{"version":"1.0","provider_name":"Tinexta Defence","provider_url":"https:\/\/tinextadefence.it\/en","title":"Malware Analysis Report - Google Malvertising - Tinexta Defence","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RYTLQRYCUI\"><a href=\"https:\/\/tinextadefence.it\/en\/malware-analysis-report-google-malvertising\/\">Malware Analysis Report - Google Malvertising<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/tinextadefence.it\/en\/malware-analysis-report-google-malvertising\/embed\/#?secret=RYTLQRYCUI\" width=\"600\" height=\"338\" title=\"&#8220;Malware Analysis Report &#8211; Google Malvertising&#8221; &#8212; Tinexta Defence\" data-secret=\"RYTLQRYCUI\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/tinextadefence.it\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/tinextadefence.it\/wp-content\/uploads\/2025\/03\/Tinexta_Defence_evidenza_articolo.jpg","thumbnail_width":1200,"thumbnail_height":640,"description":"Per quanto le persone tentino di mantenere alta l\u2019attenzione rispetto ai contenuti in cui navigano (allo scopo di scoprire quelli dannosi), di rado queste prestano attenzione ai nomi di dominio dei siti web visitati.\u00a0 Tra le tecniche malevole oggi in voga, non solo il phishing e i file download infetti, ma anche quelle che riguardano [&hellip;]"}