{"id":49396,"date":"2022-11-21T15:03:52","date_gmt":"2022-11-21T15:03:52","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34057\/A-Leak-Details-Apples-Secret-Dirt-On-A-Trusted-Security-Startup.html"},"modified":"2022-11-21T15:03:52","modified_gmt":"2022-11-21T15:03:52","slug":"a-leak-details-apples-secret-dirt-on-a-trusted-security-startup","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/","title":{"rendered":"A Leak Details Apple&#8217;s Secret Dirt On A Trusted Security Startup"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/636ec58e8cea9c3346925ff5\/191:100\/w_1280,c_limit\/security-apple-corellium-1176128997.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"paywall\">Zach Edwards, an independent privacy and security researcher, says that \u201csensitive technology cannot be haphazardly sold to any company, in any country in the world.\u201d<\/p>\n<p class=\"paywall\">\u201cWhile Corellium is a reverse-engineering tool that doesn&#8217;t intrinsically create risks through its sale, the core purpose of the tool is to reverse malware,\u201d Edwards says. \u201cAnd if you sell the product to malware developers in countries averse to Western interests, we should assume that this tool will be used to improve malware.\u201d<\/p>\n<p class=\"paywall\">A person who tried Corellium in the past, who asked to remain anonymous because they were not allowed to speak to the press, says that \u201cgiven what\u2019s happening in the world today, you shouldn\u2019t be dealing with Russian companies,\u201d such as Elcomsoft.&nbsp;<\/p>\n<p class=\"paywall\">Elcomsoft\u2019s CEO Katalov says that \u201cthe decision to work with a company based in Russia is a personal choice.\u201d<\/p>\n<p class=\"paywall\">\u201cPlease rest assured that we still strive to provide the best software and services, and trying to keep good relationships with our customers all over the world,\u201d he adds. \u201cWe will just keep doing our job, making the world a safer place and battling the crime.\u201d<\/p>\n<p class=\"paywall\">Adrian Sanabria, a cybersecurity veteran, says that it\u2019s not surprising that \u201cgroups interested in creating iOS exploits would be using a platform designed for iOS security research.\u201d&nbsp;<\/p>\n<p class=\"paywall\">\u201cFor me, the core takeaway is that Apple created the need for platforms like Corellium by not providing the tools, access, and transparency the market needs and desires,\u201d he says.<\/p>\n<p>Danger Zones<\/p>\n<p class=\"paywall\">Some of the organizations and companies linked to Corellium in the document come from countries seen as controversial by most people in the cybersecurity community in the West, including Alex Stamos, who acted as an expert witness for Corellium in the lawsuit against Apple.&nbsp;&nbsp;<\/p>\n<p class=\"paywall\">\u201cI personally don\u2019t believe it would be ethical to sell exploits to Saudi Arabia,\u201d Stamos, the director of Stanford University\u2019s Internet Observatory, said during testimony he provided in the lawsuit between Apple and Corellium, which is quoted in the document.&nbsp;&nbsp;<\/p>\n<p class=\"paywall\">Stamos also expressed doubts about selling products to the United Arab Emirates, whose government had a close relationship with DarkMatter. \u201cThe UAE has been shown to use malware and exploits to spy on journalists and suppress local dissent,\u201d Stamos said.&nbsp;<\/p>\n<p class=\"paywall\">In response to the document\u2019s revelations, Stamos says he doesn\u2019t think \u201cit&#8217;s appropriate for Apple to use copyright law to try to stop security research, and I don&#8217;t think it&#8217;s responsible for Corellium to offer their product to companies known to create malicious software for authoritarian states.\u201d<\/p>\n<p class=\"paywall\">The document also includes the logos of alleged Corellium customers and companies linked to it. As well as the companies previously mentioned, the document includes the logo of Azimuth,&nbsp;<a href=\"https:\/\/www.vice.com\/en\/article\/8xdayg\/iphone-zero-days-inside-azimuth-security\">a provider of advanced hacking tools to the intelligence and law enforcement agencies of the so-called Five Eyes<\/a>. Other logos include the Centre for Strategic Infocomm Technologies of Singapore, or CSIT, as well as the logo of an academic institution in Saudi Arabia called the Center of Excellence in Information Assurance (COEIA), housed at the King Saud University.&nbsp;<\/p>\n<p class=\"paywall\">CSIT executives did not respond to a request for comment. Other than the logo of the COEIA, the document also shows a 2019 email titled \u201cinvitation to Corellium\u201d sent to the organization. The COEIA did not respond to a request for comment.<\/p>\n<p class=\"paywall\">The legal battle between Apple and Corellium is ongoing. Late last month, the two companies appeared at a hearing before the Eleventh Circuit of the US Court of Appeals in Florida. Apple\u2019s lawyer, Melissa Sherry, argued that Corellium\u2019s product is just a slightly tweaked version of iOS that\u2019s not transformative enough not to be fair use. Corellium attorney Kevin Russell said the product helps users \u201cshed light on the functionality of the Apple operating system\u201d and is, therefore, fair use.<\/p>\n<p class=\"paywall\">\u201cI don&#8217;t think there&#8217;s a genuine dispute that the purpose of the product is to explore the unprotected functionality of the system&#8217;s software,\u201d he said. \u201cWhat people do with that knowledge is the subject of another statute.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34057\/A-Leak-Details-Apples-Secret-Dirt-On-A-Trusted-Security-Startup.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49397,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8675],"class_list":["post-49396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerphoneflawapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Leak Details Apple&#039;s Secret Dirt On A Trusted Security Startup 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Leak Details Apple&#039;s Secret Dirt On A Trusted Security Startup 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-21T15:03:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.wired.com\/photos\/636ec58e8cea9c3346925ff5\/191:100\/w_1280,c_limit\/security-apple-corellium-1176128997.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A Leak Details Apple&#8217;s Secret Dirt On A Trusted Security Startup\",\"datePublished\":\"2022-11-21T15:03:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg\",\"keywords\":[\"headline,hacker,phone,flaw,apple\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/\",\"name\":\"A Leak Details Apple's Secret Dirt On A Trusted Security Startup 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg\",\"datePublished\":\"2022-11-21T15:03:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg\",\"width\":1280,\"height\":670},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone,flaw,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerphoneflawapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Leak Details Apple&#8217;s Secret Dirt On A Trusted Security Startup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Leak Details Apple's Secret Dirt On A Trusted Security Startup 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/","og_locale":"en_US","og_type":"article","og_title":"A Leak Details Apple's Secret Dirt On A Trusted Security Startup 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-11-21T15:03:52+00:00","og_image":[{"url":"https:\/\/media.wired.com\/photos\/636ec58e8cea9c3346925ff5\/191:100\/w_1280,c_limit\/security-apple-corellium-1176128997.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A Leak Details Apple&#8217;s Secret Dirt On A Trusted Security Startup","datePublished":"2022-11-21T15:03:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/"},"wordCount":702,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg","keywords":["headline,hacker,phone,flaw,apple"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/","url":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/","name":"A Leak Details Apple's Secret Dirt On A Trusted Security Startup 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg","datePublished":"2022-11-21T15:03:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/11\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup.jpg","width":1280,"height":670},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-leak-details-apples-secret-dirt-on-a-trusted-security-startup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone,flaw,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphoneflawapple\/"},{"@type":"ListItem","position":3,"name":"A Leak Details Apple&#8217;s Secret Dirt On A Trusted Security Startup"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49396"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49397"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}