{"version":"1.0","provider_name":"Business Yield Technology","provider_url":"https:\/\/businessyield.com\/tech","title":"WHITE HAT HACKERS: Definition, Tools &amp; More","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Bori7HP1V0\"><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/white-hat-hackers\/\">WHITE HAT HACKERS: Definition, Tools &amp; More<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/businessyield.com\/tech\/cyber-security\/white-hat-hackers\/embed\/#?secret=Bori7HP1V0\" width=\"600\" height=\"338\" title=\"&#8220;WHITE HAT HACKERS: Definition, Tools &amp; More&#8221; &#8212; Business Yield Technology\" data-secret=\"Bori7HP1V0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/WHITE-HAT-HACKERS.jpg","thumbnail_width":500,"thumbnail_height":250,"description":"Despite the common misconception that hacking equates to cybercrime, white hat hackers apply their expertise to assist corporations in creating information systems that are more secure. They take advantage of their technological expertise to spot gaps in data and computer security and assist in finding vulnerabilities to shield people and businesses from online fraud. These are a few of their key roles: #1. Evaluation of security"}