
{"id":1228,"date":"2021-04-07T12:49:26","date_gmt":"2021-04-07T10:49:26","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=1228"},"modified":"2021-04-07T12:49:37","modified_gmt":"2021-04-07T10:49:37","slug":"les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/","title":{"rendered":"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/d1fmx1rbmqrxrr.cloudfront.net\/zdnet\/i\/edit\/ne\/2019\/12\/ransomware-620.jpg\" alt=\"Ransomware : les victimes payent de plus en plus la ran\u00e7on - ZDNet\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Jusqu&rsquo;\u00e0 pr\u00e9sent, les ransomwares consistaient \u00e0 chiffrer des donn\u00e9es et \u00e0 exiger de l&rsquo;argent pour les lib\u00e9rer. Mais un nouveau rapport de F-Secure montre que 2020 a vu une augmentation des ransomwares qui volent \u00e9galement des donn\u00e9es, ce qui donne aux attaquants plus de poids sur leurs victimes<\/strong><\/p>\n\n\n\n<p>Si les organisations refusent d&rsquo;abord de payer une ran\u00e7on pour d\u00e9crypter leurs donn\u00e9es, les attaquants menacent de faire divulguer les informations vol\u00e9es, augmentant ainsi la pression sur les victimes.<\/p>\n\n\n\n<p>Un seul groupe de ransomware a \u00e9t\u00e9 observ\u00e9 utilisant ce type d&rsquo;extorsion &#8212; surnomm\u00e9 Ransomware 2.0 &#8212; en 2019, mais \u00e0 la fin de 2020, 15 familles de ransomware diff\u00e9rentes avaient adopt\u00e9 cette approche. En outre, pr\u00e8s de 40&nbsp;% des familles de ransomware d\u00e9couvertes en 2020, ainsi que plusieurs familles plus anciennes, \u00e9taient connues pour voler \u00e9galement les donn\u00e9es des victimes \u00e0 la fin de l&rsquo;ann\u00e9e derni\u00e8re.<\/p>\n\n\n\n<p><em>\u00ab\u00a0Les organisations disposant de sauvegardes fiables et de proc\u00e9dures de restauration efficaces sont en position de force pour se remettre d&rsquo;une attaque par ransomware sans avoir \u00e0 payer. Cependant, la gestion d&rsquo;une fuite potentielle de donn\u00e9es est un d\u00e9fi radicalement diff\u00e9rent, en particulier pour les organisations qui poss\u00e8dent des informations confidentielles\u00a0\u00bb<\/em>, explique Calvin Gan, responsable de l&rsquo;unit\u00e9 de d\u00e9fense tactique de F-Secure.&nbsp;<em>\u00ab\u00a0Les auteurs de ransomware, actuels et futurs, se sentiront probablement enhardis \u00e0 essayer de nouvelles choses et \u00e0 sauter sur les vuln\u00e9rabilit\u00e9s plus rapidement, ce que nous voyons d\u00e9j\u00e0 avec les r\u00e9centes vuln\u00e9rabilit\u00e9s de MS Exchange.\u00a0\u00bb<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.developpez.net\/forums\/attachments\/p594963d1\/a\/a\/a\" alt=\"\"\/><\/figure>\n\n\n\n<p>Le rapport montre \u00e9galement d&rsquo;autres tendances en mati\u00e8re de cybers\u00e9curit\u00e9, notamment l&rsquo;utilisation par les attaquants des formules Excel \u2013 une fonction par d\u00e9faut qui ne peut \u00eatre bloqu\u00e9e \u2013 pour brouiller les pistes d&rsquo;un code malveillant, qui triplera au cours du second semestre de 2020.<\/p>\n\n\n\n<p>Outlook est la marque la plus populaire usurp\u00e9e dans les e-mails de phishing, suivie de Facebook et d&rsquo;Office365. Les courriels ont repr\u00e9sent\u00e9 plus de la moiti\u00e9 de toutes les tentatives d&rsquo;infection par des logiciels malveillants en 2020, ce qui en fait la m\u00e9thode la plus courante de diffusion des logiciels malveillants dans les cyberattaques.<\/p>\n\n\n\n<p>En examinant les attaques notables de la cha\u00eene d&rsquo;approvisionnement au cours des dix derni\u00e8res ann\u00e9es, le rapport souligne que plus de la moiti\u00e9 d&rsquo;entre elles visaient soit des logiciels utilitaires, soit des logiciels d&rsquo;application. Les auteurs esp\u00e8rent que le piratage de SolarWinds l&rsquo;ann\u00e9e derni\u00e8re attirera davantage l&rsquo;attention sur l&rsquo;impact que peuvent avoir ces attaques.