<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>SecurityIT | Cyber Security Consulting</provider_name><provider_url>https://www.show.it/en/</provider_url><author_name>enrico</author_name><author_url>https://www.show.it/en/author/enrico/</author_url><title>What Makes a Good Exploit Kit - SecurityIT | Cyber Security Consulting</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Qhb4iBd99s"&gt;&lt;a href="https://www.show.it/en/what-makes-a-good-exploit-kit/"&gt;What Makes a Good Exploit Kit&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.show.it/en/what-makes-a-good-exploit-kit/embed/#?secret=Qhb4iBd99s" width="600" height="338" title="&#x201C;What Makes a Good Exploit Kit&#x201D; &#x2014; SecurityIT | Cyber Security Consulting" data-secret="Qhb4iBd99s" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.show.it/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Exploit kits, pre-packaged software that uses vulnerabilities in software applications to spread malware, are not new to the information security community. Since 2006, when threat research organizations began seriously tracking their growth and distribution on a global basis, their popularity has increased within the underground steadily. read more</description></oembed>
