<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Sonatus</provider_name><provider_url>https://www.sonatus.com/zh-tw/</provider_url><author_name>Rex Sabio</author_name><author_url>https://www.sonatus.com/zh-tw/blog/author/rex-sabiosonatus-com/</author_url><title>Are Vehicle Cyberattacks Already Here?</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="UYgDNPvIRE"&gt;&lt;a href="https://www.sonatus.com/zh-tw/resources/jason-masker-of-upstream/"&gt;Are Vehicle Cyberattacks Already Here?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.sonatus.com/zh-tw/resources/jason-masker-of-upstream/embed/#?secret=UYgDNPvIRE" width="600" height="338" title="&#x201C;Are Vehicle Cyberattacks Already Here?&#x201D; &#x2014; Sonatus" data-secret="UYgDNPvIRE" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://www.sonatus.com/wp-content/uploads/2023/05/Sonatus-BlogCard.jpg</thumbnail_url><thumbnail_width>1200</thumbnail_width><thumbnail_height>800</thumbnail_height><description>We talk vehicle cybersecurity with Jason Masker, Director of Solutions Architecture for Upstream who joins host John Heinlein, Ph.D., Chief Marketing Officer of Sonatus. This discussion highlights the evolving (and challenging!) landscape of vehicle cyber threats.&#xA0;</description></oembed>
