{"id":50166,"date":"2023-01-18T15:53:36","date_gmt":"2023-01-18T15:53:36","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34229\/Four-Azure-Services-Vulnerable-To-SSRF-Flaws.html"},"modified":"2023-01-18T15:53:36","modified_gmt":"2023-01-18T15:53:36","slug":"four-azure-services-vulnerable-to-ssrf-flaws","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/","title":{"rendered":"Four Azure Services Vulnerable To SSRF Flaws"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/06\/061422_microsoft_logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Researchers found four Microsoft Azure services that were vulnerable to Server-Side Request Forgery (SSRF), a web security flaw that remains prevalent and poses an ongoing threat to cloud environments. &nbsp;<\/p>\n<p>The vulnerable services include Azure API Management, Azure Functions, Azure Machine Learning, and Azure Digitals, according to <a href=\"https:\/\/orca.security\/resources\/blog\/ssrf-vulnerabilities-in-four-azure-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">a blog post<\/a> Tuesday by Orca Security. Among them, two vulnerabilities involving Azure Functions and Azure Digital Twins did not require authentication, meaning that an attacker could exploit them even without an Azure account.&nbsp;&nbsp;<\/p>\n<p>\u201cThe most notable aspect of these discoveries is arguably the number of SSRF vulnerabilities we were able to find with only minimal effort (including another SSRF vulnerability we found last year in <a rel=\"noreferrer noopener\" href=\"https:\/\/www.oracle.com\/security-alerts\/cpuoct2021.html\" target=\"_blank\">Oracle Cloud Services<\/a>), indicating just how prevalent they are and the risk they pose in cloud environments,\u201d Lidor Ben Shitrit, cloud security researcher at Orca wrote in the blog post. &nbsp;<\/p>\n<p>Indeed, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/analysis\/cloud-security\/audit-finds-ssrf-vulnerability-in-vmware-workspace-one-uem%EF%BF%BC\" target=\"_blank\">SSRF attacks<\/a> can be particularly dangerous since a successful execution can result in an attacker accessing or modifying internal resources as well as submitting data to external sources.&nbsp;<\/p>\n<p>In addition, if attackers are able to access the host\u2019s IMDS \u2014 their cloud instance metadata service \u2014 they could get detailed information on instances, including hostname, security group, MAC address, and user data, which would potentially allow attackers to retrieve tokens, move to another host, and execute code, said Dror Zalman, director of cloud security research at Orca. &nbsp;<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/news\/breach\/capital-one-breach-exposes-not-just-data-but-dangers-of-cloud-misconfigurations\" target=\"_blank\">In the 2019 Capital One data breach<\/a>, the hacker started by exploiting SSRF vulnerabilities to gain access to data that affected approximately 100 million individuals in the United States and six million others in Canada. &nbsp;<\/p>\n<p>In the case of Azure services, Shitrit said all four SSRF vulnerabilities fall under Non-Blind SSRF (or Full SSRF) category, which means that attackers can manipulate a server to make a request and receive the full response from the server. In this way, attackers are able to gather more information about the target system and potentially launch further attacks. &nbsp;<\/p>\n<p>Three security flaws in Azure Digital Twins, Azure Functions App, and Azure API Management were rated as \u201cimportant,\u201d and the vulnerability in Azure Machine Learning was rated as \u201clow.\u201d &nbsp;<\/p>\n<p>In a <a href=\"https:\/\/msrc-blog.microsoft.com\/2023\/01\/17\/microsoft-resolves-four-ssrf-vulnerabilities-in-azure-cloud-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">statement<\/a> sent to SC Media, Microsoft said it took action to resolve all four vulnerabilities as soon as they were reported and determined them to be low risk since they do not allow access to sensitive information or Azure backend services.&nbsp;<\/p>\n<p>\u201cThe impact of SSRF vulnerabilities can vary depending on the environment but can enable access to sensitive internal endpoints or port scanning. Microsoft has mechanisms in place to prevent privileged abuse, such as the unauthorized retrieval of tokens, lateral movement, or code execution\/ As such, these four vulnerabilities did not result in any material impact to Azure services or infrastructure,\u201d the company claimed in an unsigned note posted by the Microsoft Security response Center.