{"id":55764,"date":"2024-04-04T14:12:16","date_gmt":"2024-04-04T14:12:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35744\/WordPress-LayerSlide-Plugin-Bug-Risks-Password-Hash-Extraction.html"},"modified":"2024-04-04T14:12:16","modified_gmt":"2024-04-04T14:12:16","slug":"wordpress-layerslide-plugin-bug-risks-password-hash-extraction","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/","title":{"rendered":"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/04\/AdobeStock_564682462_Editorial_Use_Only.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A critical vulnerability in the WordPress plugin LayerSlider could allow unauthenticated attackers to extract password hashes via SQL injection.<\/p>\n<p>The bug, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-2879\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-2879<\/a>, has a CVSS score of 9.8 and affects LayerSlider versions 7.9.11 through 7.10.0. A patch for the flaw was first made available on March 27 with the <a href=\"https:\/\/layerslider.com\/release-log\/\" target=\"_blank\" rel=\"noreferrer noopener\">release of LayerSlider 7.10.1.<\/a><\/p>\n<p>LayerSlider is a visual web content, graphic design and digital visual effects plugin with \u201cmillions\u201d of users worldwide, <a href=\"https:\/\/layerslider.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">according to its website<\/a>.<\/p>\n<p>The LayerSlider vulnerability was <a href=\"https:\/\/www.wordfence.com\/blog\/2024\/04\/5500-bounty-awarded-for-unauthenticated-sql-injection-vulnerability-patched-in-layerslider-wordpress-plugin\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered and reported<\/a> by AmrAwad during Wordfence\u2019s Bug Bounty Extravaganza on March 25, earning the researcher a $5,500 bounty, the highest ever paid out by Wordfence.<\/p>\n<p>The potential for SQL injection lies in LayerSlider\u2019s function to query slider popup markups. If the \u201cid\u201d parameter of the \u201cls_get_popup_markup\u201d function is not a number, it is not sanitized before it is passed to the \u201cfind\u201d function.<\/p>\n<p>Additionally, while the plugin escapes $args values using the \u201cesc_sql\u201d function, the \u201cwhere\u201d key is excluded from this escaping function and thus attacker-controlled inputs contained within \u201cwhere\u201d can be included in queries to the victim\u2019s database.<\/p>\n<p>As a result, an attacker could craft a request manipulating \u201cid\u201d and \u201cwhere\u201d to extract sensitive information, including password hashes, from the database.<\/p>\n<p>However, UNION-based SQL injections are not possible when exploiting this vulnerability due to the structure of the queries, so an attacker would need to take the additional step of including SQL CASE statements and the \u201cSLEEP\u201d command in their requests.<\/p>\n<p>This method, known as time-based blind SQL injection, involves indirectly extracting data by monitoring the response time of the database server based on the specified true\/false CASE statements and the SLEEP time.<\/p>\n<p>Repeatedly querying the database with different CASE conditions and observing the response time eventually enables the attacker to determine the values contained in the database.<\/p>\n<p>\u201cThis is an intricate, yet frequently successful method to obtain information from a database when exploiting SQL Injection vulnerabilities,\u201d Wordfence stated in its blog post about the LayerSlider vulnerability.<\/p>\n<p>Vulnerable WordPress plugins are a popular entry point for threat actors to extract data or compromise WordPress sites. For example, a cross-site scripting flaw in the Popup Builder plugin, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6000\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6000<\/a>, was <a href=\"https:\/\/www.scmagazine.com\/brief\/thousands-of-wordpress-sites-impacted-by-balada-injector-campaign\" target=\"_blank\" rel=\"noreferrer noopener\">leveraged to spread Balada Injector malware<\/a> on more than 6,700 WordPress sites in January.<\/p>\n<p>Balada Injector was also deployed on <a href=\"https:\/\/www.scmagazine.com\/brief\/balada-injector-campaign-compromises-thousands-of-wordpress-sites\" target=\"_blank\" rel=\"noreferrer noopener\">more than 9,000 sites<\/a> vulnerable to the TagDiv Composer plugin flaw tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-3169\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-3169<\/a> last October. Overall, more than a million WordPress sites have been compromised in the Balada Injector campaign over the past six years, according to Sucuri.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35744\/WordPress-LayerSlide-Plugin-Bug-Risks-Password-Hash-Extraction.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55765,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10595],"class_list":["post-55764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineflawpasswordwordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WordPress LayerSlide Plugin Bug Risks Password Hash Extraction 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-04T14:12:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/04\/AdobeStock_564682462_Editorial_Use_Only.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction\",\"datePublished\":\"2024-04-04T14:12:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/\"},\"wordCount\":435,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg\",\"keywords\":[\"headline,flaw,password,wordpress\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/\",\"name\":\"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg\",\"datePublished\":\"2024-04-04T14:12:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg\",\"width\":800,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,flaw,password,wordpress\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineflawpasswordwordpress\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/","og_locale":"en_US","og_type":"article","og_title":"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-04T14:12:16+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/04\/AdobeStock_564682462_Editorial_Use_Only.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction","datePublished":"2024-04-04T14:12:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/"},"wordCount":435,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg","keywords":["headline,flaw,password,wordpress"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/","url":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/","name":"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg","datePublished":"2024-04-04T14:12:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/04\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction.jpg","width":800,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wordpress-layerslide-plugin-bug-risks-password-hash-extraction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,flaw,password,wordpress","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineflawpasswordwordpress\/"},{"@type":"ListItem","position":3,"name":"WordPress LayerSlide Plugin Bug Risks Password Hash Extraction"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55764"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55765"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}