{"id":57459,"date":"2024-10-15T14:00:00","date_gmt":"2024-10-15T14:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/"},"modified":"2024-10-15T14:00:00","modified_gmt":"2024-10-15T14:00:00","slug":"escalating-cyber-threats-demand-stronger-global-defense-and-cooperation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/","title":{"rendered":"Escalating cyber threats demand stronger global defense and cooperation"},"content":{"rendered":"<p><span data-contrast=\"auto\">Microsoft customers face more than 600 million cybercriminal and nation-state attacks every day, ranging from ransomware to phishing to identity attacks. Once again, nation-state affiliated threat actors demonstrated that cyber operations\u2014whether for espionage, destruction, or influence\u2014play a persistent supporting role in broader geopolitical conflicts. Also fueling the escalation in cyberattacks, we are seeing increasing evidence of the collusion of cybercrime gangs with nation-state groups sharing tools and techniques.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">We must find a way to stem the tide of this malicious cyber activity. That includes continuing to harden our digital domains to protect our networks, data, and people at all levels. However, this challenge will not be accomplished solely by executing a checklist of cyber hygiene measures but only through a focus on and commitment to the foundations of cyber defense from the individual user to the corporate executive and to government leaders.<\/span><\/p>\n<p><span data-contrast=\"auto\">These are some of the insights from the fifth annual <a href=\"http:\/\/aka.ms\/MDDR\">Microsoft Digital Defense Report<\/a><\/span><span data-contrast=\"auto\">, which covers trends between July 2023 and June 2024.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"auto\">State-affiliated actors increasingly are using cybercriminals and their tools.&nbsp;<\/span><\/b><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Over the last year, Microsoft observed nation-state actors conduct operations for financial gain, enlist cybercriminals to collect intelligence, particularly on the Ukrainian military, and make use of the same infostealers, command and control frameworks, and other tools favored by the cybercriminal community. Specifically: <\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Russian threat actors appear to have outsourced some of their cyberespionage operations to criminal groups, especially operations targeting Ukraine.\u202fIn June 2024, a suspected cybercrime group used commodity malware to compromise at least 50 Ukrainian military devices.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Iranian nation-state actors used ransomware in a cyber-enabled influence operation, marketing stolen Israeli dating website data. They offered to remove specific individual profiles from their data repository for a fee.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">North Korea is getting into the ransomware game. A newly-identified North Korean actor developed a custom ransomware variant called FakePenny, which it deployed at organizations in aerospace and defense after exfiltrating data from the impacted networks\u2014demonstrating both intelligence gathering and monetization motivations.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">Nation-state activity was heavily concentrated around sites of active military conflict or regional tension<\/span><\/b><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Aside from the United States and the United Kingdom, most of the nation-state-affiliated cyber threat activity we observed was concentrated around Israel, Ukraine, the United Arab Emirates, and Taiwan. In addition, Iran and Russia have used both the Russia-Ukraine war and the Israel-Hamas conflict to spread divisive and misleading messages through propaganda campaigns that extend their influence beyond the geographical boundaries of the conflict zones, demonstrating the globalized nature of hybrid warfare.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Approximately 75% of Russian targets were in Ukraine or a NATO member state, as Moscow seeks to collect intelligence on the West\u2019s policies on the war.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Chinese threat actors\u2019 targeting efforts remain similar to the last few years in terms of geographies targeted\u2014Taiwan being a focus, as well as countries within Southeast Asia\u2014and intensity of targeting per location.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Iran placed significant focus on Israel, especially after the outbreak of the Israel-Hamas war. Iranian actors continued to target the US and Gulf countries, including the UAE and Bahrain, in part because of their normalization of ties with Israel and Tehran\u2019s perception that they are both enabling Israel\u2019s war efforts.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<figure id=\"attachment_66447\" aria-describedby=\"caption-attachment-66447\" class=\"wp-caption alignleft\"><a href=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-66447 size-large\" src=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-1024x273.png\" alt=\"Graphics showing Iran's most targeted countries prior to the Israel-Hamas conflict (July-October 2023) and after the start of the conflict (October 2023-June 2024).