{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/1ac16b5f71884014b23144645ad48985\" frameborder=\"0\" width=\"1600\" height=\"1200\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1200,"width":1600,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1200,"thumbnail_width":1600,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/1ac16b5f71884014b23144645ad48985-e86a8d89e6648d9c.gif","duration":274.462,"title":"Three Protection Options Against SQL Injection Attacks","description":"Three Protection Options Against SQL Injection Attacks"}