<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>OPIT - Open Institute of Technology</provider_name><provider_url>https://www.opit.com</provider_url><author_name>OPIT - Open Institute of Technology</author_name><author_url>https://www.opit.com/author/opit-open-institute-of-technology/</author_url><title>Cyber Threat Landscape 2024: Geopolitical Cyber Threats - OPIT - Open Institute of Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yfwJbIOSW7"&gt;&lt;a href="https://www.opit.com/magazine/cyber-threat-landscape-2024-geopolitical-cyber-threats/"&gt;Cyber Threat Landscape 2024: Geopolitical Cyber Threats&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.opit.com/magazine/cyber-threat-landscape-2024-geopolitical-cyber-threats/embed/#?secret=yfwJbIOSW7" width="600" height="338" title="&#x201C;Cyber Threat Landscape 2024: Geopolitical Cyber Threats&#x201D; &#x2014; OPIT - Open Institute of Technology" data-secret="yfwJbIOSW7" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.opit.com/wp-content/uploads/2024/04/Cyber-Threat-Landscape-2024-Geopolitical-Cyber-Threats.jpg</thumbnail_url><thumbnail_width>1920</thumbnail_width><thumbnail_height>1080</thumbnail_height><description>There are currently few things that worry CEOs worldwide as much as geopolitics. Cybersecurity is undoubtedly one of them. But what happens when you combine geopolitical conflicts and cyber threats? Geopolitical cyber threats, that&#x2019;s what. This lethal combination threatens to disrupt economies, destabilize governments, and shatter global stability. That&#x2019;s why it must be met with [&hellip;]</description></oembed>