{"version":"1.0","provider_name":"LockPassGen","provider_url":"https:\/\/lockpassgen.com\/blog","title":"Les nouvelles r\u00e8gles d\u2019or de la cyberattaques - LockPassGen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4Nrkfag5TM\"><a href=\"https:\/\/lockpassgen.com\/blog\/les-nouvelles-regles-dor-de-la-cyberattaques\/\">Les nouvelles r\u00e8gles d\u2019or de la cyberattaques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lockpassgen.com\/blog\/les-nouvelles-regles-dor-de-la-cyberattaques\/embed\/#?secret=4Nrkfag5TM\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Les nouvelles r\u00e8gles d\u2019or de la cyberattaques\u00a0\u00bb &#8212; LockPassGen\" data-secret=\"4Nrkfag5TM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/lockpassgen.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Les nouvelles r\u00e8gles d&rsquo;or de la cyberattaque : Une \u00e9volution constante dans le paysage de la s\u00e9curit\u00e9 informatique Les cyberattaques sont devenues une partie int\u00e9grante du paysage de la s\u00e9curit\u00e9 informatique contemporain. Les pirates informatiques sont constamment en train d&rsquo;\u00e9voluer et de se perfectionner, exploitant de nouvelles failles et d\u00e9veloppant de nouvelles strat\u00e9gies pour contourner..."}