{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/c58fab50ffa1444d909c57673c8ba723\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/c58fab50ffa1444d909c57673c8ba723-f9c5116a9876b0f5.gif","duration":281.313,"title":"TechEase Solutions Cyber Threat Analysis","description":"Cybersecurity Threat Analysis - TechEase Solutions"}