{"id":53193,"date":"2023-08-10T14:20:06","date_gmt":"2023-08-10T14:20:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34889\/Black-Hat-USA-Keynote-In-AI-Do-Not-Trust.html"},"modified":"2023-08-10T14:20:06","modified_gmt":"2023-08-10T14:20:06","slug":"black-hat-usa-keynote-in-ai-do-not-trust","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/","title":{"rendered":"Black Hat USA Keynote: In AI Do Not Trust"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/08\/Maria-Markstedter-BH-Keynote-resized.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>LAS VEGAS \u2014 Tired of the hype around artificial intelligence? Even keynote speakers here at Black Hat USA gave a nod to AI-topic fatigue. But they also warned the hype is warranted, given that today\u2019s \u201cAI language models are like troubled teenagers\u201d that need supervision.<\/p>\n<p>The observations came from Maria Markstedter, founder of Azeria Labs. The noted reverse engineering and exploitation expert kicked off Black Hat with an opening keynote on the promise and perils of AI. Top on her list was what she said was a likely emerging army of autonomous AI bots based on next-generation AI in rapid development today.<\/p>\n<p>&#8220;We are involved in a corporate [AI] arms race, not driven by security and safety,\u201d Markstedter said. &#8220;The technology world follows the credo &#8216;move fast break $%it.&#8217; That\u2019s been the model.&#8221; AI will follow the same trajectory as other first-generation technologies such as the first iPhone model \u2014 insecure and with an emergent patching process.<\/p>\n<p>\u201cDo you remember the first version of the iPhone? It was so insecure \u2014 everything was running as root. It was riddled with critical bugs. It lacked exploit mitigations or sandboxing,\u201d she said. \u201cThat didn&#8217;t stop us from pushing out the functionality and for businesses to become part of that ecosystem.\u201d<\/p>\n<p>Markstedter said that today\u2019s AI \u2014 dominated by the likes of OpenAI \u2014 is roughly equivalent to that first-generation tech. She called generative AI, based on language models, unimodal in that output (or answers) are based on text-based language models.<\/p>\n<p>\u201cAI is limited in its capability because it can only analyze one input at a time. It&#8217;s still pretty useful. But the concept of multimodal AI has been around for two years, and this year it is starting to take off,\u201d she said.<\/p>\n<p>A multimodal AI model pulls data from a bevvy of sources including text, audio and visual data sources. She warns the more data sources an AI system pulls from, the greater the risk that one of those data sources can be corrupted and impact the outcome to a malicious actor\u2019s intent. If that weren\u2019t problematic enough, Markstedter warned that a cottage industry has sprung up offering machine learning as a service.<\/p>\n<p>\u201cCompanies want control over their own data. And they want to integrate these model capabilities into their own products and services and deploy them within their infrastructure,\u201d she said.<\/p>\n<p>The ultimate goal, and where Markstedter said she envisioned the next big AI push, is autonomous AI agents that are able to process multimodal data inputs to generate consequential outcomes.<\/p>\n<p>\u201cExperimental AI agents are starting to pop up. We can already see people fumbling around with these agents. It&#8217;s all fun and games, but these AI agents are turning into real business-use cases,\u201d she said.<\/p>\n<p>Where is this headed? AI agents will live in two worlds; one a businesses proprietary well-curated language model. The second will be the public internet \u2014 where AI agents will need to pull real-time or third-party data to execute nondeterministic business outcomes.<\/p>\n<p>\u201cHow do we know if these outcomes can be trusted?\u201d she asked.<\/p>\n<p>She challenged the cybersecurity community to develop decompiling and reverse-engineering tools similar to Ghidra, IDA and Hex-Ray for AI.<\/p>\n<p>\u201cWe&#8217;re entering a world where we need to threat model an autonomous system having access to our business data apps with the authorization to perform nondeterministic actions,\u201d she said. \u201cWe could argue that these agents should and will stay subservient to humans. But the truth is that the usefulness of the systems will be bound to the ability to be autonomous.\u201d<\/p>\n<p>Wrestling security challenges tied to this future will force the a wholesale reexamination of access management and data security.<\/p>\n<p>\u201cSo where do we go from here? What I want you to take away from this is that AI systems and their use cases and capabilities are becoming more powerful. Second, we need to take the possibility of autonomous AI agents becoming a reality within our enterprise seriously. We need to rethink our concepts of identity access management in a world of truly autonomous systems having access to our apps.