<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cloudkul</provider_name><provider_url>https://cloudkul.com/blog</provider_url><author_name>Tanya Garg</author_name><author_url>https://cloudkul.com/blog/author/tanyagarg-bd037/</author_url><title>Difference among threat, vulnerability and risk - Cloudkul</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="TCAhg6ksWy"&gt;&lt;a href="https://cloudkul.com/blog/what-is-threat-vulnerability-risk/"&gt;Difference among threat, vulnerability and risk&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://cloudkul.com/blog/what-is-threat-vulnerability-risk/embed/#?secret=TCAhg6ksWy" width="600" height="338" title="&#x201C;Difference among threat, vulnerability and risk&#x201D; &#x2014; Cloudkul" data-secret="TCAhg6ksWy" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>A threat can be a danger that something unwanted can happen to them. Vulnerability can be define as the flaw in the seurity system. Risk can be defined as any activity that leads to any kind of loss.</description><thumbnail_url>https://cloudkul.com/blog/wp-content/uploads/2023/12/difference-among-threat-vulnerability-and-risk.png</thumbnail_url></oembed>
