{"id":6536,"date":"2018-07-16T19:18:27","date_gmt":"2018-07-16T19:18:27","guid":{"rendered":"http:\/\/094ae66b-8bf8-4a66-9539-8efbc04fef93"},"modified":"2018-07-16T19:18:27","modified_gmt":"2018-07-16T19:18:27","slug":"ibms-new-nabla-containers-are-designed-for-security-first","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/","title":{"rendered":"IBM&#8217;s new Nabla containers are designed for security first"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/07\/16\/656cc9dc-956f-4493-9c6d-db5f121518a9\/thumbnail\/770x578\/d024588e18f44c0e0e87a2cb9ccf8b96\/image-2018-07-16-at-3-16-03-pm.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Companies love containers because they enable them to run more jobs on servers. But businesses also hate containers, because they fear they&#8217;re less secure than virtual machines (VM)s. <a href=\"https:\/\/www.ibm.com\/\" target=\"_blank\">IBM<\/a> thinks it has an answer to that: <a href=\"https:\/\/nabla-containers.github.io\/\" target=\"_blank\">Nabla containers<\/a>, which are more secure by design than rival container concepts.<\/p>\n<p>James Bottomley, an <a href=\"http:\/\/www.research.ibm.com\/\" target=\"_blank\">IBM Research<\/a> distinguished engineer and top Linux kernel developer, first outlines that there are two kind of fundamental kinds of container and virtual machine (VM) security problems. These are described as <a href=\"https:\/\/blog.hansenpartnership.com\/containers-and-cloud-security\/\" target=\"_blank\">Vertical Attack Profile (VAP) and Horizontal Attack Profile (HAP)<\/a>.<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.techrepublic.com\/article\/containers-are-cool-now-but-vms-may-be-eternal\/\">Containers are cool now, but VMs may be eternal &#8211; TechRepublic<\/a><\/strong><\/p>\n<p>A VAP is all the code, which is traversed to provide a service all the way from input to database update to output. This code, like all programs, contains bugs. The bug density varies, but the more code you traverse, that is called to run, the greater your chance of exposure to a security hole. For example, it doesn&#8217;t matter how much code is in an operating system or program if it&#8217;s not run. Stack security holes exploits, which can jump into either the physical server host or VMs, are HAPs.<\/p>\n<p>HAPs aren&#8217;t common, but they&#8217;re system killers. Bottomley calls them &#8220;potentially business destroying events.&#8221;<\/p>\n<p>IBM&#8217;s answer to HAPs is Nabla. This new secure container&#8217;s core design goal is to create is a sandbox that emulates the interface between the container runtime and the operating system kernel&#8217;s syscall interface with as little code as possible. It also provides a narrow interface into the kernel itself.<\/p>\n<p>Nabla works by replacing the typical VM hypervisor interface of <a href=\"https:\/\/wiki.xenproject.org\/wiki\/Hypercall\" target=\"_blank\">hypercalls<\/a> and <a href=\"https:\/\/software.intel.com\/en-us\/blogs\/2009\/06\/25\/virtualization-and-performance-understanding-vm-exits\" target=\"_blank\">vmexits<\/a> with simple system calls (syscalls). For example, Linux built-in <a href=\"https:\/\/www.linux-kvm.org\/page\/Main_Page\">KVM<\/a> hypervisor interface only has nine hypercalls and all these can be rewritten as syscalls. So, Nabla uses these syscalls while <a href=\"https:\/\/docs.docker.com\/engine\/security\/seccomp\/\" target=\"_blank\">seccomp<\/a> restricts its interface to being only what the rewritten unikernel runtime actually needs.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Thus, a Nabla containerized application can avoid making a Linux system call by linking to a operating system library component, which implements the system call functionality. Specifically, Nabla containers use <a href=\"https:\/\/github.com\/Solo5\/solo5\" target=\"_blank\">Solo5 project<\/a> unikernel techniques to avoid system calls. All together, Nabla containers only use nine system calls. A Linux secom policy blocks all other calls. This reduces the container&#8217;s attack surface to a barebones minimum.<\/p>\n<p>Early <a href=\"https:\/\/www.zdnet.com\/article\/which-is-more-secure-containers-or-virtual-machines-the-answer-will-surprise-you\/\">IBM Research test results show that Nabla is extremely secure<\/a>. Indeed, besides being more secure than other container technologies, such as <a href=\"https:\/\/www.docker.com\/\" target=\"_blank\">Docker<\/a> and Google&#8217;s <a href=\"https:\/\/github.com\/google\/gvisor\" target=\"_blank\">gVisor<\/a>, a container runtime sandbox. It&#8217;s as secure, or more so, depending on the applications, than <a href=\"https:\/\/github.com\/kata-containers\" target=\"_blank\">Kata Containers<\/a>, a new open-source lightweight VM designed to secure containers.