{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/ko\/","author_name":"CyberArk","author_url":"https:\/\/www.cyberark.com\/ko\/","title":"CyberArk Adds Credential Theft Blocking to Expand Privilege Protection at the Endpoint","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lOQTdWh3XM\"><a href=\"https:\/\/www.cyberark.com\/ko\/press\/cyberark-adds-credential-theft-blocking\/\">CyberArk Adds Credential Theft Blocking to Expand  Privilege Protection at the Endpoint<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/ko\/press\/cyberark-adds-credential-theft-blocking\/embed\/#?secret=lOQTdWh3XM\" width=\"600\" height=\"338\" title=\"&#8220;CyberArk Adds Credential Theft Blocking to Expand  Privilege Protection at the Endpoint&#8221; &#8212; CyberArk\" data-secret=\"lOQTdWh3XM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Combination of New Targeted Behavioral Analytics with Proven Privilege Management and Application Control Capabilities Enables Organizations to Better Detect and Contain Cyber Attacks NEWTON, Mass. and PETACH TIKVAH, Israel \u2013 November 16, 2016 \u2013 CyberArk...","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","thumbnail_width":1024,"thumbnail_height":535}