{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/Rj0B1USY6xOYwHTqxIDE/tsaRL5XEftBrL0bHD2D1/Ose435_Bs.js"],
  "sourcesContent": ["// Generated by Framer (9e04080)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"r76ijh\",mediaQuery:\"(min-width: 1440px)\"},{hash:\"zjmrlg\",mediaQuery:\"(min-width: 810px) and (max-width: 1439px)\"},{hash:\"1nuz6rp\",mediaQuery:\"(max-width: 809px)\"}],description:\"Explore our Threat Hunting blog, find the latest threat intelligence research, articles on detecting C2 servers, exposed open directories, threat actors, and more.\",elements:{V5m0Y0XrJ:\"trigger\"},framerSearch:{index:false},robots:\"noindex\",serializationId:\"framer-fw7fq\",title:\"Threat Hunting Blog: Latest Threat Intelligence Research\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,SAAS,WAAW,qBAAqB,EAAE,CAAC,KAAK,SAAS,WAAW,4CAA4C,EAAE,CAAC,KAAK,UAAU,WAAW,oBAAoB,CAAC,EAAE,YAAY,sKAAsK,SAAS,CAAC,UAAU,SAAS,EAAE,aAAa,CAAC,MAAM,EAAK,EAAE,OAAO,UAAU,gBAAgB,eAAe,MAAM,2DAA2D,SAAS,oBAAoB,CAAE,CAAQ,IAAMC,EAAgB,EACloBC,EAAqB,CAAC,QAAU,CAAC,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["metadata", "params", "activeLocale", "metadataVersion", "__FramerMetadata__"]
}
