{"id":26718,"date":"2022-04-22T11:55:00","date_gmt":"2022-04-22T09:55:00","guid":{"rendered":"https:\/\/perseus.de\/echange-de-menaces-ouvertes\/"},"modified":"2026-03-30T11:01:13","modified_gmt":"2026-03-30T09:01:13","slug":"echange-de-menaces-ouvertes","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/","title":{"rendered":"\u00c9change de menaces ouvertes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26718\" class=\"elementor elementor-26718 elementor-22383\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\u00c9change de menaces ouvertes\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e262ce8 e-flex e-con-boxed e-con e-parent\" data-id=\"5e262ce8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-286444d1 e-con-full e-flex e-con e-child\" data-id=\"286444d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p data-start=\"32\" data-end=\"388\">\u00c9change de menaces ouvertes ou, en anglais Open Threat Exchange (OTX) est une plateforme ouverte pour partager des informations sur les cybermenaces. Il est exploit\u00e9 par la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 <strong data-start=\"195\" data-end=\"209\">AlienVault<\/strong> (d\u00e9sormais int\u00e9gr\u00e9e \u00e0 AT&amp;T Cybersecurity) et est con\u00e7u pour partager rapidement et de mani\u00e8re collaborative des informations sur les attaques, les vuln\u00e9rabilit\u00e9s, les malwares et les attaquants. <\/p><h4 data-start=\"390\" data-end=\"750\"><strong data-start=\"390\" data-end=\"412\">Qu\u2019est-ce que l\u2019OTX exactement ?<\/strong><\/h4><p data-start=\"390\" data-end=\"750\">OTX est un <strong data-start=\"427\" data-end=\"459\">r\u00e9seau de renseignement sur les menaces<\/strong> dans lequel des experts en s\u00e9curit\u00e9, des entreprises et des institutions de recherche compilent des donn\u00e9es sur les menaces actuelles. Ces informations sont publi\u00e9es sous forme de \u00ab <strong data-start=\"618\" data-end=\"628\">pulses<\/strong> \u00bb \u2013 des publications structur\u00e9es contenant des adresses IP, des domaines, des valeurs de hachage ou des tactiques des attaquants. <\/p><p data-start=\"752\" data-end=\"944\">OTX repose sur le principe de <strong data-start=\"784\" data-end=\"812\">d\u00e9fense collective<\/strong> : lorsqu\u2019une entreprise d\u00e9tecte une nouvelle menace, d\u2019autres peuvent b\u00e9n\u00e9ficier en prenant des mesures de protection d\u00e8s le d\u00e9but.<\/p><h4 data-start=\"946\" data-end=\"973\"><strong data-start=\"946\" data-end=\"971\">Pourquoi avez-vous besoin d\u2019OTX ?<\/strong><\/h4><ul data-start=\"974\" data-end=\"1275\"><li data-start=\"974\" data-end=\"1025\"><p data-start=\"976\" data-end=\"1025\"><strong data-start=\"980\" data-end=\"1023\">D\u00e9tecter et \u00e9valuer les menaces \u00e9mergentes<\/strong><\/p><\/li><li data-start=\"1026\" data-end=\"1101\"><p data-start=\"1028\" data-end=\"1101\">Pour <strong data-start=\"1032\" data-end=\"1057\">les alertes pr\u00e9coces<\/strong> d\u2019attaques en cours ou imminentes<\/p><\/li><li data-start=\"1102\" data-end=\"1222\"><p data-start=\"1104\" data-end=\"1222\"><strong data-start=\"1108\" data-end=\"1148\">Enrichir les solutions de s\u00e9curit\u00e9<\/strong> (par exemple, pare-feux, SIEM, protection des points d\u2019extr\u00e9mit\u00e9) avec des indicateurs \u00e0 jour<\/p><\/li><li data-start=\"1223\" data-end=\"1275\"><p data-start=\"1225\" data-end=\"1275\">Pour <strong data-start=\"1233\" data-end=\"1273\">l\u2019\u00e9change avec la communaut\u00e9 de la s\u00e9curit\u00e9<\/strong><\/p><\/li><\/ul><\/div><\/div><\/div><section class=\"Module BlogLatest Background Background--darkBlackBlue\"><div class=\"container\"> <\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85c1acc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"85c1acc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00c9change de menaces ouvertes \u00c9change de menaces ouvertes ou, en anglais Open Threat Exchange (OTX) est une plateforme ouverte pour partager des informations sur les cybermenaces. Il est exploit\u00e9 par la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 AlienVault (d\u00e9sormais int\u00e9gr\u00e9e \u00e0 AT&amp;T Cybersecurity) et est con\u00e7u pour partager rapidement et de mani\u00e8re collaborative des informations sur les attaques, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26718","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00c9change de menaces ouvertes - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00c9change de menaces ouvertes - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"\u00c9change de menaces ouvertes \u00c9change de menaces ouvertes ou, en anglais Open Threat Exchange (OTX) est une plateforme ouverte pour partager des informations sur les cybermenaces. Il est exploit\u00e9 par la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 AlienVault (d\u00e9sormais int\u00e9gr\u00e9e \u00e0 AT&amp;T Cybersecurity) et est con\u00e7u pour partager rapidement et de mani\u00e8re collaborative des informations sur les attaques, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-22T09:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T09:01:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"\u00c9change de menaces ouvertes\",\"datePublished\":\"2022-04-22T09:55:00+00:00\",\"dateModified\":\"2026-03-30T09:01:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/\"},\"wordCount\":229,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/\",\"name\":\"\u00c9change de menaces ouvertes - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-22T09:55:00+00:00\",\"dateModified\":\"2026-03-30T09:01:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/echange-de-menaces-ouvertes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00c9change de menaces ouvertes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00c9change de menaces ouvertes - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/","og_locale":"fr_FR","og_type":"article","og_title":"\u00c9change de menaces ouvertes - Perseus Technologies","og_description":"\u00c9change de menaces ouvertes \u00c9change de menaces ouvertes ou, en anglais Open Threat Exchange (OTX) est une plateforme ouverte pour partager des informations sur les cybermenaces. Il est exploit\u00e9 par la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 AlienVault (d\u00e9sormais int\u00e9gr\u00e9e \u00e0 AT&amp;T Cybersecurity) et est con\u00e7u pour partager rapidement et de mani\u00e8re collaborative des informations sur les attaques, [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-22T09:55:00+00:00","article_modified_time":"2026-03-30T09:01:13+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"\u00c9change de menaces ouvertes","datePublished":"2022-04-22T09:55:00+00:00","dateModified":"2026-03-30T09:01:13+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/"},"wordCount":229,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/","url":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/","name":"\u00c9change de menaces ouvertes - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-22T09:55:00+00:00","dateModified":"2026-03-30T09:01:13+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/echange-de-menaces-ouvertes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"\u00c9change de menaces ouvertes"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26718"}],"version-history":[{"count":3,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26718\/revisions"}],"predecessor-version":[{"id":26721,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26718\/revisions\/26721"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}