\u201d<\/p>\n<p>She closed out her keynote reframing the quote &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/arapahoelibraries.org\/blogs\/post\/the-only-constant-in-life-is-change-heraclitus\/#:~:text=One%20constant%20since%20the%20beginning,immemorial%2C%20humans%20have%20liked%20routine.\" target=\"_blank\">change is the only constant in life<\/a>.&#8221; &nbsp;<\/p>\n<p>\u201cIt&#8217;s been a few years since a technology has disrupted our current state of security as much as this one. So, we need to learn about the very technology that&#8217;s changing our systems and our threat models in order to address these emerging problems. Technological changes are new, but to us tech is always evolving. That part of security isn&#8217;t new.\u201d<\/p>\n<p>As part of the Black Hat USA opening keynote Perri Adams, program manager for DARPA\u2019s Information Innovation Office, made a surprise announcement of an AI Cyber Challenge (AIxCC), a two-year competition that aims to drive AI innovation and create a new generation of AI-based cybersecurity tools. See our previous <a href=\"https:\/\/www.scmagazine.com\/news\/darpa-sponsors-competition-for-ai-innovation-and-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">Black Hat coverage of the DARPA news<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34889\/Black-Hat-USA-Keynote-In-AI-Do-Not-Trust.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53194,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10634],"class_list":["post-53193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineusabotnetconference"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Black Hat USA Keynote: In AI Do Not Trust 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Black Hat USA Keynote: In AI Do Not Trust 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-10T14:20:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/08\/Maria-Markstedter-BH-Keynote-resized.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Black Hat USA Keynote: In AI Do Not Trust\",\"datePublished\":\"2023-08-10T14:20:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/\"},\"wordCount\":831,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/black-hat-usa-keynote-in-ai-do-not-trust.jpg\",\"keywords\":[\"headline,usa,botnet,conference\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/\",\"name\":\"Black Hat USA Keynote: In AI Do Not Trust 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/black-hat-usa-keynote-in-ai-do-not-trust.jpg\",\"datePublished\":\"2023-08-10T14:20:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/black-hat-usa-keynote-in-ai-do-not-trust.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/black-hat-usa-keynote-in-ai-do-not-trust.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/black-hat-usa-keynote-in-ai-do-not-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,usa,botnet,conference\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineusabotnetconference\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Black Hat USA Keynote: In AI Do Not Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Black Hat USA Keynote: In AI Do Not Trust 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/","og_locale":"en_US","og_type":"article","og_title":"Black Hat USA Keynote: In AI Do Not Trust 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-10T14:20:06+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/08\/Maria-Markstedter-BH-Keynote-resized.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Black Hat USA Keynote: In AI Do Not Trust","datePublished":"2023-08-10T14:20:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/"},"wordCount":831,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/black-hat-usa-keynote-in-ai-do-not-trust.jpg","keywords":["headline,usa,botnet,conference"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/","url":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/","name":"Black Hat USA Keynote: In AI Do Not Trust 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/black-hat-usa-keynote-in-ai-do-not-trust.jpg","datePublished":"2023-08-10T14:20:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/black-hat-usa-keynote-in-ai-do-not-trust.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/black-hat-usa-keynote-in-ai-do-not-trust.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/black-hat-usa-keynote-in-ai-do-not-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,usa,botnet,conference","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineusabotnetconference\/"},{"@type":"ListItem","position":3,"name":"Black Hat USA Keynote: In AI Do Not Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53193"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53194"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}