{"id":11811,"date":"2024-09-14T13:01:24","date_gmt":"2024-09-14T07:31:24","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?post_type=web-story&#038;p=11811"},"modified":"2024-09-14T13:01:30","modified_gmt":"2024-09-14T07:31:30","slug":"apple-vision-pro-input-attack-a-new-security-threat","status":"publish","type":"web-story","link":"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/apple-vision-pro-input-attack-a-new-security-threat\/","title":{"rendered":"Apple Vision Pro Input Attack: A New Security Threat"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Ubuntu%3Awght%40700\" rel=\"stylesheet\"\/><link href=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n                \/*\n                  AMP CTA Layer will exactly occupy 74px regardless of any device.\n                  To space out captions 74px from the BOTTOM (AMP CTA Layer),\n                  74px from the TOP should also be spaced out and thus: 2 * 74px\n                  will be the desired max-height.\n                *\/\n                max-height: calc(100vh - (2 * 74px));\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-audio-sticker {\n                height: 100%;\n              }<\/p>\n<p>              .audio-sticker {\n                font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>Apple Vision Pro Input Attack: A New Security Threat<\/title><link rel=\"canonical\" href=\"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/apple-vision-pro-input-attack-a-new-security-threat\/\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"Recon Cyber security\" publisher-logo-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Recon-Cyber-Security.jpeg\" title=\"Apple Vision Pro Input Attack: A New Security Threat\" poster-portrait-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/cropped-Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled-1.jpg\"><amp-story-page id=\"af4a3384-1b58-4a6a-b8aa-1dd667609592\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#4e2a8c\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-99634c76-a882-4b8b-95f5-b15ae3f698c5\">\n<div style=\"position:absolute;width:266.6146%;height:100%;left:-83.3073%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 120vh, 267vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:-7.76699%;top:-13.1068%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-08bf8b94-3d2a-4f3a-a71c-e2ca30dd993e\">\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:-0.48544%;top:-7.11974%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-c59bf509-e236-4a75-bd91-ed751d558ba5\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg\" data-tooltip-text=\"Apple Vision Pro Input Attack: A New Security Threat\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:4.85437%;top:83.17152%;width:90.04854%;height:21.68285%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5390835579514826% 0.5390835579514826% 0.5390835579514826% 0.5390835579514826% \/ 1.4925373134328357% 1.4925373134328357% 1.4925373134328357% 1.4925373134328357%;background-clip:content-box;background-color:#000\" id=\"el-ef0ff828-c37b-4916-be85-847a0d9d44eb\">\n<h1 id=\"apple-vision-pro-input-attack-a-new-security-threat\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.33477088948786987% 0;font-family:&quot;Ubuntu&quot;,sans-serif;font-size:0.582524em;line-height:1.19;text-align:left;padding:1.078167115902965% 2.15633423180593%;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Apple Vision Pro Input Attack: A New Security Threat<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"423c045c-6e34-44b6-a3eb-6cad5ffb45ff\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#4e2a8c\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-f12510c3-c5e5-4969-90d0-5df8a1a39f7d\">\n<div style=\"position:absolute;width:266.6146%;height:100%;left:-83.3073%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 120vh, 267vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:-7.76699%;top:-13.1068%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-f2be7bb6-a22c-4468-88b5-c2debfef3b0a\">\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:-0.48544%;top:-8.25243%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-fdc2d103-0c08-4e28-9ef2-79e1d178d7ea\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg\" data-tooltip-text=\"Apple Vision Pro Input Attack: A New Security Threat\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:4.85437%;top:80.2589%;width:90.04854%;height:28.47896%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5390835579514826% 0.5390835579514826% 0.5390835579514826% 0.5390835579514826% \/ 1.1363636363636365% 1.1363636363636365% 1.1363636363636365% 1.1363636363636365%;background-clip:content-box;background-color:#000\" id=\"el-e95b2d53-555b-495a-8cbf-842a2f99b2a2\">\n<h1 id=\"apple-vision-pro-input-attack-gazeploit-threat-user-data-risks\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.33477088948786987% 0;font-family:&quot;Ubuntu&quot;,sans-serif;font-size:0.582524em;line-height:1.19;text-align:left;padding:1.078167115902965% 2.15633423180593%;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Apple Vision Pro Input Attack: GAZEploit Threat &amp; User Data Risks<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"d1c5c9bc-5ab7-4b9b-9717-495d25ccacec\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#4e2a8c\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-1e651964-da5f-4c92-8284-405051bec788\">\n<div style=\"position:absolute;width:266.6146%;height:100%;left:-83.3073%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 120vh, 267vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:-7.76699%;top:-13.1068%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-15252554-7b55-485f-90b5-361c6a68036f\">\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:0;top:-8.25243%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-759ae49b-0a9b-449f-bc1a-826e8264e067\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg\" data-tooltip-text=\"Apple Vision Pro Input Attack: A New Security Threat\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:4.85437%;top:83.17152%;width:90.04854%;height:21.