{"version":"1.0","type":"photo","provider_name":"Resim Y\u00fckle - H\u0131zl\u0131 Resim Upload","provider_url":"https:\/\/www.imagevisit.com","title":"Types of Cyberattacks Spictera","url":"https:\/\/www.imagevisit.com\/images\/2024\/07\/17\/Types-of-Cyberattacks---Spictera.md.jpg","web_page":"https:\/\/www.imagevisit.com\/image\/Tgo3OT","width":"800","height":"2000","author_name":"spicteraltd","author_url":"https:\/\/www.imagevisit.com\/spicteraltd","thumbnail_url":"https:\/\/www.imagevisit.com\/images\/2024\/07\/17\/Types-of-Cyberattacks---Spictera.md.jpg","thumbnail_width":"500","thumbnail_height":1250}