<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyberagentur</provider_name><provider_url>https://www.cyberagentur.de/en/</provider_url><author_name>ML</author_name><author_url>https://www.cyberagentur.de/en/author/ml/</author_url><title>Software Security Score (3S) - Cyberagentur</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="UC8PArSXdN"&gt;&lt;a href="https://www.cyberagentur.de/en/programs/3s/"&gt;Software Security Score (3S)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberagentur.de/en/programs/3s/embed/#?secret=UC8PArSXdN" width="600" height="338" title="&#x201C;Software Security Score (3S)&#x201D; &#x2014; Cyberagentur" data-secret="UC8PArSXdN" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberagentur.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberagentur.de/wp-content/uploads/2026/01/3S-Image_freepik-1024x796.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>796</thumbnail_height><description>Background Consumers are constantly dealing directly or indirectly with software in their everyday lives, from banking apps to smart robot vacuum cleaners. The operational and IT security of the applications is often difficult for them to grasp. Has the software been carefully developed or are vulnerabilities likely? What needs to be considered for secure use [&hellip;]</description></oembed>
