{"id":57122,"date":"2024-09-17T14:53:45","date_gmt":"2024-09-17T14:53:45","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36343\/Malware-Attack-Targets-US-Taiwan-Defense-Conference.html"},"modified":"2024-09-17T14:53:45","modified_gmt":"2024-09-17T14:53:45","slug":"malware-attack-targets-us-taiwan-defense-conference","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/","title":{"rendered":"Malware Attack Targets US-Taiwan Defense Conference"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/03\/031924_china_flag.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A conference connecting defense industry professionals in the U.S. and <a href=\"https:\/\/www.scmagazine.com\/brief\/google-taiwan-facing-deluge-of-chinese-cyberattacks\" target=\"_blank\" rel=\"noreferrer noopener\">Taiwan<\/a> has come under attack from malware threat actors.<\/p>\n<p>Researchers with <a href=\"https:\/\/cyble.com\/blog\/stealthy-fileless-attack-targets-attendees-of-us-taiwan-defense-industry-event\/\" target=\"_blank\" rel=\"noreferrer noopener\">security firm Cyble<\/a> report that a defense industry event was the target of a fileless malware infection, presumably aimed at collecting intelligence on behalf of the Chinese government.<\/p>\n<p>According to Cyble, the attack stands out because it uses a novel technique to avoid detection. Rather than trying to use exploits or social engineering to put an executable on the target system, this attack instead opts to run in memory by loading up files and performing the attack in real time.<\/p>\n<p>Such attacks, often referred to as \u201cliving off the land,\u201d are increasingly popular as they leave little in the way of a footprint and require minimal investment in a malware package or automated exploits.<\/p>\n<p>\u201cThe attack commences with a suspicious archive file containing an LNK file disguised as a PDF document,\u201d Cyble explains.<\/p>\n<p>\u201cThis deception is designed to trick users into executing the malicious LNK file, which in turn triggers a series of covert actions in the background.\u201d<\/p>\n<p>From there, the attackers look to perform standard intelligence operation activities, logging system data and user activity with the ultimate aim of passing that data on to a remote server likely controlled by someone with government ties.<\/p>\n<p>While the exact name of the threat actor or its government ties could not be made, it\u2019s not hard to figure out who would have an interest in spying on the attendees of a conference focused on <a href=\"https:\/\/www.scmagazine.com\/brief\/taiwan-facing-more-cyberattacks-amid-tensions-with-china\" target=\"_blank\" rel=\"noreferrer noopener\">the Taiwan and U.S. defense industry.<\/a><\/p>\n<p>\u201cChinese&nbsp;threat actors&nbsp;have a well-documented history of targeting Taiwan, particularly around significant political events,\u201d noted Cyble.<\/p>\n<p>\u201cDespite this pattern, the specific [threat actor] behind the current campaign remains unidentified, and we have not been able to link these tactics, techniques, and procedures (TTPs) to any known threat actor or&nbsp;advanced persistent threat&nbsp;(APT) group at this time.\u201d<\/p>\n<p>With the U.S. set to kick off a contentious presidential election season, it is almost a given that foreign intelligence agencies will be looking to meddle with affairs in hopes of tipping the scales in their favor.<\/p>\n<p>Threat actors are likely to be conducting campaigns that include malware installation, disinformation, and data harvesting.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36343\/Malware-Attack-Targets-US-Taiwan-Defense-Conference.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57123,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[11047],"class_list":["post-57122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentmalwareusachinacyberwartaiwanmilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware Attack Targets US-Taiwan Defense Conference 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Attack Targets US-Taiwan Defense Conference 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-17T14:53:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/03\/031924_china_flag.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Malware Attack Targets US-Taiwan Defense Conference\",\"datePublished\":\"2024-09-17T14:53:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\"},\"wordCount\":387,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg\",\"keywords\":[\"headline,government,malware,usa,china,cyberwar,taiwan,military\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\",\"name\":\"Malware Attack Targets US-Taiwan Defense Conference 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg\",\"datePublished\":\"2024-09-17T14:53:45+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg\",\"width\":1104,\"height\":737},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,malware,usa,china,cyberwar,taiwan,military\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentmalwareusachinacyberwartaiwanmilitary\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malware Attack Targets US-Taiwan Defense Conference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Attack Targets US-Taiwan Defense Conference 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/","og_locale":"en_US","og_type":"article","og_title":"Malware Attack Targets US-Taiwan Defense Conference 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-09-17T14:53:45+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/03\/031924_china_flag.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Malware Attack Targets US-Taiwan Defense Conference","datePublished":"2024-09-17T14:53:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/"},"wordCount":387,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg","keywords":["headline,government,malware,usa,china,cyberwar,taiwan,military"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/","url":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/","name":"Malware Attack Targets US-Taiwan Defense Conference 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg","datePublished":"2024-09-17T14:53:45+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/09\/malware-attack-targets-us-taiwan-defense-conference.jpg","width":1104,"height":737},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/malware-attack-targets-us-taiwan-defense-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,malware,usa,china,cyberwar,taiwan,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentmalwareusachinacyberwartaiwanmilitary\/"},{"@type":"ListItem","position":3,"name":"Malware Attack Targets US-Taiwan Defense Conference"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57122"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57122\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57123"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}