
{"id":7210,"date":"2025-09-27T12:41:48","date_gmt":"2025-09-27T10:41:48","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=7210"},"modified":"2025-09-27T12:43:56","modified_gmt":"2025-09-27T10:43:56","slug":"cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/","title":{"rendered":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.01net.com\/app\/uploads\/2024\/11\/fuite-donnees-france.jpg\" alt=\"Fuite Donn\u00e9es France\" \/><\/p>\n<h2>Les cyberattaques continuent de se multiplier en France. De nombreuses entreprises se sont retrouv\u00e9es dans le viseur des cybercriminels.<\/h2>\n<div class=\"post-excerpt\">\n<p>Ces attaques ont abouti au vol des donn\u00e9es personnelles de la plupart des Fran\u00e7ais. Ci-dessous, on fait le point sur les derni\u00e8res victimes et l\u2019\u00e9volution de la situation.<\/p>\n<\/div>\n<div class=\"od-wrapper od-wrapper-both od-background\">\n<div class=\"optidigital-wrapper-div\" data-optidigital-slot=\"true\">\n<div id=\"optidigital-adslot-Content_1\" class=\"Content_1 od-desktop optidigital-ad-center-sticky\" data-google-query-id=\"CKvun6Tf-I8DFRcoBgAdVqEvQg\">\n<p>Depuis quelques mois,\u00a0les cyberattaques se multiplient en France. Les attaques informatiques se sont acc\u00e9l\u00e9r\u00e9es d\u00e8s le d\u00e9but de l\u2019ann\u00e9e 2024, avec une pluie d\u2019arnaques en ligne ou d\u2019intrusions en tous genres. Une \u00e9tude men\u00e9e par Statista r\u00e9v\u00e8le que les cyberattaques devraient couter\u00a0<strong>plus de 129 milliards de dollars<\/strong>\u00a0\u00e0 la France en 2024.<\/p>\n<p>Au terme de la grande partie des cyberattaques recens\u00e9es,\u00a0<strong>les donn\u00e9es personnelles des Fran\u00e7ais<\/strong>\u00a0se sont retrouv\u00e9es entre les mains des pirates. En r\u00e8gle g\u00e9n\u00e9rale, les donn\u00e9es exfiltr\u00e9es comprennent des noms complets, des adresses \u00e9lectroniques, des adresses postales ou des num\u00e9ros de t\u00e9l\u00e9phone. Parfois, des coordonn\u00e9es bancaires sont aussi r\u00e9cup\u00e9r\u00e9es par les pirates. C\u2019\u00e9tait le cas\u00a0lors du piratage de Free avec des millions d\u2019IBAN\u00a0qui se sont retrouv\u00e9s dans la nature.<\/p>\n<p>Une fois d\u00e9rob\u00e9es, les donn\u00e9es sont g\u00e9n\u00e9ralement revendues sur des march\u00e9s noirs. Bien souvent, c\u2019est sur\u00a0BreachForums, une plateforme tr\u00e8s fr\u00e9quent\u00e9e par les cybercriminels en qu\u00eate d\u2019informations, que les ench\u00e8res sont ouvertes. Une fois achet\u00e9es, les donn\u00e9es peuvent servir \u00e0 orchestrer d\u2019autres offensives, comme des attaques phishing personnalis\u00e9es ou des tentatives d\u2019usurpation d\u2019identit\u00e9.<\/p>\n<p>\u00c0 partir de l\u00e0, on constate un effet boule de neige. Plus on trouve de donn\u00e9es compromises, plus les hackers lancent des cyberattaques\u2026 qui aboutissent au vol d\u2019autres informations. Pour Cl\u00e9ment Domingo, chercheur en s\u00e9curit\u00e9 qui suit de pr\u00e8s la situation en France, ce sont\u00a0<strong>les donn\u00e9es de huit Fran\u00e7ais sur dix<\/strong>\u00a0qui circulent sur des march\u00e9s noirs. C\u2019est pourquoi les Fran\u00e7ais sont devenus les cibles pr\u00e9f\u00e9r\u00e9es des cybercriminels\u2026 La France s\u2019est impos\u00e9e comme\u00a0<strong>le pays d\u2019Europe occidentale le plus touch\u00e9<\/strong>\u00a0par les violations, d\u00e9montre\u00a0une \u00e9tude de SurfShark.<\/p>\n<p>Parmi les plus grosses fuites de donn\u00e9es de l\u2019ann\u00e9e, on trouve d\u2019abord le hack de deux prestataires des soins de sant\u00e9,\u00a0Viam\u00e9dis et Amerys, de deux op\u00e9rateurs majeurs (Free et\u00a0SFR), de plusieurs enseignes, \u00e0 savoir\u00a0Boulanger,\u00a0Cultura,\u00a0SFR, Truffaut ou encore Grosbill, et de plusieurs services du gouvernement, dont\u00a0la Caisse d\u2019Allocations familiales (CAF)\u00a0et\u00a0France Travail. Malheureusement, la liste des entreprises touch\u00e9es continue de s\u2019allonger de jour en jour.<\/p>\n<div class=\"ez-toc-title-container\">via 01 net<\/div>\n<div class=\"od-wrapper od-wrapper-both od-background\">\n<div class=\"Content_3 od-desktop optidigital-ad-center-sticky\" data-google-query-id=\"CIqK4tXe-I8DFYZeHQkdrtkqDQ\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les cyberattaques continuent de se multiplier en France. De nombreuses entreprises se sont retrouv\u00e9es dans le viseur des cybercriminels. Ces attaques ont abouti au vol des donn\u00e9es personnelles de la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7212,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-7210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"Les cyberattaques continuent de se multiplier en France. De nombreuses entreprises se sont retrouv\u00e9es dans le viseur des cybercriminels. Ces attaques ont abouti au vol des donn\u00e9es personnelles de la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-27T10:41:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-27T10:43:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/social_affiche-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/social_affiche-4.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es\",\"datePublished\":\"2025-09-27T10:41:48+00:00\",\"dateModified\":\"2025-09-27T10:43:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/\"},\"wordCount\":476,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ab-4.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/\",\"name\":\"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ab-4.jpg\",\"datePublished\":\"2025-09-27T10:41:48+00:00\",\"dateModified\":\"2025-09-27T10:43:56+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ab-4.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ab-4.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/09\\\/27\\\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - ParlonsTechs","og_description":"Les cyberattaques continuent de se multiplier en France. De nombreuses entreprises se sont retrouv\u00e9es dans le viseur des cybercriminels. Ces attaques ont abouti au vol des donn\u00e9es personnelles de la [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/","og_site_name":"Parlons Techs - Store","article_published_time":"2025-09-27T10:41:48+00:00","article_modified_time":"2025-09-27T10:43:56+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/social_affiche-4.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/social_affiche-4.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es","datePublished":"2025-09-27T10:41:48+00:00","dateModified":"2025-09-27T10:43:56+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/"},"wordCount":476,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/ab-4.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/","url":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/","name":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/ab-4.jpg","datePublished":"2025-09-27T10:41:48+00:00","dateModified":"2025-09-27T10:43:56+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/ab-4.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/09\/ab-4.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2025\/09\/27\/cyberattaques-en-france-les-dernieres-fuites-de-donnees-et-entreprises-touchees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Cyberattaques en France : Les derni\u00e8res fuites de donn\u00e9es et entreprises touch\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=7210"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7210\/revisions"}],"predecessor-version":[{"id":7211,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7210\/revisions\/7211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/7212"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=7210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=7210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=7210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}