\" width=\"995\" height=\"265\" srcset=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-1024x273.png 1024w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-300x80.png 300w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-768x205.png 768w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-1536x409.png 1536w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-2048x546.png 2048w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-1920x512.png 1920w\" sizes=\"auto, (max-width: 995px) 100vw, 995px\"><\/a><figcaption id=\"caption-attachment-66447\" class=\"wp-caption-text\"><em>Example of Iran\u2019s targeting shift following the start of the Israel-Hamas conflict. <\/em><\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">Russia, Iran, and China focus in on the U.S. election<\/span><\/b><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Russia, Iran, and China have all used ongoing geopolitical matters to drive discord on sensitive domestic issues leading up to the U.S. election, seeking to sway audiences in the U.S. to one party or candidate over another, or to degrade confidence in elections as a foundation of democracy. As we\u2019ve reported, <\/span><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/08\/08\/iran-targeting-2024-us-election\/\"><span data-contrast=\"none\">Iran<\/span><\/a><span data-contrast=\"auto\"> and <\/span><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/09\/17\/russian-election-interference-efforts-focus-on-the-harris-walz-campaign\/\"><span data-contrast=\"none\">Russia<\/span><\/a><span data-contrast=\"auto\"> have been the most active, and we expect this activity to continue to accelerate over the next two weeks ahead of the U.S. election.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, Microsoft has observed a surge in election-related homoglyph domains\u2014or spoofed links\u2014delivering phishing and malware payloads. We believe these domains are examples both of cybercriminal activity driven by profit and of reconnaissance by nation-state threat actors in pursuit of political goals. At present, we are monitoring over 10,000 homoglyphs to detect possible impersonations. Our objective is to ensure Microsoft is not hosting malicious infrastructure and inform customers who might be victims of such impersonation threats.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Financially motivated cybercrime and fraud remain a persistent threat&nbsp;<\/span><\/b><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">While nation-state attacks continue to be a concern, so are financially motivated cyberattacks. In the past year Microsoft observed:&nbsp;&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">A 2.75x increase year over year in ransomware attacks. Importantly, however, there was a threefold decrease in ransom attacks reaching the encryption stage. <\/span><\/b><span data-contrast=\"auto\">The most prevalent initial access techniques continue to be social engineering\u2014specifically email phishing, SMS phishing, and voice phishing\u2014but also identity compromise and exploiting vulnerabilities in public facing applications or unpatched operating systems.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Tech scams skyrocketed 400% since 2022.<\/span><\/b><span data-contrast=\"auto\"> In the past year, Microsoft observed a significant uptick in tech scam traffic with daily frequency surging from 7,000 in 2023 to 100,000 in 2024. Over 70% of malicious infrastructure was active for less than two hours, meaning they may be gone before they\u2019re even detected. This rapid turnover rate underscores the need for more agile and effective cybersecurity measures.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">Threat actors are experimenting with generative AI<\/span><\/b><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">Last year, we started to see threat actors\u2014both cybercriminals and nation-states\u2014experimenting with AI. Just as AI is increasingly used to help people be more efficient, threat actors are learning how they can use AI efficiencies to target victims. With influence operations, China-affiliated actors favor AI-generated imagery, while Russia-affiliated actors use audio-focused AI across mediums. So far, we have not observed this content being effective in swaying audiences. <\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<figure id=\"attachment_66448\" aria-describedby=\"caption-attachment-66448\" class=\"wp-caption alignleft\"><a href=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-66448 size-large\" src=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091-1024x510.png\" alt=\"Graphic showing the adversarial use of AI in influence operations. It shows the usage (low, medium, and high) of AI text, image, and audio\/video across China, Russia, and Iran &amp; proxies, along with examples.