<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>IKARUS Security</provider_name><provider_url>https://www.ikarussecurity.com/en/</provider_url><author_name>IKARUS</author_name><title>Ransomware attacks: Do&#x2018;s and Don&#x2019;ts - IKARUS Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="4StwuxCUv8"&gt;&lt;a href="https://www.ikarussecurity.com/en/resources/ransomware-attacks-dos-and-donts/"&gt;Ransomware attacks: Do&#x2018;s and Don&#x2019;ts&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.ikarussecurity.com/en/resources/ransomware-attacks-dos-and-donts/embed/#?secret=4StwuxCUv8" width="600" height="338" title="&#x201C;Ransomware attacks: Do&#x2018;s and Don&#x2019;ts&#x201D; &#x2014; IKARUS Security" data-secret="4StwuxCUv8" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.ikarussecurity.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.ikarussecurity.com/wp-content/uploads/2021/12/ransomware-600.jpg</thumbnail_url><thumbnail_width>600</thumbnail_width><thumbnail_height>338</thumbnail_height><description>PDF download Anyone who suddenly finds themselves facing locked devices and encrypted data should be aware: The attackers have most likely not just penetrated your network to plant their ransomware. Expect that they have already been looking around your systems for some time and may have taken a lot of sensitive data beforehand.</description></oembed>
