{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/fr\/","title":"Quand les hackers piratent les hackers - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"NNNQBuv2BW\"><a href=\"https:\/\/perseus.de\/fr\/quand-les-hackers-piratent-les-hackers\/\">Quand les hackers piratent les hackers<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/fr\/quand-les-hackers-piratent-les-hackers\/embed\/#?secret=NNNQBuv2BW\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Quand les hackers piratent les hackers\u00a0\u00bb &#8212; Perseus Technologies\" data-secret=\"NNNQBuv2BW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","thumbnail_width":730,"thumbnail_height":412,"description":"13.03.2020 Quand les hackers piratent les hackers Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 De mani\u00e8re exceptionnelle, les cybercriminels se piratent aussi entre eux. Mais ce n\u2019est pas une raison de pousser un soupir de soulagement. L\u2019image courante des hackers est celle des experts informatiques qui d\u00e9veloppent et distribuent des logiciels malveillants comme des auteurs anonymes et [&hellip;]"}