<\/p>\n\n\n\n<p><em>\u00ab\u00a0En mati\u00e8re de s\u00e9curit\u00e9, nous insistons beaucoup sur le fait que les organisations se prot\u00e8gent elles-m\u00eames en disposant de solides p\u00e9rim\u00e8tres de s\u00e9curit\u00e9, de m\u00e9canismes de d\u00e9tection pour identifier rapidement les br\u00e8ches, ainsi que de plans et de capacit\u00e9s de r\u00e9ponse pour contenir les intrusions. Cependant, les entit\u00e9s de tous les secteurs et de toutes les fronti\u00e8res doivent \u00e9galement collaborer pour relever les d\u00e9fis de la s\u00e9curit\u00e9 en amont de la cha\u00eene d&rsquo;approvisionnement. Les groupes de menaces persistantes avanc\u00e9es sont manifestement pr\u00eats et dispos\u00e9s \u00e0 compromettre des centaines d&rsquo;organisations par cette approche, et nous devons travailler ensemble pour les contrer\u00a0\u00bb<\/em>, ajoute M. Gan.<\/p>\n\n\n\n<p>Source&nbsp;:&nbsp;<a href=\"https:\/\/blog.f-secure.com\/attack-landscape-update-h1-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">F-Secure<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jusqu&rsquo;\u00e0 pr\u00e9sent, les ransomwares consistaient \u00e0 chiffrer des donn\u00e9es et \u00e0 exiger de l&rsquo;argent pour les lib\u00e9rer. Mais un nouveau rapport de F-Secure montre que 2020 a vu une augmentation [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[],"class_list":["post-1228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Jusqu&rsquo;\u00e0 pr\u00e9sent, les ransomwares consistaient \u00e0 chiffrer des donn\u00e9es et \u00e0 exiger de l&rsquo;argent pour les lib\u00e9rer. Mais un nouveau rapport de F-Secure montre que 2020 a vu une augmentation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-07T10:49:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-07T10:49:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations\",\"datePublished\":\"2021-04-07T10:49:26+00:00\",\"dateModified\":\"2021-04-07T10:49:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/\"},\"wordCount\":583,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-9.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/\",\"name\":\"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-9.jpg\",\"datePublished\":\"2021-04-07T10:49:26+00:00\",\"dateModified\":\"2021-04-07T10:49:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-9.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/at-9.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/04\\\/07\\\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/","og_locale":"fr_FR","og_type":"article","og_title":"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations - Parlons Techs - Store","og_description":"Jusqu&rsquo;\u00e0 pr\u00e9sent, les ransomwares consistaient \u00e0 chiffrer des donn\u00e9es et \u00e0 exiger de l&rsquo;argent pour les lib\u00e9rer. Mais un nouveau rapport de F-Secure montre que 2020 a vu une augmentation [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-04-07T10:49:26+00:00","article_modified_time":"2021-04-07T10:49:37+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-9.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations","datePublished":"2021-04-07T10:49:26+00:00","dateModified":"2021-04-07T10:49:37+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/"},"wordCount":583,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-9.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/","url":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/","name":"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-9.jpg","datePublished":"2021-04-07T10:49:26+00:00","dateModified":"2021-04-07T10:49:37+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-9.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/04\/at-9.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/04\/07\/les-cybercriminels-se-tournent-vers-les-ransomwares-2-0-qui-consistent-a-voler-les-donnees-et-a-menacer-de-divulguer-les-informations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Les cybercriminels se tournent vers les ransomwares 2.0, qui consistent \u00e0 voler les donn\u00e9es et \u00e0 menacer de divulguer les informations"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=1228"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1228\/revisions"}],"predecessor-version":[{"id":1230,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1228\/revisions\/1230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/1229"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=1228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=1228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=1228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}