{"version":"1.0","provider_name":"LocateRisk","provider_url":"https:\/\/locaterisk.com\/en","title":"Social Hacking, Cyber Spionage und Co. - LocateRisk","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"9rmX5kP7tw\"><a href=\"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/\">Social Hacking, Cyber Espionage and Co.<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/embed\/#?secret=9rmX5kP7tw\" width=\"600\" height=\"338\" title=\"&quot;Social hacking, cyber espionage and co.&quot; - LocateRisk\" data-secret=\"9rmX5kP7tw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","thumbnail_width":1080,"thumbnail_height":1080,"description":"Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]"}