{"id":51961,"date":"2023-05-18T13:25:28","date_gmt":"2023-05-18T13:25:28","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34634\/Threat-Actor-Bypasses-Detection-Protections-In-Microsoft-Azure-Serial-Console.html"},"modified":"2023-05-18T13:25:28","modified_gmt":"2023-05-18T13:25:28","slug":"threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/","title":{"rendered":"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/032423_microsoft_azure.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A threat actor Mandiant calls <a href=\"https:\/\/www.scmagazine.com\/news\/ransomware\/microsoft-blocks-threat-actors-that-obtained-signed-drivers-to-deploy-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">UNC3944<\/a> was observed abusing privileged accounts to access the Microsoft Azure Serial Console. In doing so, UNC3944 bypassed many of the defense and detection methods used within <a href=\"https:\/\/www.scmagazine.com\/news\/cloud-security\/cisa-tools-detection-malicious-activity-microsoft-azure\" target=\"_blank\" rel=\"noreferrer noopener\">Azure,<\/a> thereby gaining full administrative access to the text-based console for Windows virtual machines (VMs).<\/p>\n<p>Mandiant researchers said in a <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/sim-swapping-abuse-azure-serial\" target=\"_blank\" rel=\"noreferrer noopener\">May 16<\/a> blog post said that UNC3944 did this by leveraging SIM swapping attacks through multiple intrusions, some of which included the Azure Serial Console and other Azure extensions. &nbsp;<\/p>\n<p>In an email response to SC Media, the Mandiant researchers said UNC3944 is \u201cloosely comprised of individuals from around the world \u2014 not necessarily one location. Many members are native English speakers and they conduct intrusions for various motivations, including financial gain and fame and glory.\u201d<\/p>\n<p>The Mandiant researchers said that while they\u2019ve seen these various techniques used by UNC3944 a few times and first identified the group in May 2022, the techniques are not widely known by the security community.&nbsp;The researchers pointed out in the blog that cloud resources are often poorly misunderstood, leading to misconfigurations that can leave assets vulnerable to attackers.<\/p>\n<p>\u201cWhile methods of initial access, lateral movement, and persistence vary from one attacker to another, one thing is clear: attackers have their eyes on the cloud,\u201d the researchers wrote.<\/p>\n<p>The case shows how attackers are becoming more ingenious about bypassing traditional security checks and controls, and the evolution of these attacks as the true perimeter has moved from being the endpoint and network, and is now mobile and cloud, explained Kern Smith, vice president of Americas, sales engineering at Zimperium.<\/p>\n<p>\u201cIncreasingly, these attacks target users where organizations have no visibility into using traditional security tooling, such as smishing, to gain the information needed to enable these types of attacks, in this case gain credentials and impersonate trusted machines,\u201d said Smith. \u201cIt\u2019s important that organizations adapt to this evolution, and invest in security tools that can prevent these types of targeted smishing campaigns from being successful, and also do so in a way that enables their workforce, while not inhibiting productivity, or impacting user privacy.\u201d<\/p>\n<p>Bud Broomhead, chief executive officer at Viakoo, explained that the threat of SIM swapping has mainly been personal: a threat actor gets a SIM and thwarts MFA to drain the user\u2019s bank account.&nbsp;Broomhead said in this case, the threat actor group (UNC3944) is also financially motivated, but operating at a corporate level (not individual), making the possibilities more extensive.<\/p>\n<p>\u201cA single SIM swap of someone with administrator privileges provides endless opportunities for persistence through creation of new accounts and ability to move laterally within the infrastructure,\u201d said Broomhead. \u201cThe threats in this case can go far beyond direct financial gain or data exfiltration. By gaining control of an organization\u2019s Azure environment, the threat actor can plant deepfakes, modify data, and even control IoT\/OT assets that are often managed within the cloud.\u201d&nbsp;<\/p>\n<p>Broomhead said relying on SIM-based MFA has become a bad practice these days, now that other forms of authentication are available, including FIDO2, Azure AD certificates, and Windows Hello for Business.&nbsp; If an organization relies on a SIM-based MFA for authentication they should take additional security steps, said Broomhead, such as requiring that the mobile account gets managed and controlled by the organization and not the individual.<\/p>\n<p>\u201cHijacking SIMs is not easy and this threat actor may have a relationship with mobile operators that enables this exploit,\u201d Broomhead said.&nbsp;\u201cWill mobile operators be liable for breaches that result in SIM swapping? This case may make that more likely.\u201d&nbsp;<\/p>\n<p>Roy Akerman, co-founder and CEO of Rezonate, said while the SIM swapping technique is not new, Mandiant\u2019s report highlights that UNC3944 evolved to further expand its reach via compromised accounts to cloud infrastructure and the Azure AD user repository.<\/p>\n<p>\u201cLiving-off-the-land capabilities can easily turn to privilege escalation and lateral movement of jumping between organization\u2019s cloud accounts and higher-privileged roles that are all legitimate actions,\u201d Akerman said. \u201cNo malicious code or malware is involved. This is very similar to the evolution we\u2019ve seen in the endpoint space several years back on the shift to fileless \u2018malware\u2019 and leveraging the system against itself.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34634\/Threat-Actor-Bypasses-Detection-Protections-In-Microsoft-Azure-Serial-Console.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51962,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5505],"class_list":["post-51961","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermicrosoftflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-18T13:25:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/032423_microsoft_azure.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console\",\"datePublished\":\"2023-05-18T13:25:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\"},\"wordCount\":716,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg\",\"keywords\":[\"headline,hacker,microsoft,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\",\"name\":\"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg\",\"datePublished\":\"2023-05-18T13:25:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/","og_locale":"en_US","og_type":"article","og_title":"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-18T13:25:28+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/032423_microsoft_azure.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console","datePublished":"2023-05-18T13:25:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg","keywords":["headline,hacker,microsoft,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/","url":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/","name":"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg","datePublished":"2023-05-18T13:25:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/05\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-bypasses-detection-protections-in-microsoft-azure-serial-console\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftflaw\/"},{"@type":"ListItem","position":3,"name":"Threat Actor Bypasses Detection, Protections In Microsoft Azure Serial Console"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51961"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51961\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51962"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}