{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreieidh2rd3vieogerqld6o3472uz7qdfehur2l4jbtk4vufn5iz4ya",
    "uri": "at://did:plc:z3a345rn6njmxg2o5lxmj3en/app.bsky.feed.post/3mklrlp5jur32"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibjszin2btrz5jiie2gbx3gt6eagluicyaufnoezczrcmo5qvshgq"
    },
    "mimeType": "image/jpeg",
    "size": 319935
  },
  "path": "/news/security/inside-an-opsec-playbook-how-threat-actors-evade-detection/",
  "publishedAt": "2026-04-28T12:50:58.000Z",
  "site": "https://www.bleepingcomputer.com",
  "tags": [
    "Security"
  ],
  "textContent": "Threat actors are now publishing structured OPSEC playbooks to stay undetected. Flare reveals how these guides outline layered infrastructure, identity separation, and long-term evasion strategies. [...]",
  "title": "Inside an OPSEC Playbook: How Threat Actors Evade Detection"
}