{"type":"video","version":"1.0","title":"Common Obfuscation methods used by Malware","author_name":"Knowledge Sharing Village","author_url":"https://odysee.com/@KnowledgeSharingVillage:8","provider_name":"Odysee","provider_url":"https://odysee.com","thumbnail_url":"https://thumbnails.odycdn.com/card/s:1280:720/quality:85/plain/https://thumbs.odycdn.com/5a5b033fbf7cb5940522ad3cc5cb14ac.webp","thumbnail_width":"390","thumbnail_height":"220","html":"<iframe id=\"odysee-iframe\" style=\"width:100%; aspect-ratio:16 / 9;\" src=\"https://odysee.com/%24/embed/%40KnowledgeSharingVillage%3A8%2FCommon-Obfuscation-methods-used-by-Malware%3Ac?autoplay=true\" allowfullscreen></iframe>","width":560,"height":315}