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5390835579514826% 0.5390835579514826% 0.5390835579514826% 0.5390835579514826% \/ 1.4814814814814816% 1.4814814814814816% 1.4814814814814816% 1.4814814814814816%;background-clip:content-box;background-color:#000\" id=\"el-0a7ca8db-0f51-4898-ac1a-cdad41d25bd5\">\n<h1 id=\"understanding-the-apple-vision-pro-input-attack\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.33477088948786987% 0;font-family:&quot;Ubuntu&quot;,sans-serif;font-size:0.582524em;line-height:1.19;text-align:left;padding:1.078167115902965% 2.15633423180593%;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Understanding the Apple Vision Pro Input Attack<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"bb182668-f456-4928-a7c4-09fa954595f9\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#4e2a8c\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-752eddad-5a0a-435e-a32b-06a6f278f34f\">\n<div style=\"position:absolute;width:266.6146%;height:100%;left:-83.3073%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 120vh, 267vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:-7.76699%;top:-13.1068%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-224d4648-4cf7-4924-8766-dc51fda94a44\">\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:0;top:-8.25243%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-de566548-cbe3-4bb3-bea4-c7d2d89507f4\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg\" data-tooltip-text=\"Apple Vision Pro Input Attack: A New Security Threat\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:2.91262%;top:78.31715%;width:97.3301%;height:28.47896%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.4987531172069825% 0.4987531172069825% 0.4987531172069825% 0.4987531172069825% \/ 1.1363636363636365% 1.1363636363636365% 1.1363636363636365% 1.1363636363636365%;background-clip:content-box;background-color:#000\" id=\"el-899cbfc2-6738-4a72-acdf-c366da4be88c\">\n<h1 id=\"introduction-to-gazeploit-a-new-security-threat-in-virtual-reality\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.3097256857855355% 0;font-family:&quot;Ubuntu&quot;,sans-serif;font-size:0.582524em;line-height:1.19;text-align:left;padding:0.997506234413965% 1.99501246882793%;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">Introduction to GAZEploit: A New Security Threat in Virtual Reality<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"e06c76c1-ca1d-4a04-8041-631b6b08b526\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#4e2a8c\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-9510624e-ffbd-495b-b767-30e8e5957787\">\n<div style=\"position:absolute;width:266.6146%;height:100%;left:-83.3073%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 120vh, 267vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:-7.76699%;top:-13.1068%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-35d3a4ee-036f-4d98-96af-2ee349393ff7\">\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:-0.48544%;top:-8.25243%;width:131.06796%;height:121.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-0a7f0e1b-1e7b-4172-9c8d-24f112e1a1ad\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg\" data-tooltip-text=\"Apple Vision Pro Input Attack: A New Security Threat\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<div style=\"position:absolute;width:209.12582%;height:100%;left:-54.56291%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg\" alt=\"Apple Vision Pro Input Attack A New Security Threat\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg 2560w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg 2048w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg 1536w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg 150w\" sizes=\"(min-width: 1024px) 59vh, 131vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<p><\/a><\/div>\n<\/div>\n<div style=\"position:absolute;pointer-events:none;left:4.85437%;top:83.17152%;width:90.04854%;height:21.84466%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.5390835579514826% 0.5390835579514826% 0.5390835579514826% 0.5390835579514826% \/ 1.4814814814814816% 1.4814814814814816% 1.4814814814814816% 1.4814814814814816%;background-clip:content-box;background-color:#000\" id=\"el-03f19837-a2fc-44bd-b770-3d5b2ecfc21b\">\n<h1 id=\"how-hackers-exploit-virtual-keyboard-inputs\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.33477088948786987% 0;font-family:&quot;Ubuntu&quot;,sans-serif;font-size:0.582524em;line-height:1.19;text-align:left;padding:1.078167115902965% 2.15633423180593%;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">How Hackers Exploit Virtual Keyboard Inputs<\/span><\/span><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"Learn about the Apple Vision Pro Input Attack and how hackers exploit virtual keyboard inputs. Explore cybersecurity courses in Delhi to protect your data from the GAZEploit threat and other evolving \n","protected":false},"author":1,"featured_media":11812,"template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"web_stories_publisher_logo":11731,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-11811","web-story","type-web-story","status-publish","has-post-thumbnail"],"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"type":"image","x":48,"y":0,"width":330,"height":220,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"99634c76-a882-4b8b-95f5-b15ae3f698c5","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"type":"image","x":-32,"y":-81,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"08bf8b94-3d2a-4f3a-a71c-e2ca30dd993e"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-2,"y":-44,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"c59bf509-e236-4a75-bd91-ed751d558ba5","type":"image","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","desc":"Apple Vision Pro Input Attack: A New Security Threat"}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"FILL","font":{"family":"Ubuntu"},"fontSize":36,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #fff\">Apple Vision Pro Input Attack: A New Security Threat<\/span>","x":20,"y":514,"width":371,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":134,"id":"ef0ff828-c37b-4916-be85-847a0d9d44eb"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"af4a3384-1b58-4a6a-b8aa-1dd667609592","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b2242025-7cd9-4e15-8e8d-2a4da541a549"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":48,"y":0,"width":330,"height":220,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"f12510c3-c5e5-4969-90d0-5df8a1a39f7d","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-32,"y":-81,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"f2be7bb6-a22c-4468-88b5-c2debfef3b0a","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-2,"y":-51,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"fdc2d103-0c08-4e28-9ef2-79e1d178d7ea","type":"image","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","desc":"Apple Vision Pro Input Attack: A New Security Threat"}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"FILL","font":{"family":"Ubuntu"},"fontSize":36,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #fff\">Apple Vision Pro Input Attack: GAZEploit Threat &amp; User Data Risks<\/span>","x":20,"y":496,"width":371,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"height":176,"id":"e95b2d53-555b-495a-8cbf-842a2f99b2a2","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"423c045c-6e34-44b6-a3eb-6cad5ffb45ff","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b2242025-7cd9-4e15-8e8d-2a4da541a549"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":48,"y":0,"width":330,"height":220,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"1e651964-da5f-4c92-8284-405051bec788","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-32,"y":-81,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"15252554-7b55-485f-90b5-361c6a68036f","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":0,"y":-51,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"759ae49b-0a9b-449f-bc1a-826e8264e067","type":"image","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","desc":"Apple Vision Pro Input Attack: A New Security Threat"}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"FILL","font":{"family":"Ubuntu"},"fontSize":36,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #fff\">Understanding the Apple Vision Pro Input Attack<\/span>","x":20,"y":514,"width":371,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"height":135,"id":"0a7ca8db-0f51-4898-ac1a-cdad41d25bd5","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"d1c5c9bc-5ab7-4b9b-9717-495d25ccacec","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b2242025-7cd9-4e15-8e8d-2a4da541a549"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":48,"y":0,"width":330,"height":220,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"752eddad-5a0a-435e-a32b-06a6f278f34f","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-32,"y":-81,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"224d4648-4cf7-4924-8766-dc51fda94a44","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":0,"y":-51,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"de566548-cbe3-4bb3-bea4-c7d2d89507f4","type":"image","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","desc":"Apple Vision Pro Input Attack: A New Security Threat"}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"FILL","font":{"family":"Ubuntu"},"fontSize":36,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #fff\">Introduction to GAZEploit: A New Security Threat in Virtual Reality<\/span>","x":12,"y":484,"width":401,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"height":176,"id":"899cbfc2-6738-4a72-acdf-c366da4be88c","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"bb182668-f456-4928-a7c4-09fa954595f9","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b2242025-7cd9-4e15-8e8d-2a4da541a549"}},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":48,"y":0,"width":330,"height":220,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"9510624e-ffbd-495b-b767-30e8e5957787","isBackground":true,"isHidden":false,"type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-32,"y":-81,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"35d3a4ee-036f-4d98-96af-2ee349393ff7","type":"image"},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":2560,"height":1707,"sizes":{"medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg","width":300,"height":200,"filesize":18814,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x200.jpg"},"large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","width":1024,"height":683,"filesize":80339,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg"},"thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg","width":150,"height":150,"filesize":13686,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x150.jpg"},"medium_large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg","width":768,"height":512,"filesize