<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>phone english blog</provider_name><provider_url>https://phoneenglish.es/blog</provider_url><author_name>lauren</author_name><author_url>https://phoneenglish.es/blog/author/lauren/</author_url><title>Cyberattack on Major Barcelona Hospital | phone english blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="KVpMHScvDH"&gt;&lt;a href="https://phoneenglish.es/blog/2024/02/cyberattack-on-major-barcelona-hospital/"&gt;Cyberattack on Major Barcelona Hospital&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://phoneenglish.es/blog/2024/02/cyberattack-on-major-barcelona-hospital/embed/#?secret=KVpMHScvDH" width="600" height="338" title="&#x201C;Cyberattack on Major Barcelona Hospital&#x201D; &#x2014; phone english blog" data-secret="KVpMHScvDH" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>B2 &#x2013; Upper Intermediate Cyberattacks have become a prevalent threat in today&#x2019;s digital age. These malicious acts target individuals, organizations, and even governments, causing significant damage and disruption. From data breaches to ransomware attacks, cyber criminals are constantly evolving their tactics to exploit vulnerabilities in technology systems. One of the most concerning aspects of cyber [&hellip;]</description></oembed>
