{"version":"1.0","provider_name":"Visualize AI Vietnamese - Latest in AI &amp; Software Innovation","provider_url":"https:\/\/www.visualize-ai.com\/vi","author_name":"vpadmin","author_url":"https:\/\/www.visualize-ai.com\/vi\/author\/vpadmin\/","title":"H\u01b0\u1edbng d\u1eabn Ph\u00e2n t\u00edch B\u1ea3o m\u1eadt th\u00f4ng qua B\u1ea3n \u0111\u1ed3 Lu\u1ed3ng D\u1eef li\u1ec7u","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Os7lKIFH4G\"><a href=\"https:\/\/www.visualize-ai.com\/vi\/security-analysis-through-data-flow-mapping\/\">H\u01b0\u1edbng d\u1eabn DFD: Ph\u00e2n t\u00edch B\u1ea3o m\u1eadt th\u00f4ng qua B\u1ea3n \u0111\u1ed3 Lu\u1ed3ng D\u1eef li\u1ec7u<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.visualize-ai.com\/vi\/security-analysis-through-data-flow-mapping\/embed\/#?secret=Os7lKIFH4G\" width=\"600\" height=\"338\" title=\"&#8220;H\u01b0\u1edbng d\u1eabn DFD: Ph\u00e2n t\u00edch B\u1ea3o m\u1eadt th\u00f4ng qua B\u1ea3n \u0111\u1ed3 Lu\u1ed3ng D\u1eef li\u1ec7u&#8221; &#8212; Visualize AI Vietnamese - Latest in AI &amp; Software Innovation\" data-secret=\"Os7lKIFH4G\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.visualize-ai.com\/vi\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.visualize-ai.com\/vi\/wp-content\/uploads\/sites\/10\/2026\/03\/security-analysis-data-flow-mapping-infographic-child-style.jpg","thumbnail_width":1664,"thumbnail_height":928,"description":"H\u1ecdc c\u00e1ch b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng b\u1eb1ng s\u01a1 \u0111\u1ed3 lu\u1ed3ng d\u1eef li\u1ec7u. X\u00e1c \u0111\u1ecbnh m\u1ed1i \u0111e d\u1ecda, b\u1ea3n \u0111\u1ed3 di chuy\u1ec3n d\u1eef li\u1ec7u v\u00e0 c\u1ee7ng c\u1ed1 ki\u1ebfn tr\u00fac m\u00e0 kh\u00f4ng c\u1ea7n ph\u00f4 tr\u01b0\u01a1ng."}