Feds Ink $26 Million Contract For Deception Platform For Defense 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg\",\"datePublished\":\"2022-10-07T14:35:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg\",\"width\":1500,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/feds-ink-26-million-contract-for-deception-platform-for-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,cyberwar,military\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusacyberwarmilitary\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Feds Ink $26 Million Contract For Deception Platform For Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Feds Ink $26 Million Contract For Deception Platform For Defense 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/","og_locale":"en_US","og_type":"article","og_title":"Feds Ink $26 Million Contract For Deception Platform For Defense 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-07T14:35:58+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/06\/062222_pentagon.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Feds Ink $26 Million Contract For Deception Platform For Defense","datePublished":"2022-10-07T14:35:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/"},"wordCount":590,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg","keywords":["headline,government,usa,cyberwar,military"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/","url":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/","name":"Feds Ink $26 Million Contract For Deception Platform For Defense 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg","datePublished":"2022-10-07T14:35:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/feds-ink-26-million-contract-for-deception-platform-for-defense.jpg","width":1500,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/feds-ink-26-million-contract-for-deception-platform-for-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,cyberwar,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusacyberwarmilitary\/"},{"@type":"ListItem","position":3,"name":"Feds Ink $26 Million Contract For Deception Platform For Defense"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48785"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48785\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48786"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}