{"id":11365,"date":"2021-01-27T09:44:22","date_gmt":"2021-01-27T08:44:22","guid":{"rendered":"https:\/\/news.save.ch\/?p=11365"},"modified":"2023-07-22T17:24:31","modified_gmt":"2023-07-22T15:24:31","slug":"hacker-nehmen-security-forscher-ins-visier","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/hacker-nehmen-security-forscher-ins-visier\/","title":{"rendered":"Les pirates informatiques ciblent les chercheurs en s\u00e9curit\u00e9"},"content":{"rendered":"<figure id=\"attachment_11370\" aria-describedby=\"caption-attachment-11370\" style=\"width: 929px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11370 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg\" alt=\"Cyber-attaques\" width=\"929\" height=\"497\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg 929w, https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser-375x201.jpg 375w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><figcaption id=\"caption-attachment-11370\" class=\"wp-caption-text\">Pixabay<\/figcaption><\/figure>\n<p>Un groupe de pirates informatiques, probablement originaire de Cor\u00e9e du Nord, semble actuellement lancer des attaques cibl\u00e9es contre des experts en cybers\u00e9curit\u00e9. Adam Weidemann, chercheur en s\u00e9curit\u00e9 chez Google et membre du Threat Analysis Group, met en garde contre ce risque. <a href=\"https:\/\/blog.google\/threat-analysis-group\/new-campaign-targeting-security-researchers\/\" target=\"_blank\" rel=\"noopener\">dans son billet de blog<\/a>. Il pense que les attaquants se concentrent sur plusieurs entreprises et experts en s\u00e9curit\u00e9 afin d'obtenir davantage d'informations sur les vuln\u00e9rabilit\u00e9s des produits informatiques.<\/p>\n<h2>Les pirates se font passer pour des chercheurs en s\u00e9curit\u00e9<\/h2>\n<p>Le proc\u00e9d\u00e9 est int\u00e9ressant et perfide : Les pirates se font passer pour des chercheurs en s\u00e9curit\u00e9. Pour ce faire, ils ont cr\u00e9\u00e9 leur propre communaut\u00e9 et ont utilis\u00e9 un blog de recherche comme fa\u00e7ade pour \u00e9changer davantage de messages directs avec d'authentiques chercheurs en s\u00e9curit\u00e9, en recyclant \u00e9galement les travaux d'autres chercheurs en s\u00e9curit\u00e9. Il s'agissait donc d'une attaque cibl\u00e9e par le biais de l'ing\u00e9nierie sociale, afin de gagner d'abord la cr\u00e9dibilit\u00e9 d'autres chercheurs en s\u00e9curit\u00e9.<\/p>\n<p>Dans certains cas, la prise de contact s'est d\u00e9roul\u00e9e via Twitter, les pr\u00e9tendus chercheurs en s\u00e9curit\u00e9 proposant une collaboration et attirant l'attention sur des exploits r\u00e9cemment d\u00e9couverts. Les auteurs ont ensuite envoy\u00e9 un projet Visual Studio manipul\u00e9, g\u00e9n\u00e9ralement utilis\u00e9 pour le d\u00e9veloppement et la v\u00e9rification du code logiciel. Le logiciel de v\u00e9rification de code \u00e9tait ensuite g\u00e9n\u00e9ralement utilis\u00e9 pour introduire des logiciels malveillants sur les ordinateurs des victimes, qui pouvaient \u00e0 leur tour se connecter \u00e0 un serveur de commande et de contr\u00f4le des pirates.<\/p>\n<p>Une autre m\u00e9thode consistait \u00e0 diffuser du code malveillant via son propre blog au moyen de liens malveillants. Comme le pr\u00e9vient Google, les syst\u00e8mes Windows 10 \u00e9quip\u00e9s du navigateur Chrome \u00e9taient \u00e0 ce moment-l\u00e0 \u00e0 la pointe de la technologie et n'\u00e9taient donc pas \u00e0 l'abri d'une attaque.<\/p>\n<p><a href=\"https:\/\/blog.google\/threat-analysis-group\/new-campaign-targeting-security-researchers\/\" target=\"_blank\" rel=\"noopener\">Plus de d\u00e9tails sur les faux comptes dans le rapport Google sur les menaces<\/a><\/p>\n<p><em>Source :\u00a0<a href=\"https:\/\/blog.google\/threat-analysis-group\" target=\"_blank\" rel=\"noopener\">blog.google\/threat-analysis-group<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Eine vermutlich aus Nordkorea stammende Hackergruppe scheint gegenw\u00e4rtig gezielte Angriffe auf Cybersecurity-Experten zu unternehmen. Davor warnt der Google-Sicherheitsforscher Adam Weidemann von der Threat Analysis Group in seinem Blogpost. Er geht davon aus, dass sich die Angreifer auf mehrere Unternehmen und Security-Experten konzentrieren, um mehr Informationen \u00fcber Schwachstellen in IT-Produkten zu erbeuten. Hacker tarnen sich als [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":11370,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[1,3313],"tags":[1156,5820,1157,5819,652,1158,3634,339,1152],"class_list":["post-11365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-digitalisierung","tag-command-and-control","tag-cybersecurity-experten","tag-google-threat-report","tag-hackergruppe","tag-malware","tag-nordkorea","tag-schwachstellen","tag-sicherheitsluecke","tag-social-engineering"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"1","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker nehmen Security-Forscher ins Visier - Save<\/title>\n<meta name=\"description\" content=\"Google warnt gegenw\u00e4rtig vor gezielten Cyberangriffen einer Gruppe, die es auf Security-Schwachstellen in IT-Produkten abgesehen hat. Besonders perfide: Die Cyberkriminellen geben sich selbst als Sicherheitsforensiker aus, um mehr vertrauliche Informationen \u00fcber Exploits zu erhaschen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/hacker-nehmen-security-forscher-ins-visier\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker nehmen Security-Forscher ins Visier - Save\" \/>\n<meta property=\"og:description\" content=\"Google warnt gegenw\u00e4rtig vor gezielten Cyberangriffen einer Gruppe, die es auf Security-Schwachstellen in IT-Produkten abgesehen hat. Besonders perfide: Die Cyberkriminellen geben sich selbst als Sicherheitsforensiker aus, um mehr vertrauliche Informationen \u00fcber Exploits zu erhaschen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/hacker-nehmen-security-forscher-ins-visier\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-27T08:44:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-22T15:24:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"929\" \/>\n\t<meta