{"id":52329,"date":"2023-06-13T20:52:05","date_gmt":"2023-06-13T20:52:05","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34717\/Fortinet-Warns-Customers-Of-Possible-Zero-Day-Exploited-In-Limited-Attacks.html"},"modified":"2023-06-13T20:52:05","modified_gmt":"2023-06-13T20:52:05","slug":"fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/","title":{"rendered":"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/06\/fortinet.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Fortinet warned customers on Monday that the recently patched vulnerability tracked as CVE-2023-27997 could be a zero-day flaw that has been exploited in limited attacks.<\/strong>\n<\/p>\n<p>News broke over the weekend that updates released by Fortinet for its FortiOS operating system <a href=\"https:\/\/www.securityweek.com\/fortinet-patches-critical-fortigate-ssl-vpn-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">patch CVE-2023-27997<\/a>, a critical vulnerability that can be exploited by a remote, unauthenticated attacker for arbitrary code execution.&nbsp;\n<\/p>\n<p>On Monday, <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-097\" target=\"_blank\" rel=\"noreferrer noopener\">Fortinet confirmed<\/a> that the latest FortiOS and FortiProxy updates address the flaw, which it has described as a critical heap-based buffer overflow in the SSL-VPN module that can allow a remote hacker to execute arbitrary code or commands using specifically crafted requests.\n<\/p>\n<p>Fortinet also confirmed that the researchers who broke the news over the weekend, Charles Fol and Dany Bach from French cybersecurity firm Lexfo, were indeed the ones who informed it about the flaw.&nbsp;\n<\/p>\n<p>In addition to its advisory, Fortinet on Monday published a blog post <a href=\"https:\/\/www.fortinet.com\/blog\/psirt-blogs\/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign\" target=\"_blank\" rel=\"noreferrer noopener\">clarifying<\/a> that CVE-2023-27997 is just one of the six FortiOS vulnerabilities resolved with the latest updates. The remaining flaws were discovered internally as part of an audit of the SSL-VPN module that was triggered by the <a href=\"https:\/\/www.securityweek.com\/chinese-hackers-exploited-fortinet-vpn-vulnerability-zero-day\/\" target=\"_blank\" rel=\"noreferrer noopener\">in-the-wild exploitation of CVE-2022-42475<\/a>.\n<\/p>\n<p>Exploitation of CVE-2022-42475 has been linked to a Chinese threat actor, which had used it as a zero-day in attacks aimed at government and other types of organizations.&nbsp;\n<\/p>\n<p>As for the new zero-day, Fortinet said its investigation found that CVE-2023-27997 \u201cmay have been exploited in a limited number of cases\u201d. The company is working with customers to monitor the situation.&nbsp;<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>\u201cFor this reason, if the customer has SSL-VPN enabled, Fortinet is advising customers to take immediate action to upgrade to the most recent firmware release. If the customer is not operating SSL-VPN the risk of this issue is mitigated \u2013 however, Fortinet still recommends upgrading,\u201d Fortinet said.\n<\/p>\n<p>No information has been shared on the attacks potentially exploiting CVE-2023-27997, but the company did clarify that the zero-day is currently not being linked to the recently disclosed Volt Typhoon campaign.&nbsp;\n<\/p>\n<p>The <a href=\"https:\/\/www.securityweek.com\/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Volt Typhoon campaign<\/a> was detailed by Microsoft in May. The goal of the operation, believed to be the work of a Chinese state-sponsored threat group, has been to steal data from critical infrastructure organizations in the US territory of Guam.\n<\/p>\n<p>Microsoft said the hackers exploited internet-exposed Fortinet FortiGuard firewalls for initial access. Fortinet believes, based on indicators of compromise (IoCs), that the Volt Typhoon campaign has exploited CVE-2022-40684, a security hole that has been widely <a href=\"https:\/\/www.securityweek.com\/cybercriminals-selling-access-networks-compromised-recent-fortinet-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">exploited for initial access<\/a> since at least the fall of 2022.&nbsp;\n<\/p>\n<p><strong>Related<\/strong>:<a href=\"https:\/\/www.securityweek.com\/chinese-hackers-exploited-fortinet-vpn-vulnerability-zero-day\/\"> Chinese Hackers Exploited Fortinet VPN Vulnerability as Zero-Day<\/a>\n<\/p>\n<p><strong>Related<\/strong>:<a href=\"https:\/\/www.securityweek.com\/fortinet-finds-zero-day-exploit-in-government-attacks-after-devices-detect-integrity-breach\/\"> Fortinet Finds Zero-Day Exploit in Government Attacks After Devices Detect Integrity Breach<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34717\/Fortinet-Warns-Customers-Of-Possible-Zero-Day-Exploited-In-Limited-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52330,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7530],"class_list":["post-52329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflawzero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-13T20:52:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/06\/fortinet.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks\",\"datePublished\":\"2023-06-13T20:52:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\"},\"wordCount\":465,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg\",\"keywords\":[\"headline,hacker,flaw,zero day\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\",\"name\":\"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg\",\"datePublished\":\"2023-06-13T20:52:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw,zero day\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawzero-day\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-13T20:52:05+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/06\/fortinet.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks","datePublished":"2023-06-13T20:52:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/"},"wordCount":465,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg","keywords":["headline,hacker,flaw,zero day"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/","name":"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg","datePublished":"2023-06-13T20:52:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fortinet-warns-customers-of-possible-zero-day-exploited-in-limited-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawzero-day\/"},{"@type":"ListItem","position":3,"name":"Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52329"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52330"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}