{"version":"1.0","provider_name":"Cabinet Magar","provider_url":"https:\/\/www.cabinet-magar.fr\/de\/","author_name":"Cabinet Magar","author_url":"https:\/\/www.cabinet-magar.fr\/de\/","title":"Cybers\u00e9curit\u00e9 : le bilan des menaces 2023 - Cabinet Magar","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qYQuodmiMK\"><a href=\"https:\/\/www.cabinet-magar.fr\/de\/actualites\/cybersecurite-le-bilan-des-menaces-2023\/\">Cybers\u00e9curit\u00e9 : le bilan des menaces 2023<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cabinet-magar.fr\/de\/actualites\/cybersecurite-le-bilan-des-menaces-2023\/embed\/#?secret=qYQuodmiMK\" width=\"600\" height=\"338\" title=\"&#8222;Cybers\u00e9curit\u00e9 : le bilan des menaces 2023&#8220; &#8211; Cabinet Magar\" data-secret=\"qYQuodmiMK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cabinet-magar.fr\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.cabinet-magar.fr\/wp-content\/uploads\/2024\/04\/bilcyb.jpg","thumbnail_width":600,"thumbnail_height":400,"description":"Les menaces cyber ne cessent de se d\u00e9velopper et il faut \u00e0 ce titre garder un \u0153il attentif sur les \u00ab pratiques en vogue \u00bb chez les cybercriminels, afin de se pr\u00e9parer efficacement face \u00e0 toute tentative malveillante\u2026"}