{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/en\/","title":"The Ultimate Phishing Guide - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0rg8v7SX63\"><a href=\"https:\/\/perseus.de\/en\/the-ultimate-phishing-guide\/\">The Ultimate Phishing Guide<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/en\/the-ultimate-phishing-guide\/embed\/#?secret=0rg8v7SX63\" width=\"600\" height=\"338\" title=\"&#8220;The Ultimate Phishing Guide&#8221; &#8212; Perseus Technologies\" data-secret=\"0rg8v7SX63\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Phishing_AdobeStock_198030591-1-768x512-1.jpeg","thumbnail_width":768,"thumbnail_height":512,"description":"We are all constantly confronted with spam and phishing in our professional and private lives. We smile at some attack attempts \u2013 but others are so sophisticated that they are not recognizable as cyberattacks at first glance.  In our guide \"The Ultimate Phishing Guide\", we summarize our expert knowledge in a practice-oriented way so that you can quickly and easily recognize any phishing email on the one hand and build your technical protective wall in such a way that phishing emails don't get through in the first place on the other."}