{"id":53656,"date":"2023-09-13T15:31:22","date_gmt":"2023-09-13T15:31:22","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35009\/Malicious-AI-Tools-Flourish-Put-Pressure-On-Lawmakers.html"},"modified":"2023-09-13T15:31:22","modified_gmt":"2023-09-13T15:31:22","slug":"malicious-ai-tools-flourish-put-pressure-on-lawmakers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/","title":{"rendered":"Malicious AI Tools Flourish, Put Pressure On Lawmakers"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/09\/cybercrime-jailbreak.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>As U.S. lawmakers and the White House pursue plans to keep artificial intelligence in check, hackers are busy breaking generative AI ethical guardrails and bending the technology for their cybercriminal purposes.<\/p>\n<p>On Tuesday, researchers at SlashNext <a rel=\"noreferrer noopener\" href=\"https:\/\/slashnext.com\/blog\/exploring-the-world-of-ai-jailbreaks\/\" target=\"_blank\">published<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/slashnext.com\/blog\/exploring-the-world-of-ai-jailbreaks\/\" target=\"_blank\">a<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/slashnext.com\/blog\/exploring-the-world-of-ai-jailbreaks\/\" target=\"_blank\"> report<\/a> outlining how criminals use and abuse AI tools. It said communities of enthusiasts were hard at work jailbreaking tools like ChatGPT so they could be used for nefarious purposes.<\/p>\n<p>This type of jailbreaking of AI involves identifying vulnerabilities in the generative AI models and exploiting them to evade the inherent safety measures and ethical guidelines put in place for their use. The result is \u201cthe creation of uncensored content without much consideration for the potential consequences,\u201d SlashNext said.<\/p>\n<p>The idea of abusing generative AI has attracted the attention of cybercriminals and led to the development of malicious AI tools such as <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/news\/crimeware-tool-wormgpt-ai-bec\" target=\"_blank\">WormGPT<\/a> and <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/news\/new-ai-phishing-tool-fraudgpt-tied-to-same-group-behind-wormgpt\" target=\"_blank\">FraudGPT<\/a>, which are marketed on illicit web forums with claims they leveraged unique large language models (LLMs) especially developed for criminal purposes.<\/p>\n<p>WormGPT has proven adept at creating convincing messages for use in attacks such as business email compromise (BEC) campaigns, but SlashNext said most of the other malicious AI tools currently on the market did not appear to utilize custom LLMs as they claimed.<\/p>\n<p>\u201cInstead, they use interfaces that connect to jailbroken versions of public chatbots like ChatGPT, disguised through a wrapper.\u201d<\/p>\n<p>That meant the only real advantage the tools offered cybercriminals was anonymity, SlashNext said. \u201cSome of them offer unauthenticated access in exchange for cryptocurrency payments, enabling users to easily exploit AI-generated content for malicious purposes without revealing their identities.&#8221;<\/p>\n<h2>AI good guys<\/h2>\n<p>Meanwhile, the Biden administration on Sept. 12 announced eight additional technology companies signed on to a set of <a href=\"https:\/\/www.scmagazine.com\/news\/leading-ai-firms-volunteer-security-commitments-to-biden-administration\" target=\"_blank\" rel=\"noreferrer noopener\">voluntary commitments<\/a> promoting responsible AI development.<\/p>\n<p>With Adobe, Cohere, IBM, Nvidia, Palantir, Salesforce, Scale AI and Stability coming onboard, the White House now has 15 tech heavyweights taking part in a program it said was about <a rel=\"noreferrer noopener\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/09\/12\/fact-sheet-biden-harris-administration-secures-voluntary-commitments-from-eight-additional-artificial-intelligence-companies-to-manage-the-risks-posed-by-ai\/\" target=\"_blank\">ensuring safety, security and trust<\/a> remained fundamental to AI\u2019s development.<\/p>\n<p>On the same day, Microsoft President Brad Smith told a <a href=\"https:\/\/www.judiciary.senate.gov\/committee-activity\/hearings\/oversight-of-ai-legislating-on-artificial-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Senate Judiciary subcommittee<\/a> considering AI regulation that the technology\u2019s \u201cpotential perils\u201d could not be ignored by lawmakers.<\/p>\n<p>\u201cIndustry plays an essential role in promoting the safe and responsible development of AI. But laws and regulations have a vital role to play as well,\u201d Smith said. \u201cAt their core, these laws should require AI systems to remain subject to human control at all times, and ensure that those who develop and deploy them are subject to the rule of law.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35009\/Malicious-AI-Tools-Flourish-Put-Pressure-On-Lawmakers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53657,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10228],"class_list":["post-53656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusabotnetscience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malicious AI Tools Flourish, Put Pressure On Lawmakers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious AI Tools Flourish, Put Pressure On Lawmakers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-13T15:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/09\/cybercrime-jailbreak.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Malicious AI Tools Flourish, Put Pressure On Lawmakers\",\"datePublished\":\"2023-09-13T15:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/\"},\"wordCount\":432,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg\",\"keywords\":[\"headline,government,usa,botnet,science\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/\",\"name\":\"Malicious AI Tools Flourish, Put Pressure On Lawmakers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg\",\"datePublished\":\"2023-09-13T15:31:22+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg\",\"width\":800,\"height\":470},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,botnet,science\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusabotnetscience\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malicious AI Tools Flourish, Put Pressure On Lawmakers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malicious AI Tools Flourish, Put Pressure On Lawmakers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/","og_locale":"en_US","og_type":"article","og_title":"Malicious AI Tools Flourish, Put Pressure On Lawmakers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-13T15:31:22+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/09\/cybercrime-jailbreak.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Malicious AI Tools Flourish, Put Pressure On Lawmakers","datePublished":"2023-09-13T15:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/"},"wordCount":432,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg","keywords":["headline,government,usa,botnet,science"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/","url":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/","name":"Malicious AI Tools Flourish, Put Pressure On Lawmakers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg","datePublished":"2023-09-13T15:31:22+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/malicious-ai-tools-flourish-put-pressure-on-lawmakers.jpg","width":800,"height":470},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/malicious-ai-tools-flourish-put-pressure-on-lawmakers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,botnet,science","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusabotnetscience\/"},{"@type":"ListItem","position":3,"name":"Malicious AI Tools Flourish, Put Pressure On Lawmakers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53656"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53656\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53657"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}