&nbsp;&nbsp;<\/p>\n<p>Orca Security applauded Microsoft in its blog post for implementing several measures to mitigate the impact of SSRF attacks in 2020, including the <a rel=\"noreferrer noopener\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/virtual-machines\/windows\/instance-metadata-service?tabs=linux\" target=\"_blank\">introduction of requirements for accessing the IMDS endpoint<\/a> and <a rel=\"noreferrer noopener\" href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/app-service\/overview-managed-identity?tabs=portal%2Chttp#rest-endpoint-reference\" target=\"_blank\">Identity Header<\/a> for the App Service and Azure Functions. &nbsp;<\/p>\n<p>\u201cBy implementing these measures, Microsoft has significantly reduced the potential damage of SSRF attacks on its Azure platform,\u201d Shitrit wrote in the blog post. &nbsp;<\/p>\n<p>Besides Microsoft\u2019s efforts in mitigation, Shitrit added that organizations should also take steps to protect themselves from SSRF attacks. &nbsp;<\/p>\n<p>\u201cThe key is to ensure that all input is properly validated, and that servers are configured to only allow necessary inbound and outbound traffic. In addition, by keeping your cloud environment secure \u2014 for instance, by enforcing proper cloud security hygiene, adhering to the principle of least privilege, patching vulnerabilities, and avoiding misconfigurations \u2014 you can further limit the damage an attacker can achieve,\u201d Shitrit said.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34229\/Four-Azure-Services-Vulnerable-To-SSRF-Flaws.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50167,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[235],"class_list":["post-50166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemicrosoftflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Four Azure Services Vulnerable To SSRF Flaws 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Four Azure Services Vulnerable To SSRF Flaws 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-18T15:53:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/06\/061422_microsoft_logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Four Azure Services Vulnerable To SSRF Flaws\",\"datePublished\":\"2023-01-18T15:53:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/\"},\"wordCount\":641,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/four-azure-services-vulnerable-to-ssrf-flaws.jpg\",\"keywords\":[\"headline,microsoft,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/\",\"name\":\"Four Azure Services Vulnerable To SSRF Flaws 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/four-azure-services-vulnerable-to-ssrf-flaws.jpg\",\"datePublished\":\"2023-01-18T15:53:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/four-azure-services-vulnerable-to-ssrf-flaws.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/four-azure-services-vulnerable-to-ssrf-flaws.jpg\",\"width\":1500,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/four-azure-services-vulnerable-to-ssrf-flaws\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemicrosoftflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Four Azure Services Vulnerable To SSRF Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Four Azure Services Vulnerable To SSRF Flaws 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Four Azure Services Vulnerable To SSRF Flaws 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-18T15:53:36+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2022\/06\/061422_microsoft_logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Four Azure Services Vulnerable To SSRF Flaws","datePublished":"2023-01-18T15:53:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/"},"wordCount":641,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/01\/four-azure-services-vulnerable-to-ssrf-flaws.jpg","keywords":["headline,microsoft,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/","url":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/","name":"Four Azure Services Vulnerable To SSRF Flaws 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/01\/four-azure-services-vulnerable-to-ssrf-flaws.jpg","datePublished":"2023-01-18T15:53:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/01\/four-azure-services-vulnerable-to-ssrf-flaws.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/01\/four-azure-services-vulnerable-to-ssrf-flaws.jpg","width":1500,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/four-azure-services-vulnerable-to-ssrf-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflaw\/"},{"@type":"ListItem","position":3,"name":"Four Azure Services Vulnerable To SSRF Flaws"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50166"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50166\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50167"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}