":54980,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-768x512.jpg"},"1536x1536":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg","width":1536,"height":1024,"filesize":136568,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1536x1024.jpg"},"2048x2048":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg","width":2048,"height":1365,"filesize":202790,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-2048x1365.jpg"},"cnvs-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"cnvs-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"pk-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"pk-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg","width":300,"height":225,"filesize":20327,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x225.jpg"},"csco-small":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg","width":80,"height":80,"filesize":9799,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-80x80.jpg"},"csco-intermediate":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg","width":200,"height":140,"filesize":13899,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-200x140.jpg"},"csco-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg","width":380,"height":220,"filesize":22738,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg","width":300,"height":180,"filesize":18277,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg","width":380,"height":253,"filesize":23720,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-380x253.jpg"},"csco-medium":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg","width":800,"height":500,"filesize":55533,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x500.jpg"},"csco-medium-alternative":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg","width":560,"height":336,"filesize":34882,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-560x336.jpg"},"csco-medium-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg","width":800,"height":533,"filesize":57478,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-800x533.jpg"},"csco-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg","width":1160,"height":680,"filesize":88592,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x680.jpg"},"csco-large-uncropped":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg","width":1160,"height":773,"filesize":93846,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1160x773.jpg"},"csco-extra-large":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg","width":1920,"height":1024,"filesize":169889,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg","width":640,"height":853,"filesize":77825,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-640x853.jpg"},"web-stories-publisher-logo":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg","width":96,"height":96,"filesize":10524,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-96x96.jpg"},"web-stories-thumbnail":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg","width":150,"height":100,"filesize":11450,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-150x100.jpg"},"full":{"file":"Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","width":2560,"height":1707,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#4e2a8c","blurHash":"USG7pj3c{?IWVUwQRiad9D#7KZtlW8Nengs,","creationDate":"2024-09-14T07:07:01","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled.jpg","id":11809,"alt":"Apple Vision Pro Input Attack A New Security Threat","local":false,"provider":"local"},"x":-2,"y":-51,"width":540,"height":753,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"0a7f0e1b-1e7b-4172-9c8d-24f112e1a1ad","type":"image","link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/apple-vision-pro-input-attack-a-new\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-1024x683.jpg","desc":"Apple Vision Pro Input Attack: A New Security Threat"}},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"FILL","font":{"family":"Ubuntu"},"fontSize":36,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #fff\">How Hackers Exploit Virtual Keyboard Inputs<\/span>","x":20,"y":514,"width":371,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"height":135,"id":"03f19837-a2fc-44bd-b770-3d5b2ecfc21b","type":"text"}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"animations":[],"id":"e06c76c1-ca1d-4a04-8041-631b6b08b526","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"b2242025-7cd9-4e15-8e8d-2a4da541a549"}}],"fonts":{"Ubuntu":{"family":"Ubuntu","fallbacks":["sans-serif"],"weights":[300,400,500,700],"styles":["italic","regular"],"variants":[[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700]],"service":"fonts.google.com","metrics":{"upm":1000,"asc":932,"des":-189,"tAsc":776,"tDes":-185,"tLGap":56,"wAsc":932,"wDes":189,"xH":520,"capH":693,"yMin":-189,"yMax":962,"hAsc":932,"hDes":-189,"lGap":28}}},"autoAdvance":true,"defaultPageDuration":10,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":11812,"url":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/09\/cropped-Apple-Vision-Pro-Input-Attack-A-New-Security-Threat-2-scaled-1.jpg","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/users\/1"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11811\/revisions"}],"predecessor-version":[{"id":11815,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11811\/revisions\/11815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11812"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media?parent=11811"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_category?post=11811"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_tag?post=11811"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11811\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}