{"version":"1.0","provider_name":"Business Yield Technology","provider_url":"https:\/\/businessyield.com\/tech","title":"WATERING HOLE ATTACK: What Is It &amp; How Do You Prevent One?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NDaTayni1c\"><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/watering-hole-attack\/\">WATERING HOLE ATTACK: What Is It &amp; How Do You Prevent One?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/businessyield.com\/tech\/cyber-security\/watering-hole-attack\/embed\/#?secret=NDaTayni1c\" width=\"600\" height=\"338\" title=\"&#8220;WATERING HOLE ATTACK: What Is It &amp; How Do You Prevent One?&#8221; &#8212; Business Yield Technology\" data-secret=\"NDaTayni1c\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/cccccccccccc-44.jpg","thumbnail_width":500,"thumbnail_height":250,"description":"A watering hole attack vs. pharming is a type of cyberattack where a threat actor targets a company by hacking a website that an employee frequently visits to infect the employee's device with malware. Read further to learn more about how watering hole attacks work in cyber security, warning signs to look for, and how to prevent them."}