{"id":181,"date":"2025-01-27T18:39:02","date_gmt":"2025-01-27T18:39:02","guid":{"rendered":"https:\/\/phishia.fr\/?p=181"},"modified":"2025-11-21T15:31:47","modified_gmt":"2025-11-21T15:31:47","slug":"emerging-trends-in-cyber-security","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/emerging-trends-in-cyber-security\/","title":{"rendered":"Emerging trends in cybersecurity"},"content":{"rendered":"<p>Cybersecurity is a constantly evolving field, with new threats and challenges emerging every year. In 2024, several major trends are taking shape, shaping the way companies and individuals approach the security of their systems and data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.t6ukmyxv37xn_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a>AI and machine learning<\/h2>\n\n\n\n<p>AI and machine learning continue to transform the field of cybersecurity. Many technology manufacturers have integrated AI to improve their service. This trend will continue to grow in the cybersecurity sector, which sees its use as an important competitive advantage.<\/p>\n\n\n\n<p>We will see the emergence of new technologies, but also the improvement of many existing ones, such as data classification tools powered by AI and machine learning. Security managers will need to keep abreast of the latest developments, and informed of the new capabilities available to them, in order to have the best tools at their disposal.<\/p>\n\n\n\n<p>AI will help us detect, avoid or neutralize threats, moving from reactive measures to proactive strategies, through real-time anomaly detection, intelligent authentication and automated incident response. Cyber defenders will use AI and related technologies to enhance detection, response and attribution of large-scale adversaries, as well as to speed up analysis and other tedious tasks.<\/p>\n\n\n\n<p>Extensive use of AI helps organizations synthesize vast amounts of data and contextualize it into threat intelligence, which then generates actionable detections and analysis.<\/p>\n\n\n\n<p>Cybercriminals' use of AI is constantly evolving, becoming more sophisticated and bypassing existing security defenses. It is crucial, not to say vital, for companies and governments to invest massively in AI-based cybersecurity solutions to protect themselves against unprecedentedly approaching and quantitatively multiplied malicious attacks.<\/p>\n\n\n\n<p>Red Team members and cyber researchers are harnessing generative AI to create innovative cyber defense tools, which could lead to the creation of a machine learning-based digital assistant. This tool could enable the Red Team to automate certain tasks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.cqbk8f3m2vc_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a>Growing importance of data confidentiality<\/h2>\n\n\n\n<p>Data confidentiality has become a major concern for companies and individuals alike. With data breaches on the rise and data protection regulations tightening, it is essential to implement robust security measures to protect sensitive information. By 2024, around 75 % of the world's population will have their personal data protected by privacy regulations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.2dng2kjbsh4z_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a>The rise of zero-trust architectures and approaches<\/h2>\n\n\n\n<p>Zero-trust is a security approach which assumes that no user or device can be considered secure. This approach requires constant verification of identity and authorization before granting access to resources. To understand the Zero Trust architecture, we need to think first of the traditional security architecture in which a person can access the entire corporate network after logging on at work. Protection, limited to the organization's perimeter, is linked to the physical office premises. This model does not allow telecommuting, and exposes the organization to risks, as someone stealing a password could access everything. Instead of protecting only an organization's perimeter, the Zero Trust architecture protects every file, every e-mail and every network by authenticating every identity and every device.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.n2wa301rhov7_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a>Integrating cybersecurity and corporate strategy<\/h2>\n\n\n\n<p>Cybersecurity is no longer seen as an isolated technical concern, but as an essential element of a company's overall strategy. Business leaders increasingly recognize the importance of cybersecurity to their organization's success. Security and risk managers need to redefine the distribution of investments between technological, structural and human elements when designing and implementing their cybersecurity programs.<\/p>\n\n\n\n<p>In today's environment, it is essential for management to be fully involved in the planning and implementation of security measures, so as to dedicate sufficient resources to their implementation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.imt4igol5861_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a>Cyber resilience - beyond cybersecurity<\/h2>\n\n\n\n<p>Cyber resilience goes beyond simply preventing attacks to include the ability to recover quickly and effectively from security incidents. This includes incident preparation, incident response and incident recovery. Unlike cybersecurity, cyber resilience strategies are designed to ensure business continuity, even in the event of a successful breach. These strategies aim to ensure rapid recovery with minimal data loss.