<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Save</provider_name><provider_url>https://news.save.ch/fr</provider_url><author_name>Simon Gr&#xF6;flin</author_name><author_url>https://news.save.ch/fr/author/simon-groeflin/</author_url><title>Hackerangriff &#x2013; was nun? - Save</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="rLwezo25jZ"&gt;&lt;a href="https://news.save.ch/fr/hackerangriff-was-nun/"&gt;Piratage informatique - et maintenant ?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://news.save.ch/fr/hackerangriff-was-nun/embed/#?secret=rLwezo25jZ" width="600" height="338" title="" Attaque de hacker - et maintenant ? " - Save" data-secret="rLwezo25jZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://news.save.ch/wp-includes/js/wp-embed.min.js
&lt;/script&gt;</html><thumbnail_url>https://news.save.ch/wp-content/uploads/2020/12/Cybersecurity_pixaby_teaser.png</thumbnail_url><thumbnail_width>945</thumbnail_width><thumbnail_height>554</thumbnail_height><description>T&#xE4;glich stehen sich viele Unternehmen einer Bedrohung ausgesetzt. Doch, was ist zu tun, wenn es bereits passiert? Blackberry hat einen Leitfaden erstellt, der aufzeigen soll, worauf es ankommt, wenn Dritte bereits einen erfolgreichen Angriff durchgef&#xFC;hrt haben.</description></oembed>
