{"id":52810,"date":"2023-07-17T13:32:11","date_gmt":"2023-07-17T13:32:11","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34801\/Email-Hack-Prompts-Calls-For-Microsoft-To-Make-Security-Logs-Free.html"},"modified":"2023-07-17T13:32:11","modified_gmt":"2023-07-17T13:32:11","slug":"email-hack-prompts-calls-for-microsoft-to-make-security-logs-free","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/","title":{"rendered":"Email Hack Prompts Calls For Microsoft To Make Security Logs Free"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/07\/Outlook-copy-scaled-e1689596085374.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Microsoft has been criticized for charging its cloud services customers extra to access security logs after a China-based threat group <a href=\"https:\/\/www.scmagazine.com\/news\/cloud-security\/microsoft-blocks-attack-on-cloud-email-accounts-by-chinese-apt-group\" target=\"_blank\" rel=\"noreferrer noopener\">hacked email accounts<\/a> from more than two dozen organizations, including U.S. government agencies.<\/p>\n<p>The agencies targeted by the attackers reportedly include the State and Commerce Departments. Among the individuals email accounts accessed was one belonging to Secretary of Commerce Gina Raimondo.<\/p>\n<p>The threat group behind the attacks, identified by Microsoft as Storm-0558, used forged authentication tokens to access Microsoft 365 (M365) accounts using Outlook Web Access and Outlook.com. The attacks were <a href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/07\/microsoft-mitigates-china-based-threat-actor-storm-0558-targeting-of-customer-email\/\" target=\"_blank\" rel=\"noreferrer noopener\">first revealed<\/a> July 11 and Microsoft provided a more detailed account of the compromise <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/14\/analysis-of-storm-0558-techniques-for-unauthorized-email-access\/\" target=\"_blank\" rel=\"noreferrer noopener\">on Friday<\/a> last week.<\/p>\n<p>Microsoft said it had completed mitigation of the attack for all customers and was still investigating how the attackers acquired the forged tokens.<\/p>\n<h2>\u2018Pay to play\u2019 security<\/h2>\n<p>Steven Adair, president of Volexity, <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/stevenadair\/status\/1679240837119590401\" target=\"_blank\">said on Twitter<\/a> his security firm worked with one of the impacted organizations and \u201cdespite a notification from Microsoft regarding unauthorized access, we could not find any corroborating evidence.\u201d<\/p>\n<p>\u201cThe incident was invisible to us with the data at our disposal and this was due to the customer\u2019s M365 license level: E3,\u201d he said.<\/p>\n<p>While email access attacks were logged by Microsoft\u2019s \u201cMailItemsAccessed\u201d operation, a log of that operation was generally not available to customers, like the victim, who held E3 licensees. It was part of the additional logging capability provided on Microsoft\u2019s more expensive E5 and G5 plans, Adair said.<\/p>\n<p>Dublin-based independent security consultant Brian Honan said the organization that first detected the Storm-0558 attack was only able to do so because it subscribed to the E5 plan.<\/p>\n<p>\u201cMicrosoft and other cloud service providers need to provide their clients with access to security logs and not have this as a feature that is an additional charge,\u201d he said.<\/p>\n<p>Sen. Ron Wyden, D-Ore., said in a statement the extra costs were akin to \u201cselling a car and then charging extra for seatbelts and airbags.&#8221;<\/p>\n<p>A Microsoft spokesperson <a rel=\"noreferrer noopener\" href=\"https:\/\/cyberscoop.com\/microsoft-china-hacking-state\/\" target=\"_blank\">told CyberScoop<\/a> the company was \u201cevaluating feedback,\u201d and remained \u201copen to other models.\u201d<\/p>\n<h2>Key access remains a mystery<\/h2>\n<p>In its Friday analysis of the attack, Microsoft said Storm-0558 began using forged authentication tokens to access user email on May 15 this year.<\/p>\n<p>\u201cSince identification of this malicious campaign on June 16, 2023, Microsoft has identified the root cause, established durable tracking of the campaign, disrupted malicious activities, hardened the environment, notified every impacted customer, and coordinated with multiple government entities.\u201d<\/p>\n<p>The threat actor\u2019s methods were consistent with those of an espionage-focused adversary and while Microsoft had observed \u201csome minimal overlaps with other Chinese groups\u201d such as Violet Typhoon (also known as Zirconium, APT31), it appears Storm-0558 operated as a distinct group.<\/p>\n<p>\u201cHistorically, this threat actor has displayed an interest in targeting media companies, think tanks, and telecommunications equipment and service providers. The objective of most Storm-0558 campaigns is to obtain unauthorized access to email accounts belonging to employees of targeted organizations.\u201d<\/p>\n<p>According to the post, Storm-0558 acquired an inactive Microsoft account (MSA) consumer signing key and used it to forge authentication tokens for Azure AD enterprise and MSA consumer to access OWA and Outlook.com.<\/p>\n<p>\u201cThe method by which the actor acquired the key is a matter of ongoing investigation,\u201d Microsoft said.<\/p>\n<p>\u201cOngoing monitoring indicates that all actor activity related to this incident has been blocked. Microsoft will continue to monitor Storm-0558 activity and implement protections for our customers.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34801\/Email-Hack-Prompts-Calls-For-Microsoft-To-Make-Security-Logs-Free.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52811,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10596],"class_list":["post-52810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermicrosoftemail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Email Hack Prompts Calls For Microsoft To Make Security Logs Free 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Hack Prompts Calls For Microsoft To Make Security Logs Free 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-17T13:32:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/07\/Outlook-copy-scaled-e1689596085374.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Email Hack Prompts Calls For Microsoft To Make Security Logs Free\",\"datePublished\":\"2023-07-17T13:32:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/\"},\"wordCount\":582,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg\",\"keywords\":[\"headline,hacker,microsoft,email\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/\",\"name\":\"Email Hack Prompts Calls For Microsoft To Make Security Logs Free 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg\",\"datePublished\":\"2023-07-17T13:32:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg\",\"width\":1200,\"height\":961},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,email\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermicrosoftemail\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Hack Prompts Calls For Microsoft To Make Security Logs Free\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Email Hack Prompts Calls For Microsoft To Make Security Logs Free 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/","og_locale":"en_US","og_type":"article","og_title":"Email Hack Prompts Calls For Microsoft To Make Security Logs Free 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-17T13:32:11+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/07\/Outlook-copy-scaled-e1689596085374.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Email Hack Prompts Calls For Microsoft To Make Security Logs Free","datePublished":"2023-07-17T13:32:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/"},"wordCount":582,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg","keywords":["headline,hacker,microsoft,email"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/","url":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/","name":"Email Hack Prompts Calls For Microsoft To Make Security Logs Free 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg","datePublished":"2023-07-17T13:32:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free.jpg","width":1200,"height":961},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/email-hack-prompts-calls-for-microsoft-to-make-security-logs-free\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,email","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftemail\/"},{"@type":"ListItem","position":3,"name":"Email Hack Prompts Calls For Microsoft To Make Security Logs Free"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52810"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52811"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}