{"title":"\u65e5\u672c\u8336\u306e\u901a\u8ca9\u30b5\u30a4\u30c8\u306b\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9 - \u500b\u4eba\u60c5\u5831\u6d41\u51fa\u306e\u53ef\u80fd\u6027","version":"1.0","published":"2025-03-26 00:00:00","author_name":"tanigawa","provider_url":"https://hatena.blog","blog_title":"TT Incidents Log","blog_url":"https://incidents.hatenablog.com/","height":"190","width":"100%","author_url":"https://blog.hatena.ne.jp/tanigawa/","url":"https://incidents.hatenablog.com/entry/2025/03/26/000000_7","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fincidents.hatenablog.com%2Fentry%2F2025%2F03%2F26%2F000000_7\" title=\"\u65e5\u672c\u8336\u306e\u901a\u8ca9\u30b5\u30a4\u30c8\u306b\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9 - \u500b\u4eba\u60c5\u5831\u6d41\u51fa\u306e\u53ef\u80fd\u6027 - TT Incidents Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","description":"\u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6\u65e5\u672c\u8336\u306e\u901a\u8ca9\u30b5\u30a4\u30c8\u306b\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9 - \u500b\u4eba\u60c5\u5831\u6d41\u51fa\u306e\u53ef\u80fd\u6027 (Security NEXT, 2025/03/26) https://www.security-next.com/168584","provider_name":"Hatena Blog","image_url":null,"categories":["\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u88ab\u5bb3: \u304a\u8336\u306e\u8352\u7551\u5712\u516c\u5f0f\u30b5\u30a4\u30c8","**\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9 / \u30b5\u30a4\u30d0\u30fc\u653b\u6483 / Cyber Attack"],"type":"rich"}