{"id":53257,"date":"2023-08-16T15:59:32","date_gmt":"2023-08-16T15:59:32","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34914\/Google-Releases-Security-Key-Implementation-Resilient-To-Quantum-Attacks.html"},"modified":"2023-08-16T15:59:32","modified_gmt":"2023-08-16T15:59:32","slug":"google-releases-security-key-implementation-resilient-to-quantum-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/","title":{"rendered":"Google Releases Security Key Implementation Resilient To Quantum Attacks"},"content":{"rendered":"<p><strong>Google on Tuesday released what it described as the first FIDO2 security key implementation that should be resistant to quantum attacks.<\/strong>\n<\/p>\n<p>There has been significant progress in quantum computing in the past years and tech giants are increasingly <a href=\"https:\/\/www.securityweek.com\/ibm-delivers-roadmap-for-transition-to-quantum-safe-cryptography\/\" target=\"_blank\" rel=\"noreferrer noopener\">focusing on quantum security<\/a>. The main concern is related to encryption \u2014 current cryptography will not be able to protect information against quantum attacks, which is why quantum-resilient cryptography is needed.&nbsp;\n<\/p>\n<p>In partnership with the Swiss university ETH Zurich, Google has <a href=\"https:\/\/tik-db.ee.ethz.ch\/file\/3ac6b42dd0c73000510b8343f60f0906\/\" target=\"_blank\" rel=\"noreferrer noopener\">developed<\/a> a quantum-resilient security key implementation that leverages a hybrid signature scheme involving traditional elliptic-curve cryptography (specifically ECDSA) and <a href=\"https:\/\/pq-crystals.org\/dilithium\/\" target=\"_blank\" rel=\"noreferrer noopener\">CRYSTALS-Dilithium<\/a>, a quantum scheme that <a href=\"https:\/\/csrc.nist.gov\/News\/2022\/pqc-candidates-to-be-standardized-and-round-4\" target=\"_blank\" rel=\"noreferrer noopener\">NIST recently standardized<\/a>, saying it offers \u201cstrong security and excellent performance\u201d.&nbsp;\n<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/Google-Security-key-scheme.png\" alt class=\"wp-image-34676\" width=\"513\" height=\"223\" srcset=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/Google-Security-key-scheme.png 625w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/Google-Security-key-scheme-360x157.png 360w\" sizes=\"auto, (max-width: 513px) 100vw, 513px\"><\/figure>\n<\/div>\n<p>The researchers who developed the new security key implementation pointed out that a hybrid scheme is needed as some quantum-resistant algorithms have shown <a href=\"https:\/\/www.securityweek.com\/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm\/\" target=\"_blank\" rel=\"noreferrer noopener\">signs of weakness<\/a>. Given that most security keys cannot be upgraded, caution is needed, Google said.&nbsp;&nbsp;\n<\/p>\n<p>Proof-of-concept (<a href=\"https:\/\/github.com\/google\/OpenSK\/releases\/tag\/hybrid-pqc\">PoC<\/a>) source code has been released as part of Google\u2019s <a href=\"https:\/\/github.com\/google\/OpenSK\" target=\"_blank\" rel=\"noreferrer noopener\">OpenSK<\/a> project. The OpenSK project was <a href=\"https:\/\/www.securityweek.com\/google-open-sources-code-security-key-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> in early 2020 and its goal is to provide open source code for hardware security keys. As part of the project, the tech giant also provides the resources necessary to 3D print a security key enclosure.&nbsp;\n<\/p>\n<p>\u201cOn the technical side, a large challenge was to create a Dilithium implementation small enough to run on security keys\u2019 constrained hardware. Through careful optimization, we were able to develop a Rust memory optimized implementation that only required 20 KB of memory, which was sufficiently small enough,\u201d <a href=\"https:\/\/security.googleblog.com\/2023\/08\/toward-quantum-resilient-security-keys.html\" target=\"_blank\" rel=\"noreferrer noopener\">Google explained<\/a> in a blog post.&nbsp;\n<\/p>\n<p>\u201cWe also spent time ensuring that our implementation signature speed was well within the expected security keys specification. That said, we believe improving signature speed further by leveraging hardware acceleration would allow for keys to be more responsive,\u201d it added.\n<\/p>\n<p>While it will take some time until quantum attacks become a reality, Google believes the industry needs to take action as early as possible given the difficulty of widely deploying new cryptography across the internet.&nbsp;<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>Google hopes that its implementation will be standardized at some point and supported by all major web browsers.&nbsp;\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/quantum-decryption-brought-closer-by-topological-qubits\/\">Quantum Decryption Brought Closer by Topological Qubits<\/a>\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/qusecure-and-accenture-test-multi-orbit-communications-link-using-post-quantum-cryptography\/\">QuSecure and Accenture Test Multi-Orbit Communications Link Using Post-Quantum Cryptography<\/a>\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/qusecure-unveils-quantum-resilient-communications-satellite-link\/\">QuSecure Unveils Quantum-Resilient Communications Satellite Link<\/a>\n<\/p>\n<p><strong>Related<\/strong>: <a href=\"https:\/\/www.securityweek.com\/news-analysis-uk-commits-3-billion-to-support-national-quantum-strategy\/\">News Analysis: UK Commits $3 Billion to Support National Quantum Strategy<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34914\/Google-Releases-Security-Key-Implementation-Resilient-To-Quantum-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53258,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10494],"class_list":["post-53257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacygooglepasswordcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google Releases Security Key Implementation Resilient To Quantum Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Releases Security Key Implementation Resilient To Quantum Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-16T15:59:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/Google-Security-key-scheme.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google Releases Security Key Implementation Resilient To Quantum Attacks\",\"datePublished\":\"2023-08-16T15:59:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png\",\"keywords\":[\"headline,privacy,google,password,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/\",\"name\":\"Google Releases Security Key Implementation Resilient To Quantum Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png\",\"datePublished\":\"2023-08-16T15:59:32+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png\",\"width\":625,\"height\":272},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-releases-security-key-implementation-resilient-to-quantum-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,google,password,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacygooglepasswordcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Google Releases Security Key Implementation Resilient To Quantum Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Releases Security Key Implementation Resilient To Quantum Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Google Releases Security Key Implementation Resilient To Quantum Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-16T15:59:32+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/08\/Google-Security-key-scheme.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google Releases Security Key Implementation Resilient To Quantum Attacks","datePublished":"2023-08-16T15:59:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/"},"wordCount":413,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png","keywords":["headline,privacy,google,password,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/","name":"Google Releases Security Key Implementation Resilient To Quantum Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png","datePublished":"2023-08-16T15:59:32+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/google-releases-security-key-implementation-resilient-to-quantum-attacks.png","width":625,"height":272},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-releases-security-key-implementation-resilient-to-quantum-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,google,password,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacygooglepasswordcryptography\/"},{"@type":"ListItem","position":3,"name":"Google Releases Security Key Implementation Resilient To Quantum Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53257"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53258"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}