{"version":"1.0","provider_name":"ProSoft Blog","provider_url":"https:\/\/www.prosoft.de\/blog","author_name":"Michael Calana","author_url":"https:\/\/www.prosoft.de\/blog\/author\/sparks\/","title":"Advanced Persistent Threats","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"g3xElp4Y6Y\"><a href=\"https:\/\/www.prosoft.de\/blog\/glossar\/advanced-persistent-threats\/\">Advanced Persistent Threats<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.prosoft.de\/blog\/glossar\/advanced-persistent-threats\/embed\/#?secret=g3xElp4Y6Y\" width=\"600\" height=\"338\" title=\"&#8222;Advanced Persistent Threats&#8220; &#8211; ProSoft Blog\" data-secret=\"g3xElp4Y6Y\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.prosoft.de\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":null,"thumbnail_width":null,"thumbnail_height":null,"description":"Ein Advanced Persistent Threat (APT) ist eine zielgerichtete und langfristig angelegte Cyberangriffsmethode, die von hochqualifizierten und oft gut ausgestatteten Angreifern durchgef\u00fchrt wird. APTs zielen darauf ab, unentdeckt in ein Netzwerk einzudringen, sich darin dauerhaft zu verankern und vertrauliche Daten zu stehlen oder Systeme zu sabotieren."}