{"id":49966,"date":"2023-01-04T00:51:00","date_gmt":"2023-01-04T00:51:00","guid":{"rendered":"https:\/\/www.darkreading.com\/tech-trends\/2023-will-see-more-focus-on-quantum-computing"},"modified":"2023-01-04T00:51:00","modified_gmt":"2023-01-04T00:51:00","slug":"2023-will-see-renewed-focus-on-quantum-computing","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/","title":{"rendered":"2023 Will See Renewed Focus on Quantum Computing"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif\" class=\"ff-og-image-inserted\"><\/div>\n<p>2022 has been a big year for quantum computing. Over the summer, National Institute of Standards and Technology (NIST) unveiled four quantum computing algorithms that will be eventually turned into a final quantum computing standard, and governments around the world boosted investments in quantum computing. 2023 may be the year when quantum finally steps into the limelight with organizations preparing to begin the process of implementing quantum computing technologies into existing systems. It will also be the year to start paying attention to quantum computing-based attacks.<\/p>\n<p>&#8220;In 2023, we&#8217;ll see both the private and public sector&#8217;s increased awareness around the challenges associated with quantum resilience, and we&#8217;ll see efforts begin to take hold more significantly to prepare for quantum computing,&#8221; says Jon France, CISO of (ISC)2.<\/p>\n<p><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/quantum-computing-funding-remains-strong-but-talent-gap-raises-concern\" target=\"_blank\" rel=\"noopener\">McKinsey<\/a> recently noted the amount of money different countries have allocated for quantum computing to date \u2014 China leads the pack with $15.3 billion in public funds in quantum computing investments. The European Union governments combined have invested $7.2 billion, which dwarfs the US with $1.9 billion.<\/p>\n<p>That doesn&#8217;t mean the US has been standing still. A key effort \u2014 the list of <a href=\"https:\/\/csrc.nist.gov\/news\/2022\/pqc-candidates-to-be-standardized-and-round-4\" target=\"_blank\" rel=\"noopener\">four NIST-approved algorithms<\/a> (<a href=\"https:\/\/pq-crystals.org\/kyber\/\" target=\"_blank\" rel=\"noopener\">CRYSTALS-Kyber<\/a>, <a href=\"https:\/\/pq-crystals.org\/dilithium\/index.shtml\" target=\"_blank\" rel=\"noopener\">CRYSTALS-Dilithium<\/a>, <a href=\"https:\/\/falcon-sign.info\/\" target=\"_blank\" rel=\"noopener\">FALCON<\/a> and <a href=\"https:\/\/sphincs.org\/\" target=\"_blank\" rel=\"noopener\">SPHINCS+<\/a>) \u2014 will help organizations future-proof current data security measures against <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/crypto-agility-solving-for-the-inevitable\" target=\"_blank\" rel=\"noopener\">harvest-now\/decrypt-later (HNDL) attacks<\/a>. These attacks refer to adversaries hanging on to encrypted items until a time when quantum computing technology that can decrypt them become available. And last month, US president Joe Biden signed the <a href=\"https:\/\/www.darkreading.com\/risk\/biden-signs-post-quantum-cybersecurity-guidelines-into-law\" target=\"_blank\" rel=\"noopener\">Quantum Computing Cybersecurity Preparedness Act<\/a> (HR 7535) into law to give the Office of Management and Budget authority to begin implementing <a href=\"https:\/\/www.darkreading.com\/application-security\/nist-4-crypto-algorithms-post-quantum-world\" target=\"_blank\" rel=\"noopener\">NIST-approved quantum algorithms<\/a> throughout the executive branch.<\/p>\n<p>The new law highlights the importance of <a href=\"https:\/\/www.darkreading.com\/dr-tech\/now-is-the-time-to-plan-for-post-quantum-cryptography\" target=\"_blank\" rel=\"noopener\">implementing quantum computing technologies<\/a> into existing systems now, but it doesn&#8217;t address the necessity of monitoring for threats, says Yudong Cao, co-founder and CTO of Zapata Computing. &#8220;We should be actively monitoring the threat by sponsoring cybersecurity research activities into various methods, exact or heuristic, for compromising the current encryption schemes,&#8221; Cao says.<\/p>\n<p>There is also a lot of investment activity in the private sector, with start-ups focused on quantum technologies collecting $1.4 billion in funding in 2021 alone, McKinsey said. Nearly half (49%) of those private investments are in companies in the United States, compared to just 6% in China, the analysts noted.<\/p>\n<p>&#8220;Building cyber resilience in preparation for quantum technology should have been an effort started a decade ago &#8230; but now is the second best time,&#8221; France says. However, for both private and public sector organizations, the process of making infrastructure &#8220;quantum-resilient&#8221; will be a difficult and slow one.<\/p>\n<p>&#8220;Much of the encryption infrastructure in communication networks that keeps information safe now is deeply embedded, i.e., certificates, and will take years to transition to quantum resilient algorithms, posing a timeline issue for changeover before the general availability of quantum computing,&#8221; France says.<\/p>\n<p>In a recent survey from Deloitte, enterprises said without external pressure \u2014 such as regulatory and compliance requirements \u2014 <a href=\"https:\/\/www.darkreading.com\/edge-threat-monitor\/no-enterprise-push-for-quantum-without-regulatory-push\" target=\"_blank\" rel=\"noopener\">they won&#8217;t be prioritizing quantum security initiatives<\/a>.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/tech-trends\/2023-will-see-more-focus-on-quantum-computing\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adopting post-quantum cryptography is something that has been discussed for years; it&#8217;s time for organizations to get to work. Read More <a href=\"https:\/\/www.darkreading.com\/tech-trends\/2023-will-see-more-focus-on-quantum-computing\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-49966","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2023 Will See Renewed Focus on Quantum Computing 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2023 Will See Renewed Focus on Quantum Computing 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-04T00:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"2023 Will See Renewed Focus on Quantum Computing\",\"datePublished\":\"2023-01-04T00:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/\"},\"wordCount\":499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5e54514d348e5e36\\\/63b4c768c0cfef5cb0c4f8a5\\\/quantum-tech-mckinsey.gif\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/\",\"name\":\"2023 Will See Renewed Focus on Quantum Computing 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5e54514d348e5e36\\\/63b4c768c0cfef5cb0c4f8a5\\\/quantum-tech-mckinsey.gif\",\"datePublished\":\"2023-01-04T00:51:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5e54514d348e5e36\\\/63b4c768c0cfef5cb0c4f8a5\\\/quantum-tech-mckinsey.gif\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt5e54514d348e5e36\\\/63b4c768c0cfef5cb0c4f8a5\\\/quantum-tech-mckinsey.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/2023-will-see-renewed-focus-on-quantum-computing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2023 Will See Renewed Focus on Quantum Computing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2023 Will See Renewed Focus on Quantum Computing 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/","og_locale":"en_US","og_type":"article","og_title":"2023 Will See Renewed Focus on Quantum Computing 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-04T00:51:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"2023 Will See Renewed Focus on Quantum Computing","datePublished":"2023-01-04T00:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/"},"wordCount":499,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/","url":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/","name":"2023 Will See Renewed Focus on Quantum Computing 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif","datePublished":"2023-01-04T00:51:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt5e54514d348e5e36\/63b4c768c0cfef5cb0c4f8a5\/quantum-tech-mckinsey.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/2023-will-see-renewed-focus-on-quantum-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"2023 Will See Renewed Focus on Quantum Computing"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49966"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49966\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}