{"id":53001,"date":"2023-07-31T15:14:15","date_gmt":"2023-07-31T15:14:15","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34850\/Second-Ivanti-EPMM-Zero-Day-Vulnerability-Exploited-In-Targeted-Attacks.html"},"modified":"2023-07-31T15:14:15","modified_gmt":"2023-07-31T15:14:15","slug":"second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/","title":{"rendered":"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/Ivanti.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Ivanti has warned customers about a second zero-day vulnerability in its Endpoint Manager Mobile (EPMM) product that has been exploited in targeted attacks.<\/strong>\n<\/p>\n<p>Norwegian authorities announced on July 24 that a dozen government ministries had been targeted in a cyberattack involving <a href=\"https:\/\/www.securityweek.com\/ivanti-zero-day-vulnerability-exploited-in-attack-on-norwegian-government\/\" target=\"_blank\" rel=\"noreferrer noopener\">exploitation of CVE-2023-35078<\/a>, an Ivanti EPMM zero-day that allows an unauthenticated attacker to obtain sensitive information and make changes to impacted servers.&nbsp;\n<\/p>\n<p>Further investigation by cybersecurity firm Mnemonic revealed the existence of <a href=\"https:\/\/www.mnemonic.io\/resources\/blog\/threat-advisory-remote-file-write-vulnerability-in-ivanti-epmm\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-3508<\/a>, a high-severity flaw that allows an authenticated attacker with administrator privileges to remotely write arbitrary files to the server.&nbsp;\n<\/p>\n<p>Late last week, Ivanti published an <a href=\"https:\/\/forums.ivanti.com\/s\/article\/CVE-2023-35081-Arbitrary-File-Write?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">advisory<\/a> and CISA issued an <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/07\/28\/ivanti-releases-security-updates-epmm-address-cve-2023-35081\" target=\"_blank\" rel=\"noreferrer noopener\">alert<\/a> to inform organizations about this second vulnerability and warn them of active exploitation. Organizations have been urged to immediately patch their devices.\n<\/p>\n<p>EPMM, formerly known as MobileIron Core, is a mobile management software engine used by IT teams to set policies for mobile devices, applications, and content.&nbsp;\n<\/p>\n<p>Ivanti noted that CVE-2023-35081 can be exploited in conjunction with CVE-2023-35078 to bypass admin authentication and access control list (ACL) restrictions.&nbsp;\n<\/p>\n<p>\u201cSuccessful exploitation can be used to write malicious files to the appliance, ultimately allowing a malicious actor to execute OS commands on the appliance as the tomcat user,\u201d Ivanti explained. \u201cAs of now we are only aware of the same limited number of customers impacted by CVE-2023-35078 as being impacted by CVE-2023-35081.\u201d<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>It\u2019s still unclear who is behind the attacks exploiting these zero-days, but it\u2019s likely a state-sponsored threat actor.\n<\/p>\n<p>While currently the vulnerabilities have been leveraged in limited attacks, exploitation is likely to increase considering that there are thousands of potentially vulnerable <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1683763912347459585\" target=\"_blank\" rel=\"noreferrer noopener\">internet-exposed systems<\/a> and <a href=\"https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC\" target=\"_blank\" rel=\"noreferrer noopener\">proof-of-concept (PoC) code<\/a> for CVE-2023-35078 has become available.&nbsp;\n<\/p>\n<p>CISA\u2019s<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\"> Known Exploited Vulnerabilities Catalog<\/a> currently lists 10 Ivanti product flaws, but it does not include the latest zero-day. The flaws affect Pulse Connect Secure and MobileIron products, which<a href=\"https:\/\/www.securityweek.com\/ivanti-acquires-mobileiron-pulse-secure\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Ivanti acquired<\/a> in 2020.&nbsp;&nbsp;\n<\/p>\n<p><strong>Related<\/strong>:<a href=\"https:\/\/www.securityweek.com\/citrix-zero-day-exploited-against-critical-infrastructure-organization\/\"> Citrix Zero-Day Exploited Against Critical Infrastructure Organization<\/a>\n<\/p>\n<p><strong>Related<\/strong>:<a href=\"https:\/\/www.securityweek.com\/adobe-releases-new-patches-for-exploited-coldfusion-vulnerabilities\/\"> Adobe Releases New Patches for Exploited ColdFusion Vulnerabilities<\/a>\n<\/p>\n<p><strong>Related<\/strong>:<a href=\"https:\/\/www.securityweek.com\/zero-day-vulnerability-exploited-to-hack-barracuda-email-security-gateway-appliances\/\"> Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34850\/Second-Ivanti-EPMM-Zero-Day-Vulnerability-Exploited-In-Targeted-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53002,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7530],"class_list":["post-53001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflawzero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-31T15:14:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/Ivanti.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks\",\"datePublished\":\"2023-07-31T15:14:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\"},\"wordCount\":369,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg\",\"keywords\":[\"headline,hacker,flaw,zero day\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\",\"name\":\"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg\",\"datePublished\":\"2023-07-31T15:14:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw,zero day\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawzero-day\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-07-31T15:14:15+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/07\/Ivanti.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks","datePublished":"2023-07-31T15:14:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/"},"wordCount":369,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg","keywords":["headline,hacker,flaw,zero day"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/","name":"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg","datePublished":"2023-07-31T15:14:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/07\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/second-ivanti-epmm-zero-day-vulnerability-exploited-in-targeted-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawzero-day\/"},{"@type":"ListItem","position":3,"name":"Second Ivanti EPMM Zero-Day Vulnerability Exploited In Targeted Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53001"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53001\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53002"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}