<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.zdnet.com\/article\/what-is-docker-and-why-is-it-so-darn-popular\/\">What is Docker and why is it so darn popular?<\/a><\/strong><\/p>\n<p>Don&#8217;t believe it? Want to check it out? You can <a href=\"https:\/\/nabla-containers.github.io\/2018\/06\/28\/nabla-setup\/\" target=\"_blank\">download, install, and run Nabla containers<\/a> for yourself on <a href=\"http:\/\/www.ubuntu.com\/\" target=\"_blank\">Ubuntu Linux<\/a>.<\/p>\n<p>Considering just how important containers are for modern IT, I think anyone working with containers must give it a try. Nabla could be as much of a game-changer as <a href=\"https:\/\/www.zdnet.com\/article\/what-is-docker-and-why-is-it-so-darn-popular\/\">Docker was when it made containers popular.<\/a><\/p>\n<p><strong>Related stories:<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ibms-new-nabla-containers-are-designed-for-security-first\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IBM claims its new container design is more secure than Docker or other containers by cutting operating system calls to the bare minimum and thereby reducing its attack surface as small as possible.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":6537,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-6536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM&#039;s new Nabla containers are designed for security first 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM&#039;s new Nabla containers are designed for security first 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-16T19:18:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/ibms-new-nabla-containers-are-designed-for-security-first.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"IBM&#8217;s new Nabla containers are designed for security first\",\"datePublished\":\"2018-07-16T19:18:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/\"},\"wordCount\":530,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/ibms-new-nabla-containers-are-designed-for-security-first.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/\",\"name\":\"IBM's new Nabla containers are designed for security first 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/ibms-new-nabla-containers-are-designed-for-security-first.jpg\",\"datePublished\":\"2018-07-16T19:18:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/ibms-new-nabla-containers-are-designed-for-security-first.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/ibms-new-nabla-containers-are-designed-for-security-first.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ibms-new-nabla-containers-are-designed-for-security-first\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM&#8217;s new Nabla containers are designed for security first\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM's new Nabla containers are designed for security first 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/","og_locale":"en_US","og_type":"article","og_title":"IBM's new Nabla containers are designed for security first 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-16T19:18:27+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/ibms-new-nabla-containers-are-designed-for-security-first.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"IBM&#8217;s new Nabla containers are designed for security first","datePublished":"2018-07-16T19:18:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/"},"wordCount":530,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/ibms-new-nabla-containers-are-designed-for-security-first.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/","url":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/","name":"IBM's new Nabla containers are designed for security first 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/ibms-new-nabla-containers-are-designed-for-security-first.jpg","datePublished":"2018-07-16T19:18:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/ibms-new-nabla-containers-are-designed-for-security-first.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/ibms-new-nabla-containers-are-designed-for-security-first.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ibms-new-nabla-containers-are-designed-for-security-first\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"IBM&#8217;s new Nabla containers are designed for security first"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=6536"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/6536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/6537"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=6536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=6536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=6536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}