{"id":183,"date":"2025-01-27T18:39:29","date_gmt":"2025-01-27T18:39:29","guid":{"rendered":"https:\/\/phishia.fr\/?p=183"},"modified":"2025-11-21T15:14:29","modified_gmt":"2025-11-21T15:14:29","slug":"artificial-intelligence-for-cyber-security","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/artificial-intelligence-for-cyber-security\/","title":{"rendered":"Artificial Intelligence for Cybersecurity"},"content":{"rendered":"<p>In this article, we'll explore the growing role of artificial intelligence (AI) in cybersecurity. We'll look at recent advances in the use of AI to detect and prevent cyberattacks, as well as the challenges facing IT security professionals in adopting this technology.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.oi43h69gizep_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a>AI advances in Cybersecurity<\/h2>\n\n\n\n<p>Artificial intelligence offers a wealth of possibilities for enhancing the security of IT systems. Machine learning and deep learning algorithms can analyze vast quantities of data to detect suspicious behavior, identify anomalies and prevent cyberattacks before they occur. What's more, AI can automate certain security tasks, such as log management and incident response, enabling security teams to focus on the most critical threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.6ppk06799o27_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a>Challenges to overcome<\/h2>\n\n\n\n<p>To counter the threats associated with the use of AI in cybersecurity, organizations need to be aware of the specific risks associated with this technology. Machine learning and deep learning algorithms used in AI systems can be vulnerable to various forms of attack, including data injection attack, adversary attack and bias attack.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The data injection attack<\/strong>\u00a0involves the manipulation of data used to train an AI model, with the aim of disrupting its operation or misleading it. For example, by introducing malicious data into a dataset used to train a malware detection model, an attacker could compromise the model's effectiveness and allow malware to go undetected.<\/li>\n\n\n\n<li><strong>Attack by opponent<\/strong>\u00a0aims to disrupt the operation of an AI model by deliberately modifying its inputs. For example, by adding noise or slightly modifying an image, an attacker could mislead an image recognition system into making erroneous decisions.<\/li>\n\n\n\n<li><strong>The bias attack<\/strong>\u00a0occurs when AI models produce inaccurate or discriminatory results due to biases in the training data. For example, an AI-based recruitment model could reproduce existing biases in training data and favor some candidates over others, with potentially adverse consequences in terms of equity and diversity.<\/li>\n<\/ul>\n\n\n\n<p>To counter these risks, organizations need to implement robust safety measures throughout the lifecycle of AI systems. This includes collecting and validating high-quality data, implementing regularization techniques to reduce the risk of overlearning, and rigorously validating models to detect abnormal behavior or bias. In addition, organizations need to be aware of the limitations and potential vulnerabilities of AI systems, and put in place appropriate monitoring and response mechanisms to mitigate the risks associated with their use. By taking these preventive measures, organizations can use AI safely and effectively to strengthen their security posture and protect their data and systems from digital threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.vwt02o1bxsax_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a>Measures to counter threats<\/h2>\n\n\n\n<p>To counter the threats associated with the use of AI in cybersecurity, organizations need to adopt a proactive, multi-layered approach.&nbsp;<\/p>\n\n\n\n<p>First of all, it's crucial to invest in advanced AI-based security solutions. These tools can detect and block sophisticated attacks in real time, using machine learning algorithms to analyze network traffic, user behavior and potential anomalies.&nbsp;<\/p>\n\n\n\n<p>What's more, security teams need to keep constantly abreast of the latest trends in cybersecurity and the techniques used by cybercriminals. This requires&nbsp;<a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/awareness-training\/\">regular training and threat awareness,<\/a>&nbsp;so that security professionals can detect and respond effectively to new attacks.&nbsp;<\/p>\n\n\n\n<p>Finally, a multi-layered approach to security is essential. This includes&nbsp;<a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/safety-policies-internal-charters\/\">implementation of robust security policies<\/a>These preventive measures enable organizations to strengthen their security posture and reduce the risks associated with the use of AI in cybersecurity. By combining these preventive measures, organizations can strengthen their security posture and reduce the risks associated with the use of AI in cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.4pqr2k7c6iq1_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/artificial-intelligence-for-cyber-security\/\"><\/a>Future prospects<\/h2>\n\n\n\n<p>Despite these challenges, AI continues to play a crucial role in the future of cybersecurity. Advances in AI techniques, combined with close collaboration between researchers, companies and government agencies, offer new opportunities to strengthen the resilience of IT infrastructures in the face of digital threats. By exploring the advances and challenges of AI in cybersecurity, we can better understand how this technology can be used to protect our data and systems from cyberattacks.