{"version":"1.0","provider_name":"Cyber 4.0","provider_url":"https:\/\/www.cyber40.it\/en\/","author_name":"Cyber 4.0","author_url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/","title":"Cybersecurity, how to defend against hacker attacks - Cyber 4.0","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"v0Ols6AsaP\"><a href=\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/\">Cybersecurity, how to defend against hacker attacks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyber40.it\/en\/cybersecurity-how-to-defend-against-hacker-attacks\/embed\/#?secret=v0Ols6AsaP\" width=\"600\" height=\"338\" title=\"&#8220;Cybersecurity, how to defend against hacker attacks&#8221; &#8212; Cyber 4.0\" data-secret=\"v0Ols6AsaP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/WhatsApp-Image-2022-05-20-at-16.53.14-scaled.jpeg","thumbnail_width":1200,"thumbnail_height":900,"description":"Cyber 4.0 is participating today in an event organized by Confindustria Umbria and the Digital Innovation Hub of Umbria, with which the Competence Center collaborates. More than 60 SMBs attended the event, some of whom shared experiences of attacks suffered at the hands of the Conti ransomware gang, resulting in weeks of operational freezes and..."}