{"id":25601,"date":"2023-10-03T17:15:12","date_gmt":"2023-10-03T15:15:12","guid":{"rendered":"https:\/\/amg-informatique.fr\/w2\/?p=25601"},"modified":"2023-10-03T17:15:51","modified_gmt":"2023-10-03T15:15:51","slug":"cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023","status":"publish","type":"post","link":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/","title":{"rendered":"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023"},"content":{"rendered":"<p><strong>&#x1f6a8; [#CyberMois] &#x1f6a8; Le rapport d\u2019ESET sur les menaces du 1er trimestre 2023 met en \u00e9vidence la capacit\u00e9 d\u2019adaptation des #cybercriminels , surfant sur l\u2019exploitation de #vuln\u00e9rabilit\u00e9s, l\u2019obtention d\u2019acc\u00e8s non autoris\u00e9s, la compromission d\u2019informations sensibles ou l\u2019#escroquerie.<\/strong><\/p>\n<p>&#x1f449; Ce qu\u2019il faut retenir :<\/p>\n<p> &#x27a1; Les attaquants ont d\u00e9velopp\u00e9 de nouvelles m\u00e9thodes pour tenter de contourner les mesures de s\u00e9curit\u00e9 de #Microsoft, notamment en utilisant des fichiers #OneNote \u00e0 la place de macros #Office.<\/p>\n<p>&#x27a1; Les chercheurs d\u2019ESET ont observ\u00e9 le retour des emails de #sextorsion et une croissance alarmante du nombre d\u2019applications de pr\u00eat trompeuses sur #Android.<\/p>\n<p>&#x27a1; Les donn\u00e9es de t\u00e9l\u00e9m\u00e9trie d\u2019ESET sugg\u00e8rent \u00e9galement que les op\u00e9rateurs du botnet #Emotet ont eu des difficult\u00e9s \u00e0 s\u2019adapter, ce qui pourrait indiquer qu\u2019un autre groupe ait acquis le botnet.<\/p>\n<p>&#x27a1; La fuite du code source des familles de #ran\u00e7ongiciels telles que #Babyk, #LockBit et #Conti a \u00e9t\u00e9 de plus en plus utilis\u00e9 pour le d\u00e9veloppement de nouvelles variantes de ran\u00e7ongiciels au 1er trimestre 2023.<\/p>\n<p>&#x1f50e; D\u00e9couvrez dans le Rapport d&rsquo;#ESET sur les menaces H1 2023, les tendances du paysage des menaces observ\u00e9es gr\u00e2ce \u00e0 sa t\u00e9l\u00e9m\u00e9trie de d\u00e9cembre 2022 \u00e0 mai 2023 (en anglais) \u00e9galement t\u00e9l\u00e9chargeable sur notre site internet : <a href=\"https:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/Rapport-des-menaces-ESET-S1-2023.pdf\" rel=\"noopener\" target=\"_blank\">Rapport des menaces ESET S1 2023.pdf<\/a><\/p>\n<p>Bonne lecture !<\/p>\n<p>#Cybers\u00e9curit\u00e9 #Cybermenaces #Cybercriminalit\u00e9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#x1f6a8; [#CyberMois] &#x1f6a8; Le rapport d\u2019ESET sur les menaces du 1er trimestre 2023 met en \u00e9vidence la capacit\u00e9 d\u2019adaptation des #cybercriminels , surfant sur l\u2019exploitation de #vuln\u00e9rabilit\u00e9s, l\u2019obtention d\u2019acc\u00e8s non autoris\u00e9s, la compromission d\u2019informations sensibles ou l\u2019#escroquerie. &#x1f449; Ce qu\u2019il faut retenir : &#x27a1; Les attaquants ont d\u00e9velopp\u00e9 de nouvelles m\u00e9thodes pour tenter de contourner  [&#8230;]<\/p>\n","protected":false},"author":7,"featured_media":25602,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[176,187,189,190,188,186],"class_list":["post-25601","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-dentreprise","tag-cybersecurite","tag-187","tag-cybercriminalite","tag-cybermenaces","tag-cybermois","tag-eset"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023 - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9<\/title>\n<meta name=\"description\" content=\"Toutes les actualit\u00e9s d&#039;AMG INFORMATIQUE \u00e0 Dijon et au Creusot\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023 - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"og:description\" content=\"Toutes les actualit\u00e9s d&#039;AMG INFORMATIQUE \u00e0 Dijon et au Creusot\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T15:15:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-03T15:15:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/rapport-eset-h1-2023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"AMG INFORMATIQUE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:site\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"AMG INFORMATIQUE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/\"},\"author\":{\"name\":\"AMG INFORMATIQUE\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/abd28354df3fdad4a59d904d88579540\"},\"headline\":\"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023\",\"datePublished\":\"2023-10-03T15:15:12+00:00\",\"dateModified\":\"2023-10-03T15:15:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/\"},\"wordCount\":265,\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/rapport-eset-h1-2023.jpg\",\"keywords\":[\"#cybersecurite\",\"2023\",\"Cybercriminalit\u00e9\",\"Cybermenaces\",\"CyberMois\",\"ESET\"],\"articleSection\":[\"Communication d'entreprise\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/\",\"name\":\"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023 - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/rapport-eset-h1-2023.jpg\",\"datePublished\":\"2023-10-03T15:15:12+00:00\",\"dateModified\":\"2023-10-03T15:15:51+00:00\",\"description\":\"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/rapport-eset-h1-2023.