<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>OPIT - Open Institute of Technology</provider_name><provider_url>https://www.opit.com</provider_url><author_name>OPIT - Open Institute of Technology</author_name><author_url>https://www.opit.com/author/opit-open-institute-of-technology/</author_url><title>Cyber Threat Landscape 2024: Human-Centric Cyber Threats - OPIT - Open Institute of Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="QmROLCjbEN"&gt;&lt;a href="https://www.opit.com/magazine/cyber-threat-landscape-2024-human-centric-cyber-threats/"&gt;Cyber Threat Landscape 2024: Human-Centric Cyber Threats&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.opit.com/magazine/cyber-threat-landscape-2024-human-centric-cyber-threats/embed/#?secret=QmROLCjbEN" width="600" height="338" title="&#x201C;Cyber Threat Landscape 2024: Human-Centric Cyber Threats&#x201D; &#x2014; OPIT - Open Institute of Technology" data-secret="QmROLCjbEN" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.opit.com/wp-content/uploads/2024/04/Cyber-Threat-Landscape-2024-Human-Centric-Cyber-Threats.jpg</thumbnail_url><thumbnail_width>1920</thumbnail_width><thumbnail_height>1080</thumbnail_height><description>Human-centric cyber threats have long posed a serious issue for organizations. After all, humans are often the weakest link in the cybersecurity chain. Unfortunately, when artificial intelligence came into the mix, it only made these threats even more dangerous. So, what can be done about these cyber threats now? That&#x2019;s precisely what we asked Tom [&hellip;]</description></oembed>