{"version":"1.0","provider_name":"Blog da ValueHost","provider_url":"https:\/\/www.valuehost.com.br\/blog","author_name":"Administrador","author_url":"https:\/\/www.valuehost.com.br\/blog\/author\/admin\/","title":"Mapa de ataques digitais - Blog da ValueHost","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"u29Yu2VQ8d\"><a href=\"https:\/\/www.valuehost.com.br\/blog\/mapa-de-ataques-digitais\/\">Mapa de ataques digitais<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.valuehost.com.br\/blog\/mapa-de-ataques-digitais\/embed\/#?secret=u29Yu2VQ8d\" width=\"600\" height=\"338\" title=\"&#8220;Mapa de ataques digitais&#8221; &#8212; Blog da ValueHost\" data-secret=\"u29Yu2VQ8d\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.valuehost.com.br\/blog\/wp-content\/uploads\/2015\/02\/ataque_digital.jpg","thumbnail_width":831,"thumbnail_height":350,"description":"O mapa de ataques digitais representa uma ferramenta fundamental para compreender a complexidade e a amplitude das amea\u00e7as cibern\u00e9ticas enfrentadas por organiza\u00e7\u00f5es atualmente. Sua elabora\u00e7\u00e3o detalhada permite que equipes de seguran\u00e7a visualizem, em tempo real ou por meio de an\u00e1lises hist\u00f3ricas, os pontos de vulnerabilidade, os tipos de ataques mais frequentes e as regi\u00f5es ou"}