{"id":50235,"date":"2023-01-23T23:29:00","date_gmt":"2023-01-23T23:29:00","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/wallarm-aims-to-reduce-the-harm-from-compromised-apis"},"modified":"2023-01-23T23:29:00","modified_gmt":"2023-01-23T23:29:00","slug":"wallarm-aims-to-reduce-the-harm-from-compromised-apis","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/","title":{"rendered":"Wallarm Aims to Reduce the Harm From Compromised APIs"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"46.733944954128\">\n<div readability=\"43.068537506746\">\n<p>Just as pants are most likely to split along the seam, enterprise also risks holes opening up along the seam between systems: APIs. The scope of the potential problem is clear, with 78% of engineering teams managing <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/new-survey-sheds-light-on-why-enterprises-struggle-to-thwart-api-attacks\" target=\"_blank\" rel=\"noopener\">upwards of 250 API keys<\/a>, tokens, or certificates. It makes sense that API leaks are becoming more common \u2014 with a reported <a href=\"https:\/\/www.darkreading.com\/edge-ask-the-experts\/what-are-some-ways-to-make-apis-more-secure-\" target=\"_blank\" rel=\"noopener\">rise of 681%<\/a> in 2021 alone \u2014 as tech stacks get more complex and software supply chains grow longer.<\/p>\n<p>To help organizations ward off these intrusions, API security company Wallarm recently added a feature called API Leak Management to its End-to-End API Security bundle. Now <a href=\"https:\/\/lab.wallarm.com\/introducing-proactive-api-leak-management\/\" target=\"_blank\" rel=\"noopener\">in early release<\/a>, the solution will alert you when it detects a leak, allowing security staff to quickly revoke and block the leaked key through a unified interface.<\/p>\n<p>The new capability automates detection, remediation, and control to protect API secrets. It continuously monitors public sources for leaked API keys and resources. If any are found, the software revokes the key and blocks requests that reference it across the client&#8217;s entire presence. API Leak Management then continues to automatically monitor and block future attempts to use leaked secrets.<\/p>\n<p>Numerous high-profile breaches in 2022 trace back to <a href=\"https:\/\/www.darkreading.com\/application-security\/internet-appsec-remains-abysmal-requires-sustained-action-in-2023\" target=\"_blank\" rel=\"noopener\">losing control<\/a> of API keys and other secrets, including <a href=\"https:\/\/www.darkreading.com\/dr-tech\/use-circleci-here-are-3-steps-you-need-to-take\" target=\"_blank\" rel=\"noopener\">CircleCI<\/a>, <a href=\"https:\/\/www.darkreading.com\/application-security\/200m-twitter-profiles-dumped-dark-web-free-including-emails\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>, and <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/fbi-helping-australian-authorities-investigate-massive-optus-data-breach-reports\" target=\"_blank\" rel=\"noopener\">Optus<\/a>. Such breaches cost companies an average of <a href=\"https:\/\/www.darkreading.com\/edge-articles\/api-secrets-where-the-bearer-model-breaks-down\" target=\"_blank\" rel=\"noopener\">$1.2 million annually<\/a>, which makes <a href=\"https:\/\/www.darkreading.com\/dr-tech\/api-security-is-the-new-black\" target=\"_blank\" rel=\"noopener\">API security an imperative priority<\/a> for enterprise.<\/p>\n<p>Attackers commonly target API keys and secrets because they provide direct access to the data and infrastructure, according to Ivan Novikov, CEO and co-founder of Wallarm. &#8220;Our API Leak Management solution allows enterprise customers to automatically detect and block the use of leaked API keys, providing an additional layer of security for their data to reduce organizational risk,&#8221; he said <a href=\"https:\/\/lab.wallarm.com\/wallarm-releases-api-leaks-solution\/\" target=\"_blank\" rel=\"noopener\">in a statement<\/a>.<\/p>\n<\/div>\n<\/div>\n<div id=\"articleFooter-newsletterSignup\" readability=\"10.473404255319\">\n<p>Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.<\/p>\n<p><a class=\"subscribe-btn dr-btn\" href=\"https:\/\/darkreading.tradepub.com\/c\/pubRD.mpl?secure=1&amp;sr=pp&amp;_t=pp:&amp;qf=w_defa3135&amp;ch=dr_eoa\" title=\"Subscribe\" target=\"_blank\" rel=\"noreferrer noopener\">Subscribe<\/a><\/div>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>API Leak Management software discovers exposed API keys and other secrets, blocks their use, and monitors for abuse, the company says.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-50235","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wallarm Aims to Reduce the Harm From Compromised APIs 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wallarm Aims to Reduce the Harm From Compromised APIs 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-23T23:29:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Wallarm Aims to Reduce the Harm From Compromised APIs\",\"datePublished\":\"2023-01-23T23:29:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\"},\"wordCount\":324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\",\"name\":\"Wallarm Aims to Reduce the Harm From Compromised APIs 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg\",\"datePublished\":\"2023-01-23T23:29:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wallarm Aims to Reduce the Harm From Compromised APIs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wallarm Aims to Reduce the Harm From Compromised APIs 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/","og_locale":"en_US","og_type":"article","og_title":"Wallarm Aims to Reduce the Harm From Compromised APIs 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-23T23:29:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Wallarm Aims to Reduce the Harm From Compromised APIs","datePublished":"2023-01-23T23:29:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/"},"wordCount":324,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/","url":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/","name":"Wallarm Aims to Reduce the Harm From Compromised APIs 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg","datePublished":"2023-01-23T23:29:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt764abd78bcf365f2\/63cf17df57c37257a7db94d4\/rippedseam-Marina-AdobeStock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wallarm-aims-to-reduce-the-harm-from-compromised-apis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Wallarm Aims to Reduce the Harm From Compromised APIs"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50235"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50235\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}