{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/es\/","author_name":"CyberArk","author_url":"https:\/\/www.cyberark.com\/es\/","title":"CyberArk to Present Pass-the-Hash Vulnerability Data at Black Hat","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6T8s9kJGmo\"><a href=\"https:\/\/www.cyberark.com\/es\/press\/cyberark-present-pass-hash-vulnerability-data-black-hat\/\">CyberArk to Present Pass-the-Hash Vulnerability Data at Black Hat<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/es\/press\/cyberark-present-pass-hash-vulnerability-data-black-hat\/embed\/#?secret=6T8s9kJGmo\" width=\"600\" height=\"338\" title=\"\u00abCyberArk to Present Pass-the-Hash Vulnerability Data at Black Hat\u00bb \u2014 CyberArk\" data-secret=\"6T8s9kJGmo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Session will Explore the Privilege Account Security Threat and Highlight Network Exposure Newton, Mass. \u2013 August 5, 2014 \u2013 CyberArk, the company securing the heart of the enterprise, today announced that Andrey Dulkin, senior director...","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","thumbnail_width":1024,"thumbnail_height":535}