<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Antivirus and Security Software FAQs &amp; Blog</provider_name><provider_url>https://www.antivirusaz.com/faq</provider_url><title>What is the RIG exploit kit?</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BZDFZUBvly"&gt;&lt;a href="https://www.antivirusaz.com/faq/art/what-is-the-rig-exploit-kit/"&gt;What is the RIG exploit kit?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.antivirusaz.com/faq/art/what-is-the-rig-exploit-kit/embed/#?secret=BZDFZUBvly" width="600" height="338" title="&#x201C;What is the RIG exploit kit?&#x201D; &#x2014; Antivirus and Security Software FAQs &amp; Blog" data-secret="BZDFZUBvly" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.antivirusaz.com/faq/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>The RIG exploit kit is a type of malicious software toolkit used by cybercriminals to deliver malware to victims through web browsers. It works by exploiting known vulnerabilities in outdated browser plugins like Flash, Java, or Silverlight. When a user visits a compromised or malicious website, the kit scans for these weaknesses and, if found, [&hellip;]</description><thumbnail_url>https://www.antivirusaz.com/faq/wp-content/uploads/2023/02/antivirusaz-faq-blog-logo.png</thumbnail_url><thumbnail_width>1536</thumbnail_width><thumbnail_height>512</thumbnail_height></oembed>
