{"id":49634,"date":"2022-12-09T00:34:00","date_gmt":"2022-12-09T00:34:00","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/3-ways-attackers-bypass-cloud-security"},"modified":"2022-12-09T00:34:00","modified_gmt":"2022-12-09T00:34:00","slug":"3-ways-attackers-bypass-cloud-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/","title":{"rendered":"3 Ways Attackers Bypass Cloud Security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>BLACK HAT EUROPE 2022 \u2013 London &#8211; <a href=\"https:\/\/www.cadosecurity.com\/coinstomp-malware-family-targets-asian-cloud-service-providers\/\" target=\"_blank\" rel=\"noopener\">CoinStomp<\/a>. <a href=\"https:\/\/cyware.com\/news\/watchdog-targets-docker-and-redis-servers-in-new-cryptojacking-campaign-a5681a92\" target=\"_blank\" rel=\"noopener\">Watchdog<\/a>. <a href=\"https:\/\/www.darkreading.com\/omdia\/denonia-malware-shows-evolving-cloud-threats\" target=\"_blank\" rel=\"noopener\">Denonia<\/a>.<\/p>\n<p>These cyberattack campaigns are among the most prolific threats today targeting cloud systems \u2014 and their ability to evade detection should serve as a cautionary tale of potential threats to come, a security researcher detailed here today.<\/p>\n<p>&#8220;Recent cloud-focused malware campaigns have demonstrated that adversary groups have intimate knowledge of cloud technologies and their security mechanisms. And not only that, they are using that to their advantage,&#8221; said Matt Muir, threat intelligence engineer for Cado Security, who shared details on those three campaigns his team has studied.<\/p>\n<p>While the three attack campaigns are all about cryptomining at this point, some of their techniques could be used for more nefarious purposes. And for the most part, these and other attacks Muir&#8217;s team has seen are exploiting misconfigured cloud settings and other mistakes. That for the most part means defending against them lands in the cloud customer camp, according to Muir.<\/p>\n<p>&#8220;Realistically for these kinds of attacks, it has more to do with the user than the [cloud] service provider,&#8221; Muir tells Dark Reading. &#8220;They are very opportunistic. The majority of attacks we see have more to do with mistakes&#8221; by the cloud customer, he said.<\/p>\n<p>Perhaps the most interesting development with these attacks is that they are now targeting serverless computing and containers, he said. &#8220;The ease of which cloud resources can be compromised has made the cloud an easy target,&#8221; he said in his presentation, &#8220;<a href=\"https:\/\/www.blackhat.com\/eu-22\/briefings\/schedule\/index.html#real-world-detection-evasion-techniques-in-the-cloud-29053\" target=\"_blank\" rel=\"noopener\">Real-World Detection Evasion Techniques in the Cloud<\/a>.&#8221;<\/p>\n<h2 class=\"regular-text\">DoH, It&#8217;s a Cryptominer<\/h2>\n<p>Denonia malware targets AWS Lambda serverless environments in the cloud. &#8220;We believe it&#8217;s the first publicly disclosed malware sample to target serverless environments,&#8221; Muir said. While the campaign itself is about cryptomining, the attackers employ some advanced command and control methods that indicate they&#8217;re well-studied in cloud technology.<\/p>\n<p>The Denonia attackers employ a protocol that implements DNS over HTTPS (aka DoH), which sends DNS queries over HTTPS to DoH-based resolver servers. That gives the attackers a way to hide within encrypted traffic such that AWS can&#8217;t view their malicious DNS lookups. &#8220;It&#8217;s not the first malware making use of DoH, but it certainly isn&#8217;t a common occurrence,&#8221; Muir said. &#8220;This prevents the malware to trigger an alert&#8221; with AWS, he said.<\/p>\n<p>The attackers also appeared to have tossed in more diversions to distract or confuse security analysts, thousands of lines of user agent HTTPS request strings.<\/p>\n<p>&#8220;At first we thought it was might be a botnet or DDoS &#8230; but in our analysis it was not actually used by malware&#8221; and instead was a way to pad the binary in order to evade endpoint detection &amp; response (EDR) tools and malware analysis, he said.<\/p>\n<h2 class=\"regular-text\">More Cryptojacking With CoinStomp and Watchdog<\/h2>\n<p>CoinStomp is cloud-native malware targeting cloud security providers in Asia for cryptojacking purposes. Its main <em>modus operandi<\/em> is timestamp manipulation as an anti-forensics technique, as well as removing system cryptographic policies. It also uses a C2 family based on a dev\/tcp reverse shell to blend into cloud systems&#8217; Unix environments.<\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/cloud\/the-inevitability-of-cloud-breaches-tales-of-real-world-cloud-attacks-\" target=\"_self\" rel=\"noopener\">Watchdog<\/a>, meanwhile, has been around since 2019 and is one of the more prominent cloud-focused threat groups, Muir noted. &#8220;They are opportunistic in exploiting cloud misconfiguration, [detecting those mistakes] by mass scanning.&#8221;<\/p>\n<p>The attackers also rely on old-school steganography to evade detection, hiding their malware behind image files.<\/p>\n<p>&#8220;We&#8217;re at an interesting point in cloud malware research,&#8221; Muir concluded. &#8220;Campaigns still are lacking somewhat in technicality, which is good news for defenders.&#8221;<\/p>\n<p>But there&#8217;s more to come. &#8220;Threat actors are becoming more sophisticated&#8221; and likely will move from cryptomining to more damaging attacks, according to Muir.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/3-ways-attackers-bypass-cloud-security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/3-ways-attackers-bypass-cloud-security\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-49634","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Ways Attackers Bypass Cloud Security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Ways Attackers Bypass Cloud Security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-09T00:34:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"3 Ways Attackers Bypass Cloud Security\",\"datePublished\":\"2022-12-09T00:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/\"},\"wordCount\":615,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt383cc17177375648\\\/63928209e856e932b8e87338\\\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/\",\"name\":\"3 Ways Attackers Bypass Cloud Security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt383cc17177375648\\\/63928209e856e932b8e87338\\\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg\",\"datePublished\":\"2022-12-09T00:34:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt383cc17177375648\\\/63928209e856e932b8e87338\\\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt383cc17177375648\\\/63928209e856e932b8e87338\\\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-ways-attackers-bypass-cloud-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Ways Attackers Bypass Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Ways Attackers Bypass Cloud Security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"3 Ways Attackers Bypass Cloud Security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-12-09T00:34:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"3 Ways Attackers Bypass Cloud Security","datePublished":"2022-12-09T00:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/"},"wordCount":615,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/","url":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/","name":"3 Ways Attackers Bypass Cloud Security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg","datePublished":"2022-12-09T00:34:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt383cc17177375648\/63928209e856e932b8e87338\/chessrivals-Dmytro_Yushchenko-AdobeStock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/3-ways-attackers-bypass-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"3 Ways Attackers Bypass Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49634"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49634\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}