\" width=\"995\" height=\"496\" srcset=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091-1024x510.png 1024w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091-300x150.png 300w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091-768x383.png 768w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091-1536x766.png 1536w, https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_091.png 1848w\" sizes=\"auto, (max-width: 995px) 100vw, 995px\"><\/a><figcaption id=\"caption-attachment-66448\" class=\"wp-caption-text\"><em>Nation-state adversarial use of AI in influence operations.<\/em><\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">But the story of AI and cybersecurity is also a potentially optimistic one. While still in its early days, AI has shown its benefits to cybersecurity professionals by acting as a tool to help respond in a fraction of the time it would take a person to manually process a multitude of alerts, malicious code files, and corresponding impact analysis. We continue to innovate our technology to find new ways that AI can benefit and strengthen cybersecurity.&nbsp;&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Collaboration remains crucial to strengthening cybersecurity.<\/span><\/b><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">With more than 600 million attacks per day targeting Microsoft customers alone, there must be countervailing pressure to reduce the overall number of attacks online. Effective deterrence can be achieved in two ways: by denial of intrusions or by imposing consequences for malicious behavior. Microsoft continues to do our part to reduce intrusions and has committed to taking steps to protect ourselves and our customers through our <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/09\/23\/securing-our-future-september-2024-progress-update-on-microsofts-secure-future-initiative-sfi\/\"><span data-contrast=\"none\">Secure Future Initiative<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"auto\">While the industry must do more to deny the efforts of attackers via better cybersecurity, this needs to be paired with government action to impose consequences that further discourage the most harmful cyberattacks. Success can only be achieved by combining defense with deterrence. In recent years, a great deal of attention has been given to the development of international norms of conduct in cyberspace. However, those norms so far lack meaningful consequence for their violation, and nation-state attacks have been undeterred, increasing in volume and aggression. To shift the playing field, it will take conscientiousness and commitment by both the public and private sectors so that attackers no longer have the advantage.&nbsp;<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/p>\n<p><em><span class=\"TextRun SCXW126379888 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126379888 BCX8\">Microsoft continues to share important threat intelligence with the community, including our recent <\/span><\/span><a class=\"Hyperlink SCXW126379888 BCX8\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/10\/cyber-signals-issue-8-education-under-siege-how-cybercriminals-target-our-schools\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW126379888 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW126379888 BCX8\" data-ccp-charstyle=\"Hyperlink\">Cyber Signals<\/span><\/span><\/a><span class=\"TextRun SCXW126379888 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126379888 BCX8\"> research looking at cyber risks in the education sector<\/span><span class=\"NormalTextRun SCXW126379888 BCX8\">.<\/span><\/span><span class=\"EOP SCXW126379888 BCX8\" data-ccp-props=\"{&quot;335559739&quot;:0}\">&nbsp;<\/span><\/em><\/p>\n<p class=\"tag-list\">Tags: <a aria-label=\"See more stories about AI\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/ai\/\" rel=\"tag\">AI<\/a>, <a aria-label=\"See more stories about artificial intelligence\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/artificial-intelligence\/\" rel=\"tag\">artificial intelligence<\/a>, <a aria-label=\"See more stories about China\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/china\/\" rel=\"tag\">China<\/a>, <a aria-label=\"See more stories about cyberattacks\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/cyberattacks\/\" rel=\"tag\">cyberattacks<\/a>, <a aria-label=\"See more stories about cybercrime\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/cybercrime-2\/\" rel=\"tag\">cybercrime<\/a>, <a aria-label=\"See more stories about cybersecurity\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/cybersecurity-2\/\" rel=\"tag\">cybersecurity<\/a>, <a aria-label=\"See more stories about election\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/election\/\" rel=\"tag\">election<\/a>, <a aria-label=\"See more stories about elections\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/elections\/\" rel=\"tag\">elections<\/a>, <a aria-label=\"See more stories about generative ai\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/generative-ai\/\" rel=\"tag\">generative ai<\/a>, <a aria-label=\"See more stories about Hamas\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/hamas\/\" rel=\"tag\">Hamas<\/a>, <a aria-label=\"See more stories about homoglyphs\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/homoglyphs\/\" rel=\"tag\">homoglyphs<\/a>, <a aria-label=\"See more stories about Iran\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/iran\/\" rel=\"tag\">Iran<\/a>, <a