{"id":9027,"date":"2018-08-09T15:17:52","date_gmt":"2018-08-09T15:17:52","guid":{"rendered":"http:\/\/841dd8dd-da2e-42cb-ab18-c92d010ad897"},"modified":"2018-08-09T15:17:52","modified_gmt":"2018-08-09T15:17:52","slug":"open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/","title":{"rendered":"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2018\/08\/09\/b27ae6e0-e741-4128-85da-bbaa68e906c0\/thumbnail\/770x578\/7ee5aadd4705dbf4a8356d70a448d090\/screen-shot-2018-08-09-at-15-43-29.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Researchers have revealed how Microsoft&#8217;s Cortana could be used to bypass the security protection of Windows 10.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>Speaking at Black Hat in Las Vegas this week, security researchers Amichai Shulman and Tal Be&#8217;ery from Kzen Networks, alongside the Israel Institute of Technology&#8217;s Ron Marcovich and Yuval Ron, said a vulnerability existed in the voice assistant <a href=\"https:\/\/www.blackhat.com\/us-18\/briefings\/schedule\/index.html#open-sesame-picking-locks-with-cortana-10547\" target=\"_blank\" rel=\"noopener noreferrer\">which allowed the bypass<\/a> of the Windows 10 lock screen.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/cortana-flaw-allowed-takeover-of-locked-windows-10-device\/134859\/\" target=\"_blank\" rel=\"noopener noreferrer\">As reported by Threat Post<\/a>, the vulnerability, dubbed &#8220;Open Sesame,&#8221; opens the door, bypassing the lock screen, and allows threat actors to locally perform &#8220;dangerous functions.&#8221;<\/p>\n<p>The bug, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8140\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-8140<\/a>, lay within Cortana&#8217;s default settings. Described as a &#8220;Cortana Elevation of Privilege Vulnerability,&#8221; the vulnerability impacts Windows 10 machines and Windows 10 Servers.<\/p>\n<p>As the Windows 10 lock screen disables the keyboard, users are able to utilize their voice to issue a limited range of vocal commands. However, once Cortana is woken up, the keyboard is no longer restricted.<\/p>\n<p>This allowed the research team to launch local commands without the need for authentication or user validation.<\/p>\n<p>As a result, attackers are able to retrieve data from user input services &#8212; including sensitive text and media content &#8212; browse arbitrary websites, download and execute files from the Internet, and in some circumstances, elevate privileges.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>As the attack circumvented the need to login to the system and no external code was required, the researchers said that antivirus software solutions were blind to the activity, according to the publication.<\/p>\n<p>The team noted that the lock screen is far from impenetrable; rather, it acts as another &#8220;desktop&#8221; with limited access.<\/p>\n<p>As more apps are added to the voice assistant in tandem with the lock screen, the potential attack surface increases.<\/p>\n<p><strong>TechRepublic: <a href=\"https:\/\/www.techrepublic.com\/article\/cortana-will-now-read-your-email-and-let-you-verbally-compose-a-response\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cortana will now read your email and let you verbally compose a response<\/a><\/strong><\/p>\n<p>&#8220;In the past, the operating system made sure the UI is not accessible when the computer is locked, therefore developers do not need to think about it,&#8221; the <a href=\"https:\/\/www.slideshare.net\/TalBeery1\/open-sesame-picking-locks-with-cortana\" target=\"_blank\" rel=\"noopener noreferrer\">researchers said<\/a>. &#8220;Now, it&#8217;s the developers&#8217; responsibility.&#8221;<\/p>\n<p><strong>See also: <a href=\"https:\/\/www.zdnet.com\/article\/new-wi-fi-attack-cracks-wpawpa2-passwords-with-ease\/\">New Wi-Fi attack cracks WPA2 passwords with ease<\/a><\/strong><\/p>\n<p>The vulnerability was reported to Microsoft on April 16 and the company issued a remedial patch on June 12. McAfee researchers also notified Microsoft of the same security flaw.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/windows-10-black-screen-problems-fixed-as-microsoft-patches-50-security-flaws\/\">In the same month<\/a>, the Redmond giant resolved 50 security flaws in the Patch Tuesday update, including a black screen problem, an Adobe Flash Player security flaw <a href=\"https:\/\/www.zdnet.com\/article\/windows-users-attacked-via-critical-flash-zero-day-patch-now-urges-adobe\/\">which was being exploited<\/a> in the wild, and a set of remote code execution bugs.<\/p>\n<p><strong>CNET: <a href=\"https:\/\/www.cnet.com\/news\/microsoft-shows-alexa-and-cortana-working-in-smart-harmony\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft shows Alexa and Cortana working in smart harmony<\/a><\/strong><\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploit of Microsoft&#8217;s Cortana did not require any external code.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9028,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-9027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-09T15:17:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security\",\"datePublished\":\"2018-08-09T15:17:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\"},\"wordCount\":439,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\",\"name\":\"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg\",\"datePublished\":\"2018-08-09T15:17:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/","og_locale":"en_US","og_type":"article","og_title":"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-09T15:17:52+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security","datePublished":"2018-08-09T15:17:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/"},"wordCount":439,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/","url":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/","name":"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg","datePublished":"2018-08-09T15:17:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/open-cortana-voice-assistant-used-to-bypass-locked-windows-10-machine-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=9027"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/9027\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/9028"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=9027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=9027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=9027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}