{"version":"1.0","provider_name":"HX Spotlight Files","provider_url":"https:\/\/hexagoncenter.org\/spotlight","author_name":"Editorial","author_url":"https:\/\/hexagoncenter.org\/spotlight\/author\/ldsdaniel\/","title":"How Cyber Meetings Infiltrate Your System - HX Spotlight Files","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"PZJZiIolz5\"><a href=\"https:\/\/hexagoncenter.org\/spotlight\/how-cyber-meetings-infiltrate-your-system\/\">How Cyber Meetings Infiltrate Your System<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hexagoncenter.org\/spotlight\/how-cyber-meetings-infiltrate-your-system\/embed\/#?secret=PZJZiIolz5\" width=\"600\" height=\"338\" title=\"&#8220;How Cyber Meetings Infiltrate Your System&#8221; &#8212; HX Spotlight Files\" data-secret=\"PZJZiIolz5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hexagoncenter.org\/spotlight\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/hexagoncenter.org\/spotlight\/wp-content\/uploads\/2024\/03\/image.jpeg","thumbnail_width":1880,"thumbnail_height":1258,"description":"The proliferation of remote work and virtual communication platforms has been accompanied by a surge in cyber threats, particularly the use of Remote Access Trojans (RATs) to exploit vulnerabilities in video conferencing applications. RATs are being used to impersonate legitimate Skype, Zoom, and Google Meet applications. These malicious RATs are distributed via phishing emails containing [&hellip;]"}