{"id":13607,"date":"2021-04-27T22:01:28","date_gmt":"2021-04-27T22:01:28","guid":{"rendered":"https:\/\/\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/"},"modified":"2021-04-27T22:01:28","modified_gmt":"2021-04-27T22:01:28","slug":"keysight-publie-son-4eme-observatoire-de-la-securite-informatique","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/","title":{"rendered":"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"margin-right:29.25pt;background:white\"><span style=\"color:black;border:none windowtext 1.0pt;padding:0cm\">Le rapport s&rsquo;appuie sur l&rsquo;exp\u00e9rience de Keysight en mati\u00e8re de tests de s\u00e9curit\u00e9 des r\u00e9seaux, ainsi que sur l&rsquo;expertise de l&rsquo;entreprise en mati\u00e8re de ma\u00eetrise des r\u00e9seaux et du cloud. La fine fleur des sp\u00e9cialistes en cybers\u00e9curit\u00e9 du centre de recherche ATI de Keysight, r\u00e9partie dans le monde entier, surveille et analyse les tendances qui menacent la s\u00e9curit\u00e9 des r\u00e9seaux informatiques des entreprises. Cette \u00e9quipe se base sur des sources multiples pour effectuer ses recherches, notamment des honeypots dans le monde entier, des recherches ind\u00e9pendantes effectu\u00e9es par l&rsquo;\u00e9quipe, l\u2019analyse de bases de donn\u00e9es internationales relatives aux failles, le Dark Web, des analyses d&rsquo;alertes de s\u00e9curit\u00e9 et du crowdsourcing, ainsi que des m\u00e9dias sociaux et des flux de partenaires.<\/span><br \/>\n<span style=\"color:black\"><!--[endif]--><\/span><span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-right:29.25pt;background:white\"><span style=\"color:black;border:none windowtext 1.0pt;padding:0cm\">\u00ab\u00a0<span>Ce rapport combine les le\u00e7ons \u00e0 retenir de l&rsquo;ann\u00e9e 2020 avec des \u00e9clairages utiles pour les professionnels de la s\u00e9curit\u00e9 des r\u00e9seaux pour 2021. Les donn\u00e9es et les aper\u00e7us sont tous deux bas\u00e9s sur des recherches men\u00e9es par le centre de recherche Application and Threat Intelligence (ATI) de Keysight<\/span> \u00ab\u00a0, d\u00e9clare S<span>cott Register, vice-pr\u00e9sident senior des solutions de s\u00e9curit\u00e9 chez Keysight<\/span>. \u00ab\u00a0<span>La cybercriminalit\u00e9 n&rsquo;a pas pris de vacances pendant la pand\u00e9mie. Les cybercriminels ont exploit\u00e9 le phishing, les ransomwares et les attaques vectorielles de la cha\u00eene logistique pour frapper les r\u00e9seaux \u00e0 des fins de gain financier. Nous pensons que ces tendances en mati\u00e8re de s\u00e9curit\u00e9 des r\u00e9seaux vont se poursuivre en 2021<\/span>.\u00a0\u00bb<\/span><br \/>\n<span style=\"color:black\"><!--[endif]--><\/span><span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-right:29.25pt;background:white\"><u><span style=\"color:black;border:none windowtext 1.0pt;padding:0cm\">Trois tendances ont caract\u00e9ris\u00e9 la cybercriminalit\u00e9 en 2020 :&nbsp;<\/span><\/u><span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-right:29.25pt;vertical-align:baseline\"><span style=\"border:none windowtext 1.0pt;padding:0cm\">&#8211; Les attaques par hame\u00e7onnage ont augment\u00e9 de 62 %<\/span><span style=\"border:none windowtext 1.0pt;padding:0cm\">. Les recherches de Keysight montrent qu&rsquo;il y a eu une augmentation de 62 % des attaques de phishing en 2020 par rapport \u00e0 2019. En fait, il y a eu une augmentation rapide de ces attaques lorsque la pand\u00e9mie a occup\u00e9 le devant de la sc\u00e8ne en mars et avril, car les attaques d&rsquo;ing\u00e9nierie sociale \u00e9taient li\u00e9es \u00e0 la pand\u00e9mie.<\/span><span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-right:29.25pt;vertical-align:baseline\"><span style=\"border:none windowtext 1.0pt;padding:0cm\">&#8211; Le gain financier est la premi\u00e8re motivation des cybercriminels. <\/span><span style=\"border:none windowtext 1.0pt;padding:0cm\">Le d\u00e9ploiement de ransomwares a connu une forte augmentation \u00e0 partir du mois de juin 2020. Si cette tendance s&rsquo;est manifest\u00e9e dans tous les secteurs, les soins de sant\u00e9 ont \u00e9t\u00e9 particuli\u00e8rement touch\u00e9s. 59 % des attaques ont eu lieu au cours du second semestre de 2020.&nbsp;<\/span><span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin-right:29.25pt;vertical-align:baseline\"><span style=\"border:none windowtext 1.0pt;padding:0cm\">&#8211; Les attaques de la cha\u00eene logistique ont fait les gros titres avec l&rsquo;attaque de SolarWinds<\/span><span style=\"border:none windowtext 1.0pt;padding:0cm\">. La logistique reste un &#8211; si ce n\u2019est le &#8211; point faible des entreprises et l&rsquo;attaque de SolarWinds a renforc\u00e9 la n\u00e9cessit\u00e9 pour les architectes de s\u00e9curit\u00e9 d&rsquo;adopter une approche holistique et compl\u00e8te.&nbsp;<\/span><span><\/span><br \/>\n<span style=\"border:none windowtext 1.0pt;padding:0cm\"><a href=\"http:\/\/www.keysight.com\"><span style=\"color:windowtext;text-decoration:none\">www.keysight.com<\/span><\/a><\/span><span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keysight Technologies, Inc. r\u00e9v\u00e8le les conclusions de son quatri\u00e8me Security Report. Le rapport 2021 pr\u00e9sente les tendances de la s\u00e9curit\u00e9 des r\u00e9seaux observ\u00e9es au cours de l&rsquo;ann\u00e9e \u00e9coul\u00e9e, selon le centre de recherche Application and Threat Intelligence (ATI) de Keysight, et met en \u00e9vidence trois axes strat\u00e9giques pour la s\u00e9curit\u00e9 des r\u00e9seaux.