{"version":"1.0","provider_name":"Blogs","provider_url":"https:\/\/www.tsfactory.com\/forums\/blogs","title":"Top 5 Cybersecurity Threats For 2018 - Blogs","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"HBCKKQ7yb8\"><a href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/\">Top 5 Cybersecurity Threats For 2018<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/embed\/#?secret=HBCKKQ7yb8\" width=\"600\" height=\"338\" title=\"&#8220;Top 5 Cybersecurity Threats For 2018&#8221; &#8212; Blogs\" data-secret=\"HBCKKQ7yb8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.tsfactory.com\/forums\/blogs\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg","thumbnail_width":401,"thumbnail_height":267,"description":"Top 5 Cybersecurity Threats For 2018 Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for. \u00a01. Crime-As-A-Service (CaaS) Expands Tools and Service"}