<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>LACNIC Blog</provider_name><provider_url>https://blog.lacnic.net/en/</provider_url><title>LACNIC Blog | Analysis of advanced phishing techniques and their mitigation</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="22sVf7MCJP"&gt;&lt;a href="https://blog.lacnic.net/en/advanced-phishing/"&gt;Analysis of advanced phishing techniques and their mitigation&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://blog.lacnic.net/en/advanced-phishing/embed/#?secret=22sVf7MCJP" width="600" height="338" title="&#x201C;Analysis of advanced phishing techniques and their mitigation&#x201D; &#x2014; LACNIC Blog" data-secret="22sVf7MCJP" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://blog.lacnic.net/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://blog.lacnic.net/wp-content/uploads/2026/01/cybersecurity-warning-padlock-red-exclamation-mark-copia.webp</thumbnail_url><thumbnail_width>680</thumbnail_width><thumbnail_height>330</thumbnail_height><description>By Guillermo Pereyra Phishing is no longer limited to using easily identifiable emails or links as attack vectors. Although these techniques are still in use, modern attacks aim to evade more robust security measures, such as two-factor authentication (2FA) or session cookie hijacking. This article will look at how these advanced phishing techniques work and [&hellip;]</description></oembed>