aria-label=\"See more stories about Israel\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/israel\/\" rel=\"tag\">Israel<\/a>, <a aria-label=\"See more stories about malware\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/malware\/\" rel=\"tag\">malware<\/a>, <a aria-label=\"See more stories about Microsoft Digital Defense Report\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/microsoft-digital-defense-report\/\" rel=\"tag\">Microsoft Digital Defense Report<\/a>, <a aria-label=\"See more stories about NATO\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/nato\/\" rel=\"tag\">NATO<\/a>, <a aria-label=\"See more stories about North Korea\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/north-korea\/\" rel=\"tag\">North Korea<\/a>, <a aria-label=\"See more stories about phishing\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/phishing\/\" rel=\"tag\">phishing<\/a>, <a aria-label=\"See more stories about Russia\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/russia\/\" rel=\"tag\">Russia<\/a>, <a aria-label=\"See more stories about Secure Future Initiative\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/secure-future-initiative\/\" rel=\"tag\">Secure Future Initiative<\/a>, <a aria-label=\"See more stories about Tech scams\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/tech-scams\/\" rel=\"tag\">Tech scams<\/a>, <a aria-label=\"See more stories about Ukraine\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/ukraine\/\" rel=\"tag\">Ukraine<\/a>, <a aria-label=\"See more stories about United Kingdom\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/united-kingdom\/\" rel=\"tag\">United Kingdom<\/a>, <a aria-label=\"See more stories about United States\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/tag\/united-states\/\" rel=\"tag\">United States<\/a><\/p>\n<p>\tREAD MORE <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/10\/15\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We must find a way to stem the tide of this malicious cyber activity. That includes continuing to harden our digital domains to protect our networks, data, and people at all levels. However, this challenge will not be accomplished solely by executing a checklist of cyber hygiene measures but only through a focus on and commitment to the foundations of cyber defense from the individual user to the corporate executive and to government leaders.\u00a0\u00a0<br \/>\nThe post Escalating cyber threats demand stronger global defense and cooperation appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57460,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-57459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Escalating cyber threats demand stronger global defense and cooperation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Escalating cyber threats demand stronger global defense and cooperation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-15T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-1024x273.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Escalating cyber threats demand stronger global defense and cooperation\",\"datePublished\":\"2024-10-15T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/\"},\"wordCount\":1309,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/\",\"name\":\"Escalating cyber threats demand stronger global defense and cooperation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png\",\"datePublished\":\"2024-10-15T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png\",\"width\":1024,\"height\":273},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Escalating cyber threats demand stronger global defense and cooperation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Escalating cyber threats demand stronger global defense and cooperation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/","og_locale":"en_US","og_type":"article","og_title":"Escalating cyber threats demand stronger global defense and cooperation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-15T14:00:00+00:00","og_image":[{"url":"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/prod\/sites\/5\/2024\/10\/Page_018-e1728405029515-1024x273.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Escalating cyber threats demand stronger global defense and cooperation","datePublished":"2024-10-15T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/"},"wordCount":1309,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/","url":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/","name":"Escalating cyber threats demand stronger global defense and cooperation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png","datePublished":"2024-10-15T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation.png","width":1024,"height":273},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/escalating-cyber-threats-demand-stronger-global-defense-and-cooperation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Escalating cyber threats demand stronger global defense and cooperation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57459"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57459\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57460"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}