Closed himynamesdave closed 1 month ago
@fqrious this test is still showing
"https://unit42.paloaltonetworks.com/category/threat-research/feed/": {
"include_remote_blogs": False,
"id": "16341792-226e-5a55-829e-a7cbcd2d54af"
},
"include_remote_blogs": false
in jobs endpoint
{
"page_size": 50,
"page_number": 1,
"page_results_count": 1,
"total_results_count": 1,
"jobs": [
{
"id": "bf4d47be-dd52-4ad1-9267-57b8b69f2d9a",
"count_of_items": 210,
"feed_id": "b4e3f13c-0ad6-5abe-be01-2475d341bf84",
"urls": {
"retrieved": [],
"retrieving": [],
"skipped": [
{
"url": "https://unit42.paloaltonetworks.com/script-based-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/wastedlocker/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2020-8558/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/valak-evolution/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/oilrig-novel-c2-channel-steganography/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2020-1350/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/avertx-ip-cameras-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/windows-server-containers-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-assessment-ekans-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/lucifer-new-cryptojacking-and-ddos-hybrid-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/gps-tracking-and-future-application-for-iot/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/acidbox-rare-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/6-new-d-link-vulnerabilities-found-on-home-routers/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-assessment-hangover-threat-group/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/ironnetinjector/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/watchdog-cryptojacking/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2020-25213/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/pro-ocean-rocke-groups-new-cryptojacking-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/network-attack-trends-internet-threats/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/wireshark-tutorial-emotet-infection/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/aws-ebs-direct-apis/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bumblebee-webshell-xhunt-campaign/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/ta551-shathak-icedid/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dns-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/solarstorm-supply-chain-attack-timeline/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2020-8554/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dearcry-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/microsoft-exchange-server-attack-timeline/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/remediation-steps-for-the-microsoft-exchange-server-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/china-chopper-webshell/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/overview-of-dnsmasq-vulnerabilities-the-dangers-of-dns-cache-poisoning/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/attack-chain-overview-emotet-in-december-2020-and-january-2021/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/microsoft-exchange-server-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2020-17049/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/fast-flux-101/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/ironnetinjector/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/watchdog-cryptojacking/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2020-25213/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/matanbuchus-malware-as-a-service/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/prometheus-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/teamtnt-cryptojacking-watchdog-operations/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/siloscape/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/teamtnt-operations-cloud-environments/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/docker-honeypot/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/wiped-computer-with-digital-forensics/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/c2-traffic/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/breaking-down-ransomware-attacks/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bazarloader-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/darkside-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/file-transfer-threats/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/proactive-detector/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/westeal/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/unsecured-kubernetes-instances/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/network-security-trends/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/omi-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dangling-domains/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/travel-themed-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/javascript-based-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/azure-container-instances/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2021-26084/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/benign-append-attacks-iupg/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dns-rebinding/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2021-32305-websvn/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/phishing-attacks/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/emerging-ransomware-groups/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/person-vpn-network-visibility/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/captcha-protected-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/ech0raix-ransomware-soho/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/teamtnt-cryptojacking-watchdog-operations/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cloud-network-scanning-traffic/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bazarloader-network-reconnaissance/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/exploits-interactsh/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/silverterrier-nigerian-business-email-compromise/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/wireshark-workshop-videos/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/credential-harvesting/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cloud-threat-report-2h-2021/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/network-security-trends/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/omi-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dangling-domains/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/travel-themed-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/javascript-based-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/azure-container-instances/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2021-26084/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cobalt-strike-metadata-encoding-decoding/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bazarloader-anti-analysis-techniques/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/blackbyte-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/visibility-k8s-clusters/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/iam-cloud-threat-research/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/web-threats-malicious-host-urls/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/solarmarker-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/lapsus-group/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/2022-ransomware-threat-report-highlights/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/iot-supply-chain-cve-2021-28372/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2-profile/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2022-0492-cgroups/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/lazagne-leverages-d-bus/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/wireshark-quiz-redline-stealer/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/sugarcrm-cloud-incident-black-hat/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/nodestealer-2-targets-facebook-business/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-brief-cve-2023-35078/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-brief-citrix-cve-2023-3519/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/url-delivered-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/mallox-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2023-36884-rce/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/malicious-packages-in-pypi/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/manic-menagerie-targets-web-hosting-and-it/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cobalt-strike-malleable-c2/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/operation-diplomatic-specter/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2024-3400/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/muddled-libra-evolution-to-cloud/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-brief-xz-utils-cve-2024-3094/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/chinese-apts-target-asean-entities/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/strelastealer-campaign/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/curious-serpens-falsefont-backdoor/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/unit-42-scpc-ssscip-uncover-smoke-loader-phishing/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/analysis-of-bunnyloader-malware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/muddled-libra/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/using-wireshark-exporting-objects-from-a-pcap/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/darkgate-malware-uses-excel-files/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/javascript-malware-gootloader/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-brief-cve-2024-6387-openssh/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/contrastive-credibility-propagation/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/attackers-exploit-public-cobalt-strike-profiles/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cloud-virtual-machine-attack-vectors/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/operation-diplomatic-specter/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cve-2024-3400/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/muddled-libra-evolution-to-cloud/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-brief-xz-utils-cve-2024-3094/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/new-bola-vulnerability-grafana/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/profiling-detecting-malicious-dns-traffic/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/2024-unit-42-attack-surface-threat-research-internet-connected-exposures/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cybersquatting-using-genai-keywords/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bola-vulnerabilities-easyappointments/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/accelerating-malware-analysis/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/profiling-detecting-malicious-dns-traffic/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/2024-unit-42-attack-surface-threat-research-internet-connected-exposures/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/cybersquatting-using-genai-keywords/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/repellent-scorpius-cicada3301-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/dynamics-of-deepfake-scams/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/profiling-detecting-malicious-dns-traffic/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/2024-unit-42-attack-surface-threat-research-internet-connected-exposures/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/github-repo-artifacts-leak-tokens/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/automated-bola-detection-and-ai/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/inc-ransomware-rebrand-to-lynx/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/detecting-dns-tunneling-campaigns/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/machine-learning-new-swiss-army-suite-tool/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/kimsuky-new-keylogger-backdoor-variant/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/phishing-platform-sniper-dz-unique-tactics/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/snipbot-romcom-malware-variant/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/analysis-pentest-tool-splinter/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/repellent-scorpius-cicada3301-ransomware/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/threat-assessment-north-korean-threat-groups-2024/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/",
"id": null
},
{
"url": "https://unit42.paloaltonetworks.com/tracking-newly-released-top-level-domains/",
"id": null
}
],
"failed": []
},
"state": "success",
"run_datetime": "2024-10-14T15:30:33.664115Z",
"earliest_item_requested": "2020-01-01T00:00:00Z",
"latest_item_requested": "2024-10-14T15:30:33.663789Z",
"info": "",
"profile_id": null,
"include_remote_blogs": false
}
]
}
See
specifically
include_remote_blogs
is always logged asfalse
no matter how I form this request,