property=\"og:image:height\" content=\"497\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Gr\u00f6flin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Gr\u00f6flin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/\"},\"author\":{\"name\":\"Simon Gr\u00f6flin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\"},\"headline\":\"Hacker nehmen Security-Forscher ins Visier\",\"datePublished\":\"2021-01-27T08:44:22+00:00\",\"dateModified\":\"2023-07-22T15:24:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/\"},\"wordCount\":255,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/hacking_pixabay_teaser.jpg\",\"keywords\":[\"Command and Control\",\"Cybersecurity-Experten\",\"Google Threat Report\",\"Hackergruppe\",\"Malware\",\"Nordkorea\",\"Schwachstellen\",\"Sicherheitsl\u00fccke\",\"Social Engineering\"],\"articleSection\":[\"ALLGEMEIN\",\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/\",\"name\":\"Hacker nehmen Security-Forscher ins Visier - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/hacking_pixabay_teaser.jpg\",\"datePublished\":\"2021-01-27T08:44:22+00:00\",\"dateModified\":\"2023-07-22T15:24:31+00:00\",\"description\":\"Google warnt gegenw\u00e4rtig vor gezielten Cyberangriffen einer Gruppe, die es auf Security-Schwachstellen in IT-Produkten abgesehen hat. Besonders perfide: Die Cyberkriminellen geben sich selbst als Sicherheitsforensiker aus, um mehr vertrauliche Informationen \u00fcber Exploits zu erhaschen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/hacking_pixabay_teaser.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/hacking_pixabay_teaser.jpg\",\"width\":929,\"height\":497,\"caption\":\"Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hacker-nehmen-security-forscher-ins-visier\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker nehmen Security-Forscher ins Visier\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\",\"name\":\"Simon Gr\u00f6flin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"caption\":\"Simon Gr\u00f6flin\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/simon-groeflin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les pirates informatiques ciblent les chercheurs en s\u00e9curit\u00e9 - Save","description":"Google met actuellement en garde contre les cyberattaques cibl\u00e9es d'un groupe qui vise les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans les produits informatiques. Les cybercriminels se font passer pour des experts en s\u00e9curit\u00e9 afin d'obtenir des informations confidentielles sur les exploits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/hacker-nehmen-security-forscher-ins-visier\/","og_locale":"fr_FR","og_type":"article","og_title":"Hacker nehmen Security-Forscher ins Visier - Save","og_description":"Google warnt gegenw\u00e4rtig vor gezielten Cyberangriffen einer Gruppe, die es auf Security-Schwachstellen in IT-Produkten abgesehen hat. Besonders perfide: Die Cyberkriminellen geben sich selbst als Sicherheitsforensiker aus, um mehr vertrauliche Informationen \u00fcber Exploits zu erhaschen.","og_url":"https:\/\/news.save.ch\/fr\/hacker-nehmen-security-forscher-ins-visier\/","og_site_name":"Save","article_published_time":"2021-01-27T08:44:22+00:00","article_modified_time":"2023-07-22T15:24:31+00:00","og_image":[{"width":929,"height":497,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg","type":"image\/jpeg"}],"author":"Simon Gr\u00f6flin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Simon Gr\u00f6flin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/"},"author":{"name":"Simon Gr\u00f6flin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d"},"headline":"Hacker nehmen Security-Forscher ins Visier","datePublished":"2021-01-27T08:44:22+00:00","dateModified":"2023-07-22T15:24:31+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/"},"wordCount":255,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg","keywords":["Command and Control","Cybersecurity-Experten","Google Threat Report","Hackergruppe","Malware","Nordkorea","Schwachstellen","Sicherheitsl\u00fccke","Social Engineering"],"articleSection":["ALLGEMEIN","DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/","url":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/","name":"Les pirates informatiques ciblent les chercheurs en s\u00e9curit\u00e9 - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg","datePublished":"2021-01-27T08:44:22+00:00","dateModified":"2023-07-22T15:24:31+00:00","description":"Google met actuellement en garde contre les cyberattaques cibl\u00e9es d'un groupe qui vise les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans les produits informatiques. Les cybercriminels se font passer pour des experts en s\u00e9curit\u00e9 afin d'obtenir des informations confidentielles sur les exploits.","breadcrumb":{"@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/01\/hacking_pixabay_teaser.jpg","width":929,"height":497,"caption":"Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/hacker-nehmen-security-forscher-ins-visier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Hacker nehmen Security-Forscher ins Visier"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d","name":"Simon Gr\u00f6flin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","caption":"Simon Gr\u00f6flin"},"url":"https:\/\/news.save.ch\/fr\/author\/simon-groeflin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/11365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=11365"}],"version-history":[{"count":2,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/11365\/revisions"}],"predecessor-version":[{"id":21233,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/11365\/revisions\/21233"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/11370"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=11365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=11365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=11365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}