{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/fr\/","title":"Le guide ultime du phishing - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qkIfCFdCMN\"><a href=\"https:\/\/perseus.de\/fr\/le-guide-ultime-du-phishing\/\">Le guide ultime du phishing<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/fr\/le-guide-ultime-du-phishing\/embed\/#?secret=qkIfCFdCMN\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Le guide ultime du phishing\u00a0\u00bb &#8212; Perseus Technologies\" data-secret=\"qkIfCFdCMN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Phishing_AdobeStock_198030591-1-768x512-1.jpeg","thumbnail_width":768,"thumbnail_height":512,"description":"Nous sommes tous constamment confront\u00e9s au spam et au phishing dans nos vies professionnelles et priv\u00e9es. Nous sourions \u00e0 certaines tentatives d\u2019attaque \u2013 mais d\u2019autres sont si sophistiqu\u00e9es qu\u2019elles ne sont pas reconnues comme des cyberattaques au premier abord.  Dans notre guide \u00ab Le guide ultime du phishing \u00bb, nous r\u00e9sumons nos connaissances expertes de mani\u00e8re pratique afin que vous puissiez rapidement et facilement reconna\u00eetre tout e-mail de phishing d\u2019une part, et construire votre barri\u00e8re de protection technique de mani\u00e8re \u00e0 ce que les emails de phishing ne passent pas d\u2019autre part."}