<\/p>\n","protected":false},"author":9,"featured_media":13608,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"domains":[47],"ppma_author":[1141],"class_list":["post-13607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informa...<\/title>\n<meta name=\"description\" content=\"Keysight Technologies, Inc. r\u00e9v\u00e8le les conclusions de son quatri\u00e8me Security Report. Le rapport 2021 pr\u00e9sente les tendances de la s\u00e9curit\u00e9 des r\u00e9seaux...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/13607\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique\" \/>\n<meta property=\"og:description\" content=\"Keysight Technologies, Inc. r\u00e9v\u00e8le les conclusions de son quatri\u00e8me Security Report. Le rapport 2021 pr\u00e9sente les tendances de la s\u00e9curit\u00e9 des r\u00e9seaux observ\u00e9es au cours de l&#039;ann\u00e9e \u00e9coul\u00e9e, selon le centre de recherche Application and Threat Intelligence (ATI) de Keysight, et met en \u00e9vidence trois axes strat\u00e9giques pour la s\u00e9curit\u00e9 des r\u00e9seaux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/13607\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-27T22:01:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci9213_keysight.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"668\" \/>\n\t<meta property=\"og:image:height\" content=\"523\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Dieul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Dieul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/\"},\"author\":{\"name\":\"Alain Dieul\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\"},\"headline\":\"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique\",\"datePublished\":\"2021-04-27T22:01:28+00:00\",\"dateModified\":\"2021-04-27T22:01:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/\",\"name\":\"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2021-04-27T22:01:28+00:00\",\"dateModified\":\"2021-04-27T22:01:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\",\"name\":\"Alain Dieul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"caption\":\"Alain Dieul\"}}]}<\/script>","yoast_head_json":{"title":"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informa...","description":"Keysight Technologies, Inc. r\u00e9v\u00e8le les conclusions de son quatri\u00e8me Security Report. Le rapport 2021 pr\u00e9sente les tendances de la s\u00e9curit\u00e9 des r\u00e9seaux...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/13607\/","og_locale":"fr_FR","og_type":"article","og_title":"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique","og_description":"Keysight Technologies, Inc. r\u00e9v\u00e8le les conclusions de son quatri\u00e8me Security Report. Le rapport 2021 pr\u00e9sente les tendances de la s\u00e9curit\u00e9 des r\u00e9seaux observ\u00e9es au cours de l'ann\u00e9e \u00e9coul\u00e9e, selon le centre de recherche Application and Threat Intelligence (ATI) de Keysight, et met en \u00e9vidence trois axes strat\u00e9giques pour la s\u00e9curit\u00e9 des r\u00e9seaux.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/13607\/","og_site_name":"EENewsEurope","article_published_time":"2021-04-27T22:01:28+00:00","og_image":[{"width":668,"height":523,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci9213_keysight.jpg","type":"image\/jpeg"}],"author":"Alain Dieul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Dieul","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/"},"author":{"name":"Alain Dieul","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf"},"headline":"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique","datePublished":"2021-04-27T22:01:28+00:00","dateModified":"2021-04-27T22:01:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/","url":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/","name":"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2021-04-27T22:01:28+00:00","dateModified":"2021-04-27T22:01:28+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/keysight-publie-son-4eme-observatoire-de-la-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Keysight publie son 4\u00e8me observatoire de la s\u00e9curit\u00e9 informatique"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf","name":"Alain Dieul","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364","url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","caption":"Alain Dieul"}}]}},"authors":[{"term_id":1141,"user_id":9,"is_guest":0,"slug":"alaindieul","display_name":"Alain Dieul","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/13607"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=13607"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/13607\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/13608"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=13607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=13607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=13607"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=13607"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=13607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}