{"id":3075,"date":"2025-06-20T13:26:27","date_gmt":"2025-06-20T13:26:27","guid":{"rendered":"https:\/\/phishia.fr\/?p=3075"},"modified":"2025-11-21T15:09:56","modified_gmt":"2025-11-21T15:09:56","slug":"10-simple-tips-for-spotting-e-mail-phishing-and-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/10-simple-tips-for-spotting-e-mail-phishing-and-ransomware-attacks\/","title":{"rendered":"10 simple tips for spotting e-mail attacks (phishing and ransomware)"},"content":{"rendered":"<p>Today, phishing and ransomware have become the favorite weapons of cybercriminals. And their main point of entry is often... our mailbox. However, with a few simple reflexes, it's possible to thwart most of these traps. Here are 10 practical tips for spotting attempted e-mail attacks before it's too late.&nbsp;<\/p>\n\n\n\n<p><strong>1. Always check the sender<\/strong>&nbsp;<\/p>\n\n\n\n<p>One of the first reflexes to adopt is to look carefully at the sender's address. Don't rely solely on the name displayed: this is often the decoy. Check the full address: cybercriminals use addresses close to the original (e.g. micros0ft.com instead of microsoft.com). Also beware of free addresses (gmail, yahoo...) for official companies.&nbsp;<\/p>\n\n\n\n<p><strong>2. Beware of alarmist or urgent messages<\/strong>&nbsp;<\/p>\n\n\n\n<p>Most attacks play on fear and urgency. If the e-mail asks you to act immediately or risk account blocking, loss of access or a fine, take the time to check the message's veracity.&nbsp;<\/p>\n\n\n\n<p><strong>3. Beware of attachments<\/strong>&nbsp;<\/p>\n\n\n\n<p>Attachments are classic vectors for ransomware and malware. Never open an unexpected attachment, even if it appears to come from a known contact. Be especially careful with .exe, .zip, .scr files, or Office documents with macros.&nbsp;<\/p>\n\n\n\n<p><strong>4. Inspect links before clicking<\/strong>&nbsp;<\/p>\n\n\n\n<p>Before clicking on a link, hover your mouse over it to display the actual URL. Check that the domain is that of the official organization. Shortened or slightly modified links should arouse your suspicion.&nbsp;<\/p>\n\n\n\n<p><strong>5. Watch out for spelling mistakes<\/strong>&nbsp;<\/p>\n\n\n\n<p>Even though attacks are becoming increasingly sophisticated, many fraudulent e-mails still contain typos, awkward turns of phrase or approximate translations. This is often a telltale sign.&nbsp;<\/p>\n\n\n\n<p><strong>6. Never send sensitive data by e-mail<\/strong>&nbsp;<\/p>\n\n\n\n<p>No serious organization will ever ask you for your login details, password, credit card number or other sensitive information by e-mail. If they do, it's most likely a phishing attempt.&nbsp;<\/p>\n\n\n\n<p><strong>7. Analyze the signature and tone of the e-mail<\/strong>&nbsp;<\/p>\n\n\n\n<p>The absence of an official signature, verifiable contact details or an unusual tone should tip you off. Compare it with your usual exchanges with your contact.&nbsp;<\/p>\n\n\n\n<p><strong>8. Check content consistency<\/strong>&nbsp;<\/p>\n\n\n\n<p>Always ask yourself if the request makes sense: a supplier asking you to change their bank details, a colleague urgently asking you to validate a payment... Take the time to check via another channel (telephone, direct message).&nbsp;<\/p>\n\n\n\n<p><strong>9. For those in the know: analyze the e-mail headers<\/strong>&nbsp;<\/p>\n\n\n\n<p>Headers contain valuable technical information about the email's path. Suspicious sending servers or unknown IP addresses can betray a spoofing attempt.&nbsp;<\/p>\n\n\n\n<p><strong>10. Use protective tools<\/strong>&nbsp;<\/p>\n\n\n\n<p>Last but not least, don't overlook technical tools such as anti-phishing software, antivirus software, e-mail filters, attachment and link scanners. They are a great help in automatically detecting many threats.&nbsp;<\/p>\n\n\n\n<p>For a more in-depth assessment, don't hesitate to <strong><em><a href=\"https:\/\/phishia.fr\/en\/contact\/\">Contact us<\/a><\/em><\/strong> !<\/p>","protected":false},"excerpt":{"rendered":"<p>Today, phishing and ransomware have become the favorite weapons of cybercriminals. And their main point of entry is often... our mailbox. However, with a few simple reflexes, it's possible to thwart most of these traps. Here are 10 practical tips for spotting attempted email attacks before it's too late.  [...]<\/p>","protected":false},"author":1,"featured_media":3076,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-3075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/10-simple-tips-for-spotting-e-mail-phishing-and-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia\" \/>\n<meta property=\"og:description\" content=\"Aujourd\u2019hui, le phishing et les ransomwares sont devenus les armes favorites des cybercriminels. Et leur point d\u2019entr\u00e9e principal reste souvent\u2026 notre bo\u00eete mail. Pourtant, avec quelques r\u00e9flexes simples, il est possible de d\u00e9jouer la majorit\u00e9 de ces pi\u00e8ges. Voici 10 conseils pratiques pour rep\u00e9rer les tentatives d\u2019attaques par email avant qu&rsquo;il ne soit trop tard.&nbsp; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/10-simple-tips-for-spotting-e-mail-phishing-and-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T13:26:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9-683x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"683\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)\",\"datePublished\":\"2025-06-20T13:26:27+00:00\",\"dateModified\":\"2025-11-21T15:09:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\",\"name\":\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"datePublished\":\"2025-06-20T13:26:27+00:00\",\"dateModified\":\"2025-11-21T15:09:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"width\":1024,\"height\":1536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 simple tips for spotting e-mail attacks (phishing and ransomware) - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/10-simple-tips-for-spotting-e-mail-phishing-and-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia","og_description":"Aujourd\u2019hui, le phishing et les ransomwares sont devenus les armes favorites des cybercriminels. Et leur point d\u2019entr\u00e9e principal reste souvent\u2026 notre bo\u00eete mail. Pourtant, avec quelques r\u00e9flexes simples, il est possible de d\u00e9jouer la majorit\u00e9 de ces pi\u00e8ges. Voici 10 conseils pratiques pour rep\u00e9rer les tentatives d\u2019attaques par email avant qu&rsquo;il ne soit trop tard.&nbsp; [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/10-simple-tips-for-spotting-e-mail-phishing-and-ransomware-attacks\/","og_site_name":"Phishia","article_published_time":"2025-06-20T13:26:27+00:00","article_modified_time":"2025-11-21T15:09:56+00:00","og_image":[{"width":683,"height":1024,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9-683x1024.png","type":"image\/png"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)","datePublished":"2025-06-20T13:26:27+00:00","dateModified":"2025-11-21T15:09:56+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/"},"wordCount":594,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","articleSection":["Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/","name":"10 simple tips for spotting e-mail attacks (phishing and ransomware) - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","datePublished":"2025-06-20T13:26:27+00:00","dateModified":"2025-11-21T15:09:56+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","width":1024,"height":1536},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=3075"}],"version-history":[{"count":1,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3075\/revisions"}],"predecessor-version":[{"id":3077,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3075\/revisions\/3077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/3076"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=3075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=3075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=3075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}