{"version":"1.0","provider_name":"Security Leadership","provider_url":"https:\/\/heliview.com\/security-leadership","title":"Elastic Global Threat Report - Security Leadership","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yoRXwZw60H\"><a href=\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/\">Elastic Global Threat Report<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/embed\/#?secret=yoRXwZw60H\" width=\"600\" height=\"338\" title=\"&#8220;Elastic Global Threat Report&#8221; &#8212; Security Leadership\" data-secret=\"yoRXwZw60H\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png","thumbnail_width":1140,"thumbnail_height":350,"description":"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]In Elastic Security Labs&#8217; inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a broad set of telemetry data. From this threat [&hellip;]"}