<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>A New Joint Analytic Report (JAR) from the Cyber Threat Alliance: Cybersecurity in the Age of GenAI - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="bjriWwvDUd"&gt;&lt;a href="https://www.cyberthreatalliance.org/a-new-joint-analytic-report-jar-from-the-cyber-threat-alliance-cybersecurity-in-the-age-of-genai/"&gt;A New Joint Analytic Report (JAR) from the Cyber Threat Alliance: Cybersecurity in the Age of GenAI&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/a-new-joint-analytic-report-jar-from-the-cyber-threat-alliance-cybersecurity-in-the-age-of-genai/embed/#?secret=bjriWwvDUd" width="600" height="338" title="&#x201C;A New Joint Analytic Report (JAR) from the Cyber Threat Alliance: Cybersecurity in the Age of GenAI&#x201D; &#x2014; Cyber Threat Alliance" data-secret="bjriWwvDUd" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2025/01/Gen-AI-Blog-01-01.png</thumbnail_url><thumbnail_width>3229</thumbnail_width><thumbnail_height>2195</thumbnail_height><description>By Chelsea Conard, Cyber Threat Report Analyst The Cyber Threat Alliance (CTA) is excited to announce the publication Joint Analytic Report (JAR): Cybersecurity in the Age of GenAI. The CTA community selected this topic for its growing relevance and reflects the collaborative efforts of 16 CTA organizations. This report is broken into two parts. Part &hellip; Continued</description></oembed>
