{"version":"1.0","provider_name":"Retarus Corporate Blog - DE","provider_url":"https:\/\/www.retarus.com\/blog\/de","title":"Cyber-Attacken: Angreifer aus den eigenen Reihen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TYeUZHH5iK\"><a href=\"https:\/\/www.retarus.com\/blog\/de\/cyber-attacken-angreifer-aus-den-eigenen-reihen\/\">Cyber-Attacken: Angreifer aus den eigenen Reihen<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.retarus.com\/blog\/de\/cyber-attacken-angreifer-aus-den-eigenen-reihen\/embed\/#?secret=TYeUZHH5iK\" width=\"600\" height=\"338\" title=\"&#8222;Cyber-Attacken: Angreifer aus den eigenen Reihen&#8220; &#8211; Retarus Corporate Blog - DE\" data-secret=\"TYeUZHH5iK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.retarus.com\/blog\/de\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.retarus.com\/blog\/de\/wp-content\/uploads\/sites\/4\/2015\/06\/AdobeStock_610832172-scaled-1.jpg","thumbnail_width":2560,"thumbnail_height":1481,"description":"Cyberkriminelle bieten mittlerweile kommerzielle Spamkampagnen an. Diese nutzen die Arglosigkeit unbedarfter Anwender aus und schleusen \u00fcber infizierte Links oder Anh\u00e4nge Malware in das Netz angegriffener Unternehmen. \u00dcber die H\u00e4lfte aller Angriffe kommen Studien zufolge aus den eigenen Reihen. Besonders betroffen sind die Branchen Finance und Manufacturing sowie die Kommunikationsbranche."}