{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/fr\/","title":"Ransomware \u00e0 double extorsion - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TYRO6HIkBs\"><a href=\"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/\">Ransomware \u00e0 double extorsion<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/embed\/#?secret=TYRO6HIkBs\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Ransomware \u00e0 double extorsion\u00a0\u00bb &#8212; Perseus Technologies\" data-secret=\"TYRO6HIkBs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Ransomware \u00e0 double extorsion Double extorsion se traduit par \u00ab double extorsion \u00bb. Cela n\u2019implique pas n\u00e9cessairement plusieurs chantages, mais les cybercriminels utilisent plusieurs moyens de pression pour leur chantage. Avec les ransomwares qui \u00e9taient courants jusqu\u2019\u00e0 pr\u00e9sent, il existe g\u00e9n\u00e9ralement un moyen d\u2019exercer une pression : les donn\u00e9es d\u2019un ordinateur, d\u2019un r\u00e9seau ou d\u2019un [&hellip;]","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","thumbnail_width":800,"thumbnail_height":800}