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.r2ev0jb0hfc0_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/emerging-trends-in-cyber-security\/\"><\/a>Cybersecurity threats on the rise<\/h2>\n\n\n\n<p>In 2024, cyberthreat actors will rely heavily on sophisticated attacks that have demonstrated a good success rate and return on investment (ROI) in the past. Among the cybersecurity threats in vogue in 2024 are ransomware, supply chain attacks and multi-vector attacks. Multi-vector attacks combine several techniques and attack vectors within a single cyberattack campaign. Cyberthreat actors use these tactics because they make attacks harder to detect and contain, thus increasing the probability of success.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a constantly evolving field, with new threats and challenges emerging every year. In 2024, several major trends are emerging, shaping the way companies and individuals approach the security of their systems and data. AI and machine learning AI and machine learning continue to transform [...]<\/p>","protected":false},"author":1,"featured_media":226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/emerging-trends-in-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9 - Phishia\" \/>\n<meta property=\"og:description\" content=\"La cybers\u00e9curit\u00e9 est un domaine en constante \u00e9volution, avec de nouvelles menaces et d\u00e9fis qui apparaissent chaque ann\u00e9e. En 2024, plusieurs tendances majeures se dessinent, fa\u00e7onnant la mani\u00e8re dont les entreprises et les individus abordent la s\u00e9curit\u00e9 de leurs syst\u00e8mes et de leurs donn\u00e9es. L\u2019IA et l\u2019apprentissage automatique L&rsquo;IA et l&rsquo;apprentissage automatique continuent de transformer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/emerging-trends-in-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T18:39:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:31:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9\",\"datePublished\":\"2025-01-27T18:39:02+00:00\",\"dateModified\":\"2025-11-21T15:31:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/\"},\"wordCount\":1072,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-9.jpg\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/\",\"name\":\"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-9.jpg\",\"datePublished\":\"2025-01-27T18:39:02+00:00\",\"dateModified\":\"2025-11-21T15:31:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-9.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Untitled-9.jpg\",\"width\":1280,\"height\":719},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/les-tendances-emergentes-en-cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging trends in cybersecurity - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/emerging-trends-in-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9 - Phishia","og_description":"La cybers\u00e9curit\u00e9 est un domaine en constante \u00e9volution, avec de nouvelles menaces et d\u00e9fis qui apparaissent chaque ann\u00e9e. En 2024, plusieurs tendances majeures se dessinent, fa\u00e7onnant la mani\u00e8re dont les entreprises et les individus abordent la s\u00e9curit\u00e9 de leurs syst\u00e8mes et de leurs donn\u00e9es. L\u2019IA et l\u2019apprentissage automatique L&rsquo;IA et l&rsquo;apprentissage automatique continuent de transformer [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/emerging-trends-in-cyber-security\/","og_site_name":"Phishia","article_published_time":"2025-01-27T18:39:02+00:00","article_modified_time":"2025-11-21T15:31:47+00:00","og_image":[{"width":1280,"height":719,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-9.jpg","type":"image\/jpeg"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9","datePublished":"2025-01-27T18:39:02+00:00","dateModified":"2025-11-21T15:31:47+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/"},"wordCount":1072,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-9.jpg","articleSection":["Surveillance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/","name":"Emerging trends in cybersecurity - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-9.jpg","datePublished":"2025-01-27T18:39:02+00:00","dateModified":"2025-11-21T15:31:47+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-9.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-9.jpg","width":1280,"height":719},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/les-tendances-emergentes-en-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Les tendances \u00e9mergentes en cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=181"}],"version-history":[{"count":7,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/181\/revisions"}],"predecessor-version":[{"id":2490,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/181\/revisions\/2490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/226"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}