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/rapport-eset-h1-2023.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"name\":\"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9\",\"description\":\"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\",\"name\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"width\":2139,\"height\":747,\"caption\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AMG.INFORMATIQUE\\\/\",\"https:\\\/\\\/x.com\\\/AMGINFORMATIQUE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/amg-informatique\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/abd28354df3fdad4a59d904d88579540\",\"name\":\"AMG INFORMATIQUE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"caption\":\"AMG INFORMATIQUE\"},\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/author\\\/amg-informatique\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023 - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/","og_locale":"fr_FR","og_type":"article","og_title":"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023 - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","og_description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","og_url":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/","og_site_name":"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","article_publisher":"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","article_published_time":"2023-10-03T15:15:12+00:00","article_modified_time":"2023-10-03T15:15:51+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/rapport-eset-h1-2023.jpg","type":"image\/jpeg"}],"author":"AMG INFORMATIQUE","twitter_card":"summary_large_image","twitter_creator":"@AMGINFORMATIQUE","twitter_site":"@AMGINFORMATIQUE","twitter_misc":{"\u00c9crit par":"AMG INFORMATIQUE","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#article","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/"},"author":{"name":"AMG INFORMATIQUE","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/abd28354df3fdad4a59d904d88579540"},"headline":"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023","datePublished":"2023-10-03T15:15:12+00:00","dateModified":"2023-10-03T15:15:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/"},"wordCount":265,"publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/rapport-eset-h1-2023.jpg","keywords":["#cybersecurite","2023","Cybercriminalit\u00e9","Cybermenaces","CyberMois","ESET"],"articleSection":["Communication d'entreprise"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/","url":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/","name":"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023 - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/rapport-eset-h1-2023.jpg","datePublished":"2023-10-03T15:15:12+00:00","dateModified":"2023-10-03T15:15:51+00:00","description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","breadcrumb":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#primaryimage","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/rapport-eset-h1-2023.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/rapport-eset-h1-2023.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.amg-informatique.fr\/w2\/cybermois-decouvrez-le-rapport-deset-sur-les-menaces-du-1er-trimestre-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.amg-informatique.fr\/w2\/"},{"@type":"ListItem","position":2,"name":"[#CyberMois] D\u00e9couvrez le rapport d\u2019@ESET sur les menaces du 1er trimestre 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.amg-informatique.fr\/w2\/#website","url":"https:\/\/www.amg-informatique.fr\/w2\/","name":"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9","description":"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)","publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amg-informatique.fr\/w2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization","name":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9","url":"https:\/\/www.amg-informatique.fr\/w2\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","width":2139,"height":747,"caption":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","https:\/\/x.com\/AMGINFORMATIQUE","https:\/\/www.linkedin.com\/company\/amg-informatique\/"]},{"@type":"Person","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/abd28354df3fdad4a59d904d88579540","name":"AMG INFORMATIQUE","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","caption":"AMG INFORMATIQUE"},"url":"https:\/\/www.amg-informatique.fr\/w2\/author\/amg-informatique\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/25601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/comments?post=25601"}],"version-history":[{"count":2,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/25601\/revisions"}],"predecessor-version":[{"id":25604,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/25601\/revisions\/25604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media\/25602"}],"wp:attachment":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media?parent=25601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/categories?post=25601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/tags?post=25601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}