{"version":"1.0","provider_name":"LACNIC Blog","provider_url":"https:\/\/blog.lacnic.net\/en\/","title":"LACNIC Blog | Protocols Vulnerable to DDos Attacks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0AOEGSGYF8\"><a href=\"https:\/\/blog.lacnic.net\/en\/protocols-vulnerable-to-ddos-attacks\/\">Protocols Vulnerable to DDos Attacks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.lacnic.net\/en\/protocols-vulnerable-to-ddos-attacks\/embed\/#?secret=0AOEGSGYF8\" width=\"600\" height=\"338\" title=\"&#8220;Protocols Vulnerable to DDos Attacks&#8221; &#8212; LACNIC Blog\" data-secret=\"0AOEGSGYF8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.lacnic.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2021\/10\/ataques-de-ddos-lacnic36-lacnog2021.png","thumbnail_width":680,"thumbnail_height":330,"description":"As part of the Technology Hour included in the LACNIC 36 LACNOG 2021 program, LACNIC CSIRT presented a study on protocols that can be leveraged by DDoS attacks in Latin America and the Caribbean. The purpose of the initiative was to improve the security levels of the systems that use IP resources in the LACNIC [&hellip;]"}