{"id":4799,"date":"2025-07-02T12:12:31","date_gmt":"2025-07-02T12:12:31","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/02\/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat\/"},"modified":"2025-07-02T12:12:31","modified_gmt":"2025-07-02T12:12:31","slug":"that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/02\/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat\/","title":{"rendered":"That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat"},"content":{"rendered":"<p>\u200bWith nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what\u2019s legitimate traffic and what is potentially dangerous?<br \/>\nWhere do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen from 3% to 22%, according to\u00a0With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what\u2019s legitimate traffic and what is potentially dangerous?<br \/>\nWhere do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen from 3% to 22%, according to\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bWith nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what\u2019s legitimate traffic and what is potentially dangerous? Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/02\/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4800,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4799"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4799"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4799\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4800"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}