<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>CTA Webinar - Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="opv8Izy97k"&gt;&lt;a href="https://www.cyberthreatalliance.org/cta-webinar-adapt-your-defenses-there-are-enough-ddos-attack-vectors-to-fill-a-periodic-table-2/"&gt;CTA Webinar &#x2013; Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/cta-webinar-adapt-your-defenses-there-are-enough-ddos-attack-vectors-to-fill-a-periodic-table-2/embed/#?secret=opv8Izy97k" width="600" height="338" title="&#x201C;CTA Webinar &#x2013; Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table&#x201D; &#x2014; Cyber Threat Alliance" data-secret="opv8Izy97k" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2022/10/CTA-Webinar-Adapt-your-defenses-1-1024x684.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>684</thumbnail_height><description>Adversaries constantly innovate and explore new and more powerful DDoS attack methods, called vectors, creating new ones every year. As DDoS defenses become more precise and effective, attackers continue to find ways to bypass those defenses &#x2013; making it every more difficult to protect your organization. Join us as Richard Hummel of NETSCOUT presents findings &hellip; Continued</description></oembed>
