<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>LACNIC Blog</provider_name><provider_url>https://blog.lacnic.net/en/</provider_url><title>LACNIC Blog | Major Cyber Security Threats</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="RkOShyz05y"&gt;&lt;a href="https://blog.lacnic.net/en/major-cyber-security-threats/"&gt;Major Cyber Security Threats&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://blog.lacnic.net/en/major-cyber-security-threats/embed/#?secret=RkOShyz05y" width="600" height="338" title="&#x201C;Major Cyber Security Threats&#x201D; &#x2014; LACNIC Blog" data-secret="RkOShyz05y" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://blog.lacnic.net/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://blog.lacnic.net/wp-content/uploads/2018/07/las-amenazas-mas-latentes-seguridad.png</thumbnail_url><thumbnail_width>680</thumbnail_width><thumbnail_height>330</thumbnail_height><description>The Forum of Incident Response and Security Teams (FIRST) analyzed the most significant cyber threats worldwide, including digital platforms which offer services for conducting cyber attacks and new extremely destructive forms of malware. FIRST held its thirtieth annual conference in Kuala Lumpur and was attended by more than 800 experts from around the world, including [&hellip;]</description></oembed>
