{"version":"1.0","provider_name":"Faster.cz","provider_url":"https:\/\/www.faster.cz\/en\/","title":"Cyber Security: Angler phishing (5\/5) - Faster.cz","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Y2L4cN8UKC\"><a href=\"https:\/\/www.faster.cz\/en\/news\/blog\/cyber-security-angler-phishing-5-5\/\">Cyber Security: Angler phishing (5\/5)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.faster.cz\/en\/news\/blog\/cyber-security-angler-phishing-5-5\/embed\/#?secret=Y2L4cN8UKC\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Security: Angler phishing (5\/5)&#8221; &#8212; Faster.cz\" data-secret=\"Y2L4cN8UKC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.faster.cz\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.faster.cz\/wp-content\/uploads\/2024\/02\/06_blog.webp","thumbnail_width":1000,"thumbnail_height":667,"description":"Angler phishing he is the youngest member compared to his colleagues. This is the type of cyber attack that targets social media users. It takes place almost exclusively on Facebook, Twitter and Instagram platforms. It is designed to reach out to a disgruntled client as part of a customer care campaign and obtain their personal [&hellip;]"}