{"version":"1.0","provider_name":"Blog.ICSS","provider_url":"https:\/\/icssindia.in\/blog","author_name":"admin","author_url":"https:\/\/icssindia.in\/blog\/author\/admin\/","title":"Get serious about Cybersecurity Threats and Vulnerabilities - Blog.ICSS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MqL47U7eOI\"><a href=\"https:\/\/icssindia.in\/blog\/get-serious-about-cybersecurity-threats-and-vulnerabilities\/\">Get serious about Cybersecurity Threats and Vulnerabilities<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/icssindia.in\/blog\/get-serious-about-cybersecurity-threats-and-vulnerabilities\/embed\/#?secret=MqL47U7eOI\" width=\"600\" height=\"338\" title=\"&#8220;Get serious about Cybersecurity Threats and Vulnerabilities&#8221; &#8212; Blog.ICSS\" data-secret=\"MqL47U7eOI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/icssindia.in\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/06\/Blog-Cybersecurity-Threats-and-Vulnerabilities.png","thumbnail_width":1200,"thumbnail_height":628,"description":"Cyber security threats and vulnerabilities are ever-evolving and can cause serious damage if not managed correctly. It is important for organizations to identify, analyze, and mitigate these threats and vulnerabilities in order to secure their systems and data."}