<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Infoblox Blog</provider_name><provider_url>https://www.infoblox.com/blog</provider_url><author_name>Ren&#xE9;e Burton</author_name><author_url>https://www.infoblox.com/blog/author/renee-burton/</author_url><title>Introducing DNS Threat Actors | Infoblox</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="9mlnVuOBju"&gt;&lt;a href="https://www.infoblox.com/blog/threat-intelligence/introducing-dns-threat-actors/"&gt;Introducing DNS Threat Actors&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.infoblox.com/blog/threat-intelligence/introducing-dns-threat-actors/embed/#?secret=9mlnVuOBju" width="600" height="338" title="&#x201C;Introducing DNS Threat Actors&#x201D; &#x2014; Infoblox Blog" data-secret="9mlnVuOBju" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.infoblox.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.infoblox.com/blog/wp-content/uploads/introducing-dns-threat-actors-thumbnail.jpg</thumbnail_url><thumbnail_width>612</thumbnail_width><thumbnail_height>405</thumbnail_height><description>Explore the world of DNS threat actors and discover how they operate in the shadows, controlling the infrastructure behind cyber threats. Learn how only DNS can protect your network before an attack.</description></oembed>
