<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Infoblox Blog</provider_name><provider_url>https://www.infoblox.com/blog</provider_url><author_name>Michael Zuckerman</author_name><author_url>https://www.infoblox.com/blog/author/michael-zuckerman/</author_url><title>2021 Most Exploited Vulnerabilities</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="4C4Qyhdej8"&gt;&lt;a href="https://www.infoblox.com/blog/security/2021-most-exploited-vulnerabilities/"&gt;2021 Most Exploited Vulnerabilities&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.infoblox.com/blog/security/2021-most-exploited-vulnerabilities/embed/#?secret=4C4Qyhdej8" width="600" height="338" title="&#x201C;2021 Most Exploited Vulnerabilities&#x201D; &#x2014; Infoblox Blog" data-secret="4C4Qyhdej8" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.infoblox.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.infoblox.com/blog/wp-content/uploads/unlocked-lock-1.jpg</thumbnail_url><thumbnail_width>441</thumbnail_width><thumbnail_height>340</thumbnail_height><description>2021 Most Exploited Vulnerabilities. Cybersecurity authorities just issued alert AA22-117A, which provides information on the top 15 Common Vulnerabilities and Exposures (CVEs) most frequently used and exploited by malicious cyber actors in 2021. This important alert was co-authored by the cybersecurity authorities from the United States, Australia, New Zealand, Canada, and the United Kingdom. In the United States, key participants included the Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA). Please note that there are approximately 611 more dangerous CVEs in the CISA Known Exploited Vulnerabilities Catalog.</description></oembed>
