{"version":"1.0","provider_name":"CyberArk","provider_url":"https:\/\/www.cyberark.com\/zh-hans\/","author_name":"CyberArk","author_url":"https:\/\/www.cyberark.com\/zh-hans\/","title":"CyberArk Labs: Exploiting Domain-Level Service Credentials","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"CgrAl9BHi5\"><a href=\"https:\/\/www.cyberark.com\/zh-hans\/press\/cyberark-labs-research-stealing-service-credentials\/\">CyberArk Labs: Exploiting Domain-Level Service Credentials<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberark.com\/zh-hans\/press\/cyberark-labs-research-stealing-service-credentials\/embed\/#?secret=CgrAl9BHi5\" width=\"600\" height=\"338\" title=\"\u300a CyberArk Labs: Exploiting Domain-Level Service Credentials \u300b\u2014CyberArk\" data-secret=\"CgrAl9BHi5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberark.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Attackers with Local Administrator Rights Can Harvest Encrypted Service Credentials to Achieve Lateral Movement and Full Domain Compromise \u00a0 NEWTON, Mass. and PETACH TIKVAH, Israel \u2013 November 16, 2016 \u2013 CyberArk (NASDAQ: CYBR) today unveiled new research from ...","thumbnail_url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","thumbnail_width":1024,"thumbnail_height":535}