{"version":"1.0","provider_name":"Forescout","provider_url":"https:\/\/www.forescout.com","author_name":"Forescout Research - Vedere Labs","author_url":"https:\/\/www.forescout.com\/blog\/author\/forescout-research-labs\/","title":"R4IoT: When Ransomware Meets the Internet of Things - Forescout","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lp54uwgmkr\"><a href=\"https:\/\/www.forescout.com\/blog\/r4iot-when-ransomware-meets-the-internet-of-things\/\">R4IoT: When Ransomware Meets the Internet of Things<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.forescout.com\/blog\/r4iot-when-ransomware-meets-the-internet-of-things\/embed\/#?secret=lp54uwgmkr\" width=\"600\" height=\"338\" title=\"&#8220;R4IoT: When Ransomware Meets the Internet of Things&#8221; &#8212; Forescout\" data-secret=\"lp54uwgmkr\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Some threat actors are routinely mixing traditional endpoints with unmanaged devices such as VPN appliances, routers, network attached storage (NAS) and building automation devices as part of their attack campaigns. Clearly, it's not enough to detect emerging threats; you must also be able to respond to them.","thumbnail_url":"https:\/\/fast.wistia.com\/embed\/medias\/l6p1zgfsnu\/swatch"}