<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name/><provider_url>https://www.securedenterprise.com/za</provider_url><title>Do hackers choose their targets? -</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="r1jDR3JzGK"&gt;&lt;a href="https://www.securedenterprise.com/za/do-hackers-choose-their-targets/"&gt;Do hackers choose their targets?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.securedenterprise.com/za/do-hackers-choose-their-targets/embed/#?secret=r1jDR3JzGK" width="600" height="338" title="&#x201C;Do hackers choose their targets?&#x201D; &#x2014; " data-secret="r1jDR3JzGK" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.securedenterprise.com/za/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.securedenterprise.com/za/wp-content/uploads/2022/07/Blog-Images-April-2022_Do-hackers-choose-their-targets-Small-1024x260-1.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>260</thumbnail_height><description>Cybercrime is on the rise, and many businesses and governments are affected by the outcome. As the number of attacks rise, we want to know how the hackers or infiltrators get to work on their targets. Each cyberattack highlights the vulnerabilities that organisations have and how different each hacker is. To understand the choice in [&hellip;]</description></oembed>
