<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Email Security Blog - MX Layer</provider_name><provider_url>https://www.mxlayer.com/blog</provider_url><author_name>MX Layer</author_name><author_url>https://www.mxlayer.com/blog/author/admin_i60jvcwc/</author_url><title>What is Whaling Phishing? - Email Security Blog - MX Layer</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="GPW9TiqbWk"&gt;&lt;a href="https://www.mxlayer.com/blog/email-security/what-is-whaling-phishing/"&gt;What is Whaling Phishing?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.mxlayer.com/blog/email-security/what-is-whaling-phishing/embed/#?secret=GPW9TiqbWk" width="600" height="338" title="&#x201C;What is Whaling Phishing?&#x201D; &#x2014; Email Security Blog - MX Layer" data-secret="GPW9TiqbWk" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.mxlayer.com/blog/wp-content/uploads/2024/07/red-padlock-with-chain.jpg</thumbnail_url><thumbnail_width>821</thumbnail_width><thumbnail_height>548</thumbnail_height><description>Discover all you need to know about whaling phishing attacks in cyber security. Learn how cybercriminals target high-ranking executives, the tactics they employ, and the devastating consequences of falling victim to such scams. Arm yourself with knowledge to spot and defend against whaling attacks effectively with insights from seasoned experts.</description></oembed>
