{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/en\/","title":"Free guide: Vulnerabilities in Microsoft Exchange Server - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"oM9yzZJ0GJ\"><a href=\"https:\/\/perseus.de\/en\/free-guide-vulnerabilities-in-microsoft-exchange-server\/\">Free guide: Vulnerabilities in Microsoft Exchange Server<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/en\/free-guide-vulnerabilities-in-microsoft-exchange-server\/embed\/#?secret=oM9yzZJ0GJ\" width=\"600\" height=\"338\" title=\"&#8220;Free guide: Vulnerabilities in Microsoft Exchange Server&#8221; &#8212; Perseus Technologies\" data-secret=\"oM9yzZJ0GJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","thumbnail_width":768,"thumbnail_height":589,"description":"It became known that critical security vulnerabilities have been found in the email transport server software \"Microsoft Exchange Server\". The Perseus emergency aid was particularly used during this time. All the insights gained, concrete instructions for the right course of action during and after an incident as well as helpful tips on what you can do to secure your company even better can be found in the current white paper from Perseus."}