    <meta property="twitter:title" content="Exploit Kits: Protect Yourself Before You Wreck Yourself" />
    <meta property="twitter:description" content="Exploit kits have become go-to tools for attackers to take control of victims’ machines or steal information. To protect yourself from this type of attack, it’s important to understand how exploit kits work, what their process is, and what vulnerable parts of your organization they are targeting." />
{"version":"1.0","provider_name":"Palo Alto Networks Blog","provider_url":"https:\/\/www.paloaltonetworks.sg\/blog","author_name":"Eila Shargh","author_url":"https:\/\/www.paloaltonetworks.sg\/blog\/author\/eila-shargh\/","title":"Exploit Kits: Protect Yourself Before You Wreck Yourself","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bWgxxrGKkD\"><a href=\"https:\/\/www.paloaltonetworks.sg\/blog\/2017\/02\/exploit-kits-protect-wreck\/\">Exploit Kits: Protect Yourself Before You Wreck Yourself<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.paloaltonetworks.sg\/blog\/2017\/02\/exploit-kits-protect-wreck\/embed\/#?secret=bWgxxrGKkD\" width=\"600\" height=\"338\" title=\"&#8220;Exploit Kits: Protect Yourself Before You Wreck Yourself&#8221; &#8212; Palo Alto Networks Blog\" data-secret=\"bWgxxrGKkD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.paloaltonetworks.sg\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.paloaltonetworks.in\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","thumbnail_width":650,"thumbnail_height":300,"description":"Exploit kits have become go-to tools for attackers to take control of victims\u2019 machines or steal information. To protect yourself from this type of attack, it\u2019s important to understand how exploit kits work, what their process is, and what vulnerable parts of your organization they are targeting."}