<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/c5df6c5e7c574ae7b9fa0d32d1d961cf&quot; frameborder=&quot;0&quot; width=&quot;1250&quot; height=&quot;937&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>937</height><width>1250</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>937</thumbnail_height><thumbnail_width>1250</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/c5df6c5e7c574ae7b9fa0d32d1d961cf-00001.gif</thumbnail_url><duration>233.366669</duration><title>RavenMail Decodes: Exfiltration using Graph Runner</title><description>This video showcases how attackers use blackmarket off-the-shelf tools to exploit Graph API and exfiltrating sensitive information from emails.</description></oembed>