<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Perseus Technologies</provider_name><provider_url>https://perseus.de/en/</provider_url><title>When hackers hack hackers - Perseus Technologies</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="5a9pZbb3Bs"&gt;&lt;a href="https://perseus.de/en/when-hackers-hack-hackers/"&gt;When hackers hack hackers&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://perseus.de/en/when-hackers-hack-hackers/embed/#?secret=5a9pZbb3Bs" width="600" height="338" title="&#x201C;When hackers hack hackers&#x201D; &#x2014; Perseus Technologies" data-secret="5a9pZbb3Bs" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://perseus.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://perseus.de/wp-content/uploads/2025/05/Blog-Header-Wie-Hacker-Hacker-werden.jpg</thumbnail_url><thumbnail_width>730</thumbnail_width><thumbnail_height>412</thumbnail_height><description>13.03.2020 When hackers hack hackers Cybersecurity | Hacker | Cybercrime Exceptionally, cybercriminals also hack each other. But that&#x2019;s not a reason to breathe a sigh of relief. The common image of hackers is that of computer experts who develop and distribute malware as anonymous lone perpetrators. But even among cybercriminals, why reinvent the wheel unnecessarily? [&hellip;]</description></oembed>
