{"type":"video","version":"1.0","title":"Understanding Cyber Attack Models | Cyber Kill Chain | Attack Life Cycle | MITRE ATT&CK Framework |","author_name":"CyberwarriorsAP","author_url":"https://odysee.com/@cyberwarriorsap:3","provider_name":"Odysee","provider_url":"https://odysee.com","thumbnail_url":"https://thumbnails.odycdn.com/card/s:1280:720/quality:85/plain/https://thumbnails.lbry.com/XKGJPXxeAg8","thumbnail_width":"390","thumbnail_height":"220","html":"<iframe id=\"odysee-iframe\" style=\"width:100%; aspect-ratio:16 / 9;\" src=\"https://odysee.com/%24/embed/%40cyberwarriorsap%3A3%2Funderstanding-cyber-attack-models-cyber%3A2?autoplay=true\" allowfullscreen></iframe>","width":560,"height":315}