
{"id":6837,"date":"2024-09-30T11:43:11","date_gmt":"2024-09-30T09:43:11","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=6837"},"modified":"2024-09-30T11:43:11","modified_gmt":"2024-09-30T09:43:11","slug":"une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/","title":{"rendered":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis."},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/AA1r77Oj.img?w=750&amp;h=493&amp;m=6\" alt=\"Un pirate informatique. Photo d\u2019illustration.\" \/><\/p>\n<h2>Un groupe de pirates se faisant appeler Marko Polo a lanc\u00e9 depuis au moins six mois une campagne de vol de donn\u00e9es ciblant les utilisateurs d\u2019ordinateurs sous Windows et macOS. Ils seraient d\u00e9j\u00e0 parvenus \u00e0 compromettre des milliers d\u2019appareils et soutirer plusieurs millions de dollars \u00e0 leurs victimes.<\/h2>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Une campagne de vol de donn\u00e9es op\u00e9r\u00e9e sur des appareils fonctionnant sous macOS et Windows est en cours, selon les chercheurs du groupe Insikt. Men\u00e9e par un groupe de hackers baptis\u00e9 Marko Polo, elle vise en premier lieu les d\u00e9tenteurs de cryptomonnaies et les gamers,\u00a0rapporte\u00a0<em>01net\u00a0<\/em>.<\/p>\n<p class=\"continue-read-break\" data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Les chercheurs de Recorded Future\u00a0qui sont sur cette piste depuis six mois qualifient ces attaques de\u00a0<strong>\u00ab\u00a0menace criminelle persistante\u00a0\u00bb<\/strong>. Les enqu\u00eateurs estiment que\u00a0<strong>\u00ab\u00a0des dizaines de milliers d\u2019appareils ont probablement \u00e9t\u00e9 compromis \u00e0 l\u2019\u00e9chelle mondiale\u00a0\u00bb<\/strong>\u00a0et des\u00a0<strong>\u00ab\u00a0donn\u00e9es personnelles et d\u2019entreprises sensibles\u00a0\u00bb<\/strong>\u00a0ont \u00e9t\u00e9 expos\u00e9es. Plusieurs millions de dollars ont semble-t-il chang\u00e9 de main, profitant aux hackers dont les enqu\u00eateurs imaginent qu\u2019ils sont dans des pays comme la Russie, l\u2019Ukraine, la Bi\u00e9lorussie ou encore la Moldavie.<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">De multiples strat\u00e9gies<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Au cours de cette campagne,\u00a0<strong>\u00ab\u00a0plus de 30\u00a0escroqueries nouvelles et distinctes, 50\u00a0charges utiles de logiciels malveillants uniques, des dizaines de domaines malveillants et des centaines de comptes de r\u00e9seaux sociaux frauduleux li\u00e9s \u00e0 l\u2019op\u00e9ration Marko Polo\u00a0\u00bb<\/strong>\u00a0ont \u00e9t\u00e9 d\u00e9couverts, d\u00e9taillent les chercheurs en s\u00e9curit\u00e9. Ces attaques se singularisent par la diversit\u00e9 des cibles, les tactiques employ\u00e9es pour les atteindre et les canaux de distribution.<\/p>\n<p class=\"\" data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">Ce sont les influenceurs de l\u2019univers des cryptomonnaies, les gamers, les d\u00e9veloppeurs de logiciels, mais aussi d\u2019autres personnes ayant acc\u00e8s \u00e0 des donn\u00e9es sensibles ou \u00e0 des actifs num\u00e9riques qui sont cibl\u00e9s par les membres de Marko Polo. Les hackers se font passer pour des employ\u00e9s d\u2019entreprises r\u00e9put\u00e9es comme Epic Games (Fortnite), les \u00e9diteurs de jeux tels que Party Icon RuneScape, Rise Online World, des logiciels comme Zoom ou des outils blockchain comme PeerMe. Disposant d\u2019informations sur leurs cibles, ils proposent des collaborations juteuses. Ils trouvent ensuite le moyen d\u2019envoyer un document v\u00e9rol\u00e9 ou d\u2019emmener les victimes vers un site contrefait. L\u2019objectif est de compromettre l\u2019ordinateur.<\/p>\n<p data-t=\"{&quot;n&quot;:&quot;blueLinks&quot;}\">avec agence<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un groupe de pirates se faisant appeler Marko Polo a lanc\u00e9 depuis au moins six mois une campagne de vol de donn\u00e9es ciblant les utilisateurs d\u2019ordinateurs sous Windows et macOS. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6838,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-6837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs\" \/>\n<meta property=\"og:description\" content=\"Un groupe de pirates se faisant appeler Marko Polo a lanc\u00e9 depuis au moins six mois une campagne de vol de donn\u00e9es ciblant les utilisateurs d\u2019ordinateurs sous Windows et macOS. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-30T09:43:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/source-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"L\u00e9ticia KWABONG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/source-3.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"L\u00e9ticia KWABONG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/\"},\"author\":{\"name\":\"L\u00e9ticia KWABONG\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\"},\"headline\":\"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis.\",\"datePublished\":\"2024-09-30T09:43:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/\"},\"wordCount\":402,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ab.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/\",\"name\":\"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ab.jpg\",\"datePublished\":\"2024-09-30T09:43:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ab.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ab.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/09\\\/30\\\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\",\"name\":\"L\u00e9ticia KWABONG\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"caption\":\"L\u00e9ticia KWABONG\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/leticia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/","og_locale":"fr_FR","og_type":"article","og_title":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs","og_description":"Un groupe de pirates se faisant appeler Marko Polo a lanc\u00e9 depuis au moins six mois une campagne de vol de donn\u00e9es ciblant les utilisateurs d\u2019ordinateurs sous Windows et macOS. [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-09-30T09:43:11+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/source-2.jpg","type":"image\/jpeg"}],"author":"L\u00e9ticia KWABONG","twitter_card":"summary_large_image","twitter_title":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/source-3.jpg","twitter_misc":{"\u00c9crit par":"L\u00e9ticia KWABONG","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/"},"author":{"name":"L\u00e9ticia KWABONG","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9"},"headline":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis.","datePublished":"2024-09-30T09:43:11+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/"},"wordCount":402,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/ab.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/","url":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/","name":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis. - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/ab.jpg","datePublished":"2024-09-30T09:43:11+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/ab.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/09\/ab.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/09\/30\/une-cyberattaque-mondiale-sevit-sur-windows-et-macos-des-milliers-dordinateurs-deja-compromis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Une cyberattaque mondiale s\u00e9vit sur Windows et macOS, des milliers d\u2019ordinateurs d\u00e9j\u00e0 compromis."}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9","name":"L\u00e9ticia KWABONG","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","caption":"L\u00e9ticia KWABONG"},"sameAs":["https:\/\/parlonstechs.com\/"],"url":"https:\/\/parlonstechs.com\/all\/author\/leticia\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=6837"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6837\/revisions"}],"predecessor-version":[{"id":6841,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6837\/revisions\/6841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/6838"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=6837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=6837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=6837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}