{"id":54580,"date":"2023-11-14T21:55:05","date_gmt":"2023-11-14T21:55:05","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35193\/OracleIV-Emerges-As-A-Dockerized-DDoS-Bot-Agent.html"},"modified":"2023-11-14T21:55:05","modified_gmt":"2023-11-14T21:55:05","slug":"oracleiv-emerges-as-a-dockerized-ddos-bot-agent","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/","title":{"rendered":"OracleIV Emerges As A Dockerized DDoS Bot Agent"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/022423_docker_hub.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Attackers are exploiting a misconfiguration in the&nbsp;<a href=\"https:\/\/docs.docker.com\/engine\/api\/\">Docker Engine API<\/a>&nbsp; to deliver a malicious Docker container called OracleIV that acts as a distributed-<a href=\"https:\/\/www.scmagazine.com\/news\/ddos-attack-on-chatgpt-sparks-concerns-over-coding-productivity-disruptions\">denial-of-service (DDoS)<\/a> bot agent capable of conducting attacks.<\/p>\n<p>In a <a href=\"https:\/\/www.cadosecurity.com\/oracleiv-a-dockerised-ddos-botnet\/\">blog post Nov. 13<\/a>, Cado Security Labs researchers said OracleIV was so named because it\u2019s built from an image called \u201coracleiv_latest\u201d that contains Python malware compiled as an Executable and Linkable Format (ELF) file. &nbsp;<\/p>\n<p>Matt Muir, threat research lead at Cado Security Labs, explained that OracleIV demonstrates that attackers continue to search for and exploit misconfigured Docker deployments. Muir said this news should concern any organization that uses Docker in production, especially the Docker Engine API.<\/p>\n<p>\u201cUsage of this API is common in cloud-native and microservice-driven architectures, so we urge security teams tasked with monitoring this technology stack to pay particular attention to securing the Docker host,\u201d said Muir. \u201cIn common with similar web-facing services (Jupyter, <a href=\"https:\/\/www.scmagazine.com\/brief\/poorly-secured-redis-servers-impacted-by-new-skidmap-malware-variant\">Redis<\/a>), it&#8217;s highly recommended that firewalls and security groups are used to prevent unauthorized access to the API.\u201d&nbsp;<\/p>\n<p>Muir added that OracleIV highlights the ease in which attackers can hijack an exposed Docker host and run malicious code in a portable way. The campaign also shows that attackers can use Dockerhub, Docker&#8217;s image hosting library, to host and distribute malicious images. As a result, Muir said Docker users should understand the potential for images hosted on Dockerhub to get shipped with malicious code. He said his team recommends periodic security scanning of these images.<\/p>\n<p>Craig Harber, security evangelist at Open Systems, said exposing the Docker API to the internet is a hacker&#8217;s dream scenario: it offers them an opportunity to gain an initial foothold into a system.<\/p>\n<p>\u201cThere are several published reports of hackers and red teams successfully exploiting this vulnerability,\u201d said Harber. \u201cIt justifies why hackers continuously scan the internet, looking for exposed endpoints to exploit. After the hacker identifies a vulnerable endpoint, they send commands to the container to gain unauthorized access to the system.\u201d<\/p>\n<p>Scott Gerlach, co-founder and CSO at StackHawk, said OracleIV shows why security and DevOps teams need to work more closely together. Docker and other containerized options significantly increase the speed and reliability of development, but Gerlach said security teams have to understand the environment to fully gain the benefit without unintended consequences.<\/p>\n<p>Gerlach noted that while it&#8217;s clearly called out in the documentation, the default deployment of the Docker TCP API is unencrypted and unauthenticated. Gerlach explained that someone in haste, or without fully understanding the environment, might not be aware that this could potentially expose this kind of issue to the public internet.<\/p>\n<p>\u201cThere are ways to securely deploy the Docker Engine as well as other container systems, such as Kubernetes,\u201d said Gerlach. \u201cBut without understanding of those systems and the environment to which they are deployed, as well as the potential security issues, attackers will continue to find the easy way into a system to accomplish their goals.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35193\/OracleIV-Emerges-As-A-Dockerized-DDoS-Bot-Agent.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54581,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9664],"class_list":["post-54580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwaredenial-of-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OracleIV Emerges As A Dockerized DDoS Bot Agent 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OracleIV Emerges As A Dockerized DDoS Bot Agent 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-14T21:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/022423_docker_hub.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"OracleIV Emerges As A Dockerized DDoS Bot Agent\",\"datePublished\":\"2023-11-14T21:55:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/\"},\"wordCount\":505,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg\",\"keywords\":[\"headline,malware,denial of service\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/\",\"name\":\"OracleIV Emerges As A Dockerized DDoS Bot Agent 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg\",\"datePublished\":\"2023-11-14T21:55:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,denial of service\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwaredenial-of-service\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OracleIV Emerges As A Dockerized DDoS Bot Agent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OracleIV Emerges As A Dockerized DDoS Bot Agent 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/","og_locale":"en_US","og_type":"article","og_title":"OracleIV Emerges As A Dockerized DDoS Bot Agent 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-11-14T21:55:05+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/02\/022423_docker_hub.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"OracleIV Emerges As A Dockerized DDoS Bot Agent","datePublished":"2023-11-14T21:55:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/"},"wordCount":505,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg","keywords":["headline,malware,denial of service"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/","url":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/","name":"OracleIV Emerges As A Dockerized DDoS Bot Agent 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg","datePublished":"2023-11-14T21:55:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/oracleiv-emerges-as-a-dockerized-ddos-bot-agent\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,denial of service","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwaredenial-of-service\/"},{"@type":"ListItem","position":3,"name":"OracleIV Emerges As A Dockerized DDoS Bot Agent"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54580"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54580\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54581"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}