{"id":51667,"date":"2023-04-26T14:41:50","date_gmt":"2023-04-26T14:41:50","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34552\/How-AI-Subverts-Democracy-And-How-To-Fight-Back.html"},"modified":"2023-04-26T14:41:50","modified_gmt":"2023-04-26T14:41:50","slug":"how-ai-subverts-democracy-and-how-to-fight-back","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/","title":{"rendered":"How AI Subverts Democracy And How To Fight Back"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/Schneier.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>SAN FRANCISCO \u2014 Democracy is hackable. It is a complex set of economic, social and political systems that mimic the algorithms and protocols of computer code. When abused, democracy can be exploited by special interest hackers to find tax loopholes and ways to abuse obscure regulations and laws for their own self-interest.<\/p>\n<p>This <a href=\"https:\/\/www.scmagazine.com\/news\/apt\/russia-tried-to-disrupt-u-s-democracy-trump-helped-push-agenda\" target=\"_blank\" rel=\"noreferrer noopener\">subversion of democracy<\/a> is real, said security technologist Bruce Schneier, speaking on April 25 at the RSA Conference 2023. But he said, the <a href=\"https:\/\/www.scmagazine.com\/news\/cybercrime\/google-offers-free-ddos-protection-services-in-the-name-of-free-democracy\" target=\"_blank\" rel=\"noreferrer noopener\">threats hackers pose to democracy<\/a> can be mitigated by applying the same defensive mindset that cybersecurity professionals use to defend information systems.<\/p>\n<p>\u201cLike any protocol, democracy has vulnerabilities and exploits. We can design them to be more secure,\u201d he said.<\/p>\n<p>Schneier argued artificial intelligence is accelerating the subversion of democracy, but also holds the promise of making it more secure.<\/p>\n<p>\u201cAI will be able to figure out how to take advantage of more &#8230; [It will help] find new tax loopholes, find new ways to evade financial regulations, creating micro-legislation that surreptitiously benefits one particular person or group,\u201d Schneier said.<\/p>\n<p><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/topic\/rsac\" target=\"_blank\">Click here for all of SC Media&#8217;s coverage from the RSA Conference 2023<\/a><\/strong><\/p>\n<p>Hacking democracy isn\u2019t a new concept and one that Shneier has opined about in previous RSA Conferences. But, he argued, \u201ctoday&#8217;s hacking scales better and it&#8217;s overwhelming the security systems in place to keep hacking in check.\u201d<\/p>\n<h2>Artificial intelligence: the problem and the solution<\/h2>\n<p>Speaking to the audience of cybersecurity experts, he argued that as technology becomes an even more powerful influencer in our democratic society that it&#8217;s time for security professionals to apply their problem-solving skills of finding vulnerabilities, patching bugs and harden network defenses on protecting the cyber mechanisms underpinning democracy.<\/p>\n<p>However, <a href=\"https:\/\/www.scmagazine.com\/news\/emerging-technology\/good-ai-vs-bad-ai-artificial-intelligence-takes-rsa-conference-by-storm\" target=\"_blank\" rel=\"noreferrer noopener\">AI is both the problem and the solution<\/a> to mitigating threats to democracy isn\u2019t as straightforward as the blocking and tackling done by network administrators.<\/p>\n<p>\u201cHow do you take knowledge in the computer field and apply them to non-computer socio-technical systems?\u201d he asked.<\/p>\n<p>Here, Schneier made no apology for not having all the answers yet, but proposed several heady ideas, one being &#8220;liquid democracy,&#8221; as he called it. One of its tenants is to create a new system based on an egalitarian AI technology that tracks micro and macro preferences of an individual that could then be turned into policy.<\/p>\n<p>\u201cImagine if we had an AI (device) in our pocket that voted on our behalf 1,000 times a day based on preferences it inferred we have. \u2026 It would be just an algorithm for converting individual preferences into policy decisions,\u201d he said.<\/p>\n<p>Empowering a trusted proxy to communicate your policy positions would more accurately reflect the will of the people versus a less-than-ideal gerrymandered (or hacked) will of few, he argued.<\/p>\n<p>This liquid democracy, he said, assumes a benevolent flavor of AI not controlled by large corporate monopolies or an oppressive government and works towards a societal greater good.<\/p>\n<p>\u201cAny AI system should engage individuals in the process of democracy, not replace them,\u201d he said. \u201cThe goal has to accommodate plurality\u201d and not foment tribalism within society.<\/p>\n<p>The imperative is now for a more balanced shaping of AI\u2019s applications in the real world. AI, he argued, ups the ante on a timeline for catastrophic risks. Those risks include climate change, synthetic biology, molecular nanotechnology and nuclear weapons. Liquid democracy, Schneier said, allows the will of the people to help shape future policies, not just the interests of the few.<\/p>\n<p>\u201cMisaligned centers of hacking have catastrophic consequences for society,\u201d he said.<\/p>\n<p>Building present day and future AI systems, Schneier said, must be a transparent process.<\/p>\n<p>\u201cThese [AI] systems aren&#8217;t super opaque, and that&#8217;s become increasingly not OK,\u201d he said. \u201cEven if we know the training data used and understand how the model work there are all these emergent properties that make no sense.\u201d<\/p>\n<p>\u201cI don&#8217;t know how to solve all these problems. But this feels like something that we as security people can help the community with,\u201d he said.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34552\/How-AI-Subverts-Democracy-And-How-To-Fight-Back.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51668,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10493],"class_list":["post-51667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentbotnetscienceconferencersa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How AI Subverts Democracy And How To Fight Back 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI Subverts Democracy And How To Fight Back 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-26T14:41:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/Schneier.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How AI Subverts Democracy And How To Fight Back\",\"datePublished\":\"2023-04-26T14:41:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/\"},\"wordCount\":676,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/how-ai-subverts-democracy-and-how-to-fight-back.jpg\",\"keywords\":[\"headline,government,botnet,science,conference,rsa\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/\",\"name\":\"How AI Subverts Democracy And How To Fight Back 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/how-ai-subverts-democracy-and-how-to-fight-back.jpg\",\"datePublished\":\"2023-04-26T14:41:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/how-ai-subverts-democracy-and-how-to-fight-back.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/how-ai-subverts-democracy-and-how-to-fight-back.jpg\",\"width\":1080,\"height\":621},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-subverts-democracy-and-how-to-fight-back\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,botnet,science,conference,rsa\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentbotnetscienceconferencersa\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How AI Subverts Democracy And How To Fight Back\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How AI Subverts Democracy And How To Fight Back 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/","og_locale":"en_US","og_type":"article","og_title":"How AI Subverts Democracy And How To Fight Back 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-26T14:41:50+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/04\/Schneier.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How AI Subverts Democracy And How To Fight Back","datePublished":"2023-04-26T14:41:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/"},"wordCount":676,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/how-ai-subverts-democracy-and-how-to-fight-back.jpg","keywords":["headline,government,botnet,science,conference,rsa"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/","url":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/","name":"How AI Subverts Democracy And How To Fight Back 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/how-ai-subverts-democracy-and-how-to-fight-back.jpg","datePublished":"2023-04-26T14:41:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/how-ai-subverts-democracy-and-how-to-fight-back.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/how-ai-subverts-democracy-and-how-to-fight-back.jpg","width":1080,"height":621},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-subverts-democracy-and-how-to-fight-back\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,botnet,science,conference,rsa","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentbotnetscienceconferencersa\/"},{"@type":"ListItem","position":3,"name":"How AI Subverts Democracy And How To Fight Back"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51667"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51668"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}