<\/p>","protected":false},"excerpt":{"rendered":"<p>In this article, we'll explore the growing role of artificial intelligence (AI) in cybersecurity. We'll look at recent advances in the use of AI to detect and prevent cyber attacks, as well as the challenges facing IT security professionals in adopting this technology. Advances in AI in [...]<\/p>","protected":false},"author":1,"featured_media":230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L&#039;Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/artificial-intelligence-for-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9 - Phishia\" \/>\n<meta property=\"og:description\" content=\"Dans cet article, nous explorerons le r\u00f4le croissant de l&rsquo;intelligence artificielle (IA) dans le domaine de la cybers\u00e9curit\u00e9. Nous examinerons les avanc\u00e9es r\u00e9centes dans l&rsquo;utilisation de l&rsquo;IA pour d\u00e9tecter et pr\u00e9venir les cyberattaques, ainsi que les d\u00e9fis auxquels sont confront\u00e9s les professionnels de la s\u00e9curit\u00e9 informatique dans l&rsquo;adoption de cette technologie. Avanc\u00e9es de l&rsquo;IA en [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/artificial-intelligence-for-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T18:39:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:14:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"L&rsquo;Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9\",\"datePublished\":\"2025-01-27T18:39:29+00:00\",\"dateModified\":\"2025-11-21T15:14:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/\"},\"wordCount\":975,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/\",\"url\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/\",\"name\":\"L'Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9 - Phishia\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg\",\"datePublished\":\"2025-01-27T18:39:29+00:00\",\"dateModified\":\"2025-11-21T15:14:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/phishia.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"L&rsquo;Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/phishia.fr\/#website\",\"url\":\"https:\/\/phishia.fr\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/phishia.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/phishia.fr\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\/\/phishia.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/phishia\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\/\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Intelligence for Cybersecurity - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/artificial-intelligence-for-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"L'Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9 - Phishia","og_description":"Dans cet article, nous explorerons le r\u00f4le croissant de l&rsquo;intelligence artificielle (IA) dans le domaine de la cybers\u00e9curit\u00e9. Nous examinerons les avanc\u00e9es r\u00e9centes dans l&rsquo;utilisation de l&rsquo;IA pour d\u00e9tecter et pr\u00e9venir les cyberattaques, ainsi que les d\u00e9fis auxquels sont confront\u00e9s les professionnels de la s\u00e9curit\u00e9 informatique dans l&rsquo;adoption de cette technologie. Avanc\u00e9es de l&rsquo;IA en [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/artificial-intelligence-for-cyber-security\/","og_site_name":"Phishia","article_published_time":"2025-01-27T18:39:29+00:00","article_modified_time":"2025-11-21T15:14:29+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg","type":"image\/jpeg"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"L&rsquo;Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9","datePublished":"2025-01-27T18:39:29+00:00","dateModified":"2025-11-21T15:14:29+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/"},"wordCount":975,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/","name":"Artificial Intelligence for Cybersecurity - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg","datePublished":"2025-01-27T18:39:29+00:00","dateModified":"2025-11-21T15:14:29+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-tara-winstead-8386440.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/lintelligence-artificielle-au-service-de-la-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"L&rsquo;Intelligence Artificielle au Service de la Cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":7,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"predecessor-version":[{"id":2715,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/183\/revisions\/2715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/230"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}