{"version":"1.0","provider_name":"Salesforce","provider_url":"https:\/\/www.salesforce.com\/in\/news","author_name":"Salesforce","author_url":"https:\/\/www.salesforce.com\/in\/news","title":"Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World's Top Hackers","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"X8fWussWwx\"><a href=\"https:\/\/www.salesforce.com\/in\/news\/stories\/salesforce-bug-bounty-event\/\">Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#8217;s Top Hackers<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.salesforce.com\/in\/news\/stories\/salesforce-bug-bounty-event\/embed\/#?secret=X8fWussWwx\" width=\"600\" height=\"338\" title=\"&#8220;Virtual Meets Reality: Why Salesforce Joined Forces with 100 of the World&#8217;s Top Hackers&#8221; &#8212; Salesforce\" data-secret=\"X8fWussWwx\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/wp-bn.salesforce.com\/in\/news\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.salesforce.com\/in\/news\/wp-content\/uploads\/sites\/20\/2023\/12\/HackingEvent.jpg","thumbnail_width":1200,"thumbnail_height":675,"description":"With online aliases like @82af5ddffbb795 and the ability to work anywhere there\u2019s a WiFi connection, hackers can operate in total secrecy.&nbsp; However, part of how Salesforce builds trusted relationships with its network of ethical hackers involves getting to know who is on the other side of the keyboard. That\u2019s one reason why last month, the [&hellip;]"}