{"type":"rich","description":"\u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6\u300cDeep Security\u300d\u306a\u3069\u30c8\u30ec\u30f3\u30c92\u88fd\u54c1\u306b\u8106\u5f31\u6027 - \u5b9f\u8a3c\u30b3\u30fc\u30c9\u304c\u516c\u958b\u6e08\u307f (Security NEXT, 2022/01/25) https://www.security-next.com/133574","width":"100%","author_url":"https://blog.hatena.ne.jp/tanigawa/","provider_url":"https://hatena.blog","author_name":"tanigawa","height":"190","url":"https://vul.hatenadiary.com/entry/2022/01/25/000000","blog_url":"https://vul.hatenadiary.com/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fvul.hatenadiary.com%2Fentry%2F2022%2F01%2F25%2F000000\" title=\"\u300cDeep Security\u300d\u306a\u3069\u30c8\u30ec\u30f3\u30c92\u88fd\u54c1\u306b\u8106\u5f31\u6027 - \u5b9f\u8a3c\u30b3\u30fc\u30c9\u304c\u516c\u958b\u6e08\u307f - TT \u8106\u5f31\u6027 Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["\u30d9\u30f3\u30c0\u30fc: Trendmicro / \u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed"],"image_url":null,"version":"1.0","blog_title":"TT \u8106\u5f31\u6027 Blog","title":"\u300cDeep Security\u300d\u306a\u3069\u30c8\u30ec\u30f3\u30c92\u88fd\u54c1\u306b\u8106\u5f31\u6027 - \u5b9f\u8a3c\u30b3\u30fc\u30c9\u304c\u516c\u958b\u6e08\u307f","provider_name":"Hatena Blog","published":"2022-01-25 00:00:00"}