<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>LACNIC Blog</provider_name><provider_url>https://blog.lacnic.net/en/</provider_url><title>LACNIC Blog | Phishing: Three Key Trends and How to Protect Yourself</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Civ2CnwWqo"&gt;&lt;a href="https://blog.lacnic.net/en/cybersecurity-smishing-attacks/"&gt;Phishing: Three Key Trends and How to Protect Yourself&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://blog.lacnic.net/en/cybersecurity-smishing-attacks/embed/#?secret=Civ2CnwWqo" width="600" height="338" title="&#x201C;Phishing: Three Key Trends and How to Protect Yourself&#x201D; &#x2014; LACNIC Blog" data-secret="Civ2CnwWqo" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://blog.lacnic.net/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://blog.lacnic.net/wp-content/uploads/2025/03/cybersecurity-atack-smishing.png</thumbnail_url><thumbnail_width>680</thumbnail_width><thumbnail_height>330</thumbnail_height><description>By Graciela Mart&#xED;nez Phishing continues to evolve with new tactics designed to deceive users and compromise their information. This year, we want to highlight three trends that stand out in the cyberattack landscape: the rise of smishing, the increasing use of cloud hosting for phishing, and the use of artificial intelligence as a tool for [&hellip;]</description></oembed>
