{"type":"rich","version":1,"provider_name":"\u30c9\u30af\u30bb\u30eb","provider_url":"https:\/\/www.docswell.com\/","title":"\u653b\u6483\u8005\u306f\u30af\u30e9\u30a6\u30c9\u3092 \u3069\u3046\u4f7f\u3046\u306e\u304b \u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u4e8b\u4f8b_\u516c\u958b\u7248 [Nasotasy]","url":"https:\/\/www.docswell.com\/slide\/5272Y9\/embed?key=how_do_attackers_use_the_cloud","author_name":"Nasotasy","author_url":"https:\/\/www.docswell.com\/user\/7307437316","html":"<iframe src=\"https:\/\/www.docswell.com\/slide\/5272Y9\/embed?key=how_do_attackers_use_the_cloud\" allowfullscreen=\"true\" class=\"docswell-iframe\" width=\"620\" height=\"349\" style=\"border: 1px solid #ccc; display: block; margin: 0px auto; padding: 0px; aspect-ratio: 620\/349;\"><\/iframe>","width":620,"height":349}