<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyberwing</provider_name><provider_url>https://cyberwing.pk/trainings</provider_url><title>Empowering the Digital Defenders: A Comprehensive Guide to Cybersecurity Awareness</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="2Jtdd924XQ"&gt;&lt;a href="https://cyberwing.pk/trainings/cybersecurity-awareness/"&gt;Empowering the Digital Defenders: A Comprehensive Guide to Cybersecurity Awareness&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://cyberwing.pk/trainings/cybersecurity-awareness/embed/#?secret=2Jtdd924XQ" width="600" height="338" title="&#x201C;Empowering the Digital Defenders: A Comprehensive Guide to Cybersecurity Awareness&#x201D; &#x2014; Cyberwing" data-secret="2Jtdd924XQ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://cyberwing.pk/trainings/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://cyberwing.pk/trainings/wp-content/uploads/2023/12/pexels-pixabay-356065-min-scaled.webp</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1829</thumbnail_height><description>In an era dominated by technology, the digital landscape has become an integral part of our daily lives. From personal communication to critical business operations, our reliance on digital platforms has soared. However, with this convenience comes a significant threat &#x2013; the ever-looming specter of cyberattacks. As we navigate the complex web of interconnected devices [&hellip;]</description></oembed>
