<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>AML-Systems Co.,Ltd.</provider_name><provider_url>https://www.aml-systems.co.th/th</provider_url><author_name>AML-Systems Co.,Ltd.</author_name><author_url>https://www.aml-systems.co.th/th/author/adminamlweb2/</author_url><title>Deep Instinct - AML-Systems Co.,Ltd.</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="QuEgitKFiM"&gt;&lt;a href="https://www.aml-systems.co.th/th/what-we-do/deepinstinct/"&gt;Deep Instinct&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.aml-systems.co.th/th/what-we-do/deepinstinct/embed/#?secret=QuEgitKFiM" width="600" height="338" title="&#x201C;Deep Instinct&#x201D; &#x2014; AML-Systems Co.,Ltd." data-secret="QuEgitKFiM" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.aml-systems.co.th/th/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Prevention Starts with Deep Instinct The cyber threat landscape is deep, varied, and constantlyevolving with new malicious tactics, delivery methods, and known as well as unknown malware. Most security platforms emphasize detection and remediation, focusing on assessing and responding once a breach has occurred and damage has been done. But this is a &#xFB02;awed and [&hellip;]</description><thumbnail_url>https://www.aml-systems.co.th/th/wp-content/uploads/2022/08/DI.jpg</thumbnail_url></oembed>
