{"id":5803,"date":"2018-07-10T02:42:49","date_gmt":"2018-07-10T02:42:49","guid":{"rendered":"http:\/\/efbffe4a-ffff-492d-b13c-041697630759"},"modified":"2018-07-10T02:42:49","modified_gmt":"2018-07-10T02:42:49","slug":"%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/","title":{"rendered":"\u200bLG CNS launches AI document security and access card solutions"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2018\/07\/10\/ace560ef-cb83-4609-b96c-0b8a73f48cbe\/resize\/770xauto\/8568078016338c23d6a2ab7f311834ea\/lg-cns.jpg\" class=\"\" alt=\"lg-cns.jpg\" height=\"auto\" width=\"770\"\/><\/span><\/p>\n<p><span class=\"caption\">LG CNS&#8217;s automated access card issuing solution will save time for visitors.<\/span><\/p>\n<p><span class=\"credit\">Image: LG CNS<\/span><\/p>\n<p>LG CNS, the IT service affiliate of LG Group, has launched two new security solutions aimed at the enterprise.<\/p>\n<p>The company&#8217;s automated access card-issuing machine will save considerable time when processing visitors, it has said, while its AI-applied document solution authenticates documents before they are destroyed.<\/p>\n<p>The access card issuing machine processes a visitor&#8217;s ID card and phone number and immediately registers them. The visitors will then get a temporary access card and a QR code on their smartphone.<\/p>\n<p>By placing the QR code on the machine&#8217;s sensor, the phone&#8217;s camera, microphone, Bluetooth, and tethering functions will automatically be turned off. The functions will reactivate when visitors insert their access card back into the machine when they leave.<\/p>\n<p>The machine automatically traces the number of visitors by tracking cards issued and those returned.<\/p>\n<p>LG CNS hopes the solution can be used for large facilities owned by conglomerates and governments.<\/p>\n<p>The AI-based document security solution, meanwhile, can authenticate documents and keep track of their statuses. Using image matching technology, the solution can compare documents that were printed out with those that were meant to be destroyed.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The technology has an accuracy of 99 percent, even for documents that are warped or badly damaged.<\/p>\n<p>The solution will also alert the companies of documents that are past their deadlines for return.<\/p>\n<p>LG CNS last week <a href=\"https:\/\/www.zdnet.com\/article\/lg-cns-launches-smart-city-platform\/\" target=\"_blank\">launched a smart city platform<\/a> that can collect massive data from cities that will assist in setting traffic agendas.<\/p>\n<h3>PREVIOUS AND RELATED COVERAGE<\/h3>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/lg-cns-launches-monachain-blockchain-platform\/\" target=\"_blank\">LG CNS launches Monachain blockchain platform<\/a><\/strong><\/p>\n<p>LG CNS has launched its own blockchain platform, dubbed Monachain, which provides digital authentication, community token, and supply chain management.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/ios-feature-will-make-it-tougher-for-cops-to-unlock-your-iphone\/\">This new feature will make it tougher for cops and hackers to unlock your iPhone<\/a><\/strong><\/p>\n<p>Restrictions on the USB port will make it tougher for police to get access to your data.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/hacking-operation-uses-malicious-word-documents-to-target-aid-organisations\/\">Hacking operation uses malicious Word documents to target aid organisations<\/a><\/strong><\/p>\n<p>Attacks have targeted organisations around the world with modified malware which aims to install backdoors on systems.<\/p>\n<p><strong><a href=\"https:\/\/www.zdnet.com\/article\/windows-security-heres-why-we-dont-fix-some-bugs-right-away-microsoft-reveals\/\">Windows security: Here&#8217;s why we don&#8217;t fix some bugs right away, Microsoft reveals<\/a><\/strong><\/p>\n<p>Microsoft explains how it decides whether a vulnerability will be patched swiftly or left for a version update.<\/p>\n<p><strong><a href=\"https:\/\/www.techrepublic.com\/article\/how-big-data-can-help-keep-enterprise-networks-secure\/\">How big data can help keep enterprise networks secure<\/a><\/strong> (TechRepublic)<\/p>\n<p>Data can prevent cyberattacks by rolling out new models to stop imminent threats, and by quickly testing controls against historical data to ensure minimal business impact, said MapR&#8217;s John Omernik.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/lg-cns-launches-ai-document-security-and-access-card-solutions\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LG CNS has launched an AI-based document security solution and an automated access card issuer as part of its security offerings.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":5804,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-5803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u200bLG CNS launches AI document security and access card solutions 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/\u200blg-cns-launches-ai-document-security-and-access-card-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u200bLG CNS launches AI document security and access card solutions 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/\u200blg-cns-launches-ai-document-security-and-access-card-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-10T02:42:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"737\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"\u200bLG CNS launches AI document security and access card solutions\",\"datePublished\":\"2018-07-10T02:42:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/\"},\"wordCount\":436,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/\",\"name\":\"\u200bLG CNS launches AI document security and access card solutions 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg\",\"datePublished\":\"2018-07-10T02:42:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg\",\"width\":770,\"height\":737},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u200bLG CNS launches AI document security and access card solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u200bLG CNS launches AI document security and access card solutions 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/\u200blg-cns-launches-ai-document-security-and-access-card-solutions\/","og_locale":"en_US","og_type":"article","og_title":"\u200bLG CNS launches AI document security and access card solutions 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/\u200blg-cns-launches-ai-document-security-and-access-card-solutions\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-10T02:42:49+00:00","og_image":[{"width":770,"height":737,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"\u200bLG CNS launches AI document security and access card solutions","datePublished":"2018-07-10T02:42:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/"},"wordCount":436,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/","url":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/","name":"\u200bLG CNS launches AI document security and access card solutions 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg","datePublished":"2018-07-10T02:42:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/e2808blg-cns-launches-ai-document-security-and-access-card-solutions.jpg","width":770,"height":737},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/%e2%80%8blg-cns-launches-ai-document-security-and-access-card-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"\u200bLG CNS launches AI document security and access card solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=5803"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5803\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/5804"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=5803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=5803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=5803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}