{"id":3075,"date":"2025-06-20T13:26:27","date_gmt":"2025-06-20T13:26:27","guid":{"rendered":"https:\/\/phishia.fr\/?p=3075"},"modified":"2025-11-21T15:09:56","modified_gmt":"2025-11-21T15:09:56","slug":"10-semplici-consigli-per-individuare-gli-attacchi-di-phishing-e-ransomware","status":"publish","type":"post","link":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/10-semplici-consigli-per-individuare-gli-attacchi-di-phishing-e-ransomware\/","title":{"rendered":"10 semplici consigli per individuare gli attacchi via e-mail (phishing e ransomware)"},"content":{"rendered":"<p>Oggi il phishing e il ransomware sono diventati le armi preferite dei criminali informatici. E il loro principale punto di accesso \u00e8 spesso... la nostra casella di posta elettronica. Tuttavia, con alcuni semplici riflessi, \u00e8 possibile sventare la maggior parte di queste trappole. Ecco 10 consigli pratici per individuare i tentativi di attacco via e-mail prima che sia troppo tardi.&nbsp;<\/p>\n\n\n\n<p><strong>1. Controllare sempre il mittente<\/strong>&nbsp;<\/p>\n\n\n\n<p>Uno dei primi riflessi da adottare \u00e8 quello di osservare attentamente l'indirizzo del mittente. Non basatevi solo sul nome visualizzato: spesso si tratta di un'esca. Controllate l'indirizzo completo: i criminali informatici utilizzano indirizzi che si avvicinano all'originale (ad esempio micros0ft.com invece di microsoft.com). Fate attenzione anche agli indirizzi gratuiti (gmail, yahoo...) di aziende ufficiali.&nbsp;<\/p>\n\n\n\n<p><strong>2. Attenzione ai messaggi allarmistici o urgenti<\/strong>&nbsp;<\/p>\n\n\n\n<p>La maggior parte degli attacchi si basa sulla paura e sull'urgenza. Se l'e-mail vi chiede di agire immediatamente, pena il blocco dell'account, la perdita dell'accesso o una multa, prendetevi il tempo necessario per verificare che il messaggio sia autentico.&nbsp;<\/p>\n\n\n\n<p><strong>3. Attenzione agli allegati<\/strong>&nbsp;<\/p>\n\n\n\n<p>Gli allegati sono classici vettori di ransomware e malware. Non aprite mai un allegato inaspettato, anche se sembra provenire da un contatto conosciuto. Fate particolare attenzione ai file .exe, .zip, .scr o ai documenti Office con macro.&nbsp;<\/p>\n\n\n\n<p><strong>4. Ispezionare i link prima di fare clic<\/strong>&nbsp;<\/p>\n\n\n\n<p>Prima di cliccare su un link, passateci sopra il mouse per visualizzare l'URL reale. Verificate che il dominio sia effettivamente quello dell'organizzazione ufficiale. I link accorciati o leggermente modificati devono destare sospetto.&nbsp;<\/p>\n\n\n\n<p><strong>5. Attenzione agli errori di ortografia<\/strong>&nbsp;<\/p>\n\n\n\n<p>Anche se gli attacchi stanno diventando sempre pi\u00f9 sofisticati, molte e-mail fraudolente contengono ancora errori di battitura, giri di parole imbarazzanti o traduzioni approssimative. Questo \u00e8 spesso un segnale rivelatore.&nbsp;<\/p>\n\n\n\n<p><strong>6. Non inviare mai informazioni sensibili via e-mail<\/strong>&nbsp;<\/p>\n\n\n\n<p>Nessuna organizzazione seria vi chieder\u00e0 mai i vostri dati di accesso, la password, il numero di carta di credito o altre informazioni sensibili via e-mail. Se questo \u00e8 il caso, molto probabilmente si tratta di un tentativo di phishing.&nbsp;<\/p>\n\n\n\n<p><strong>7. Analizzare la firma e il tono dell'e-mail<\/strong>&nbsp;<\/p>\n\n\n\n<p>L'assenza di una firma ufficiale, di dati di contatto verificabili o di un tono insolito dovrebbero farvi pensare. Confrontatela con gli scambi abituali con il vostro interlocutore.&nbsp;<\/p>\n\n\n\n<p><strong>8. Verificare la coerenza dei contenuti<\/strong>&nbsp;<\/p>\n\n\n\n<p>Chiedetevi sempre se la richiesta ha senso: un fornitore che vi chiede di cambiare i suoi dati bancari, un collega che vi chiede urgentemente di convalidare un pagamento, ecc.&nbsp;<\/p>\n\n\n\n<p><strong>9. Per chi \u00e8 esperto: analizzare le intestazioni delle e-mail<\/strong>&nbsp;<\/p>\n\n\n\n<p>Le intestazioni contengono preziose informazioni tecniche sul percorso dell'e-mail. Server di invio sospetti o indirizzi IP sconosciuti possono tradire un tentativo di spoofing.&nbsp;<\/p>\n\n\n\n<p><strong>10. Utilizzare strumenti di protezione<\/strong>&nbsp;<\/p>\n\n\n\n<p>Infine, non trascurate gli strumenti tecnici: software anti-phishing, software anti-virus, filtri e-mail, scanner di allegati e link. Sono di grande aiuto nel rilevare automaticamente molte minacce.&nbsp;<\/p>\n\n\n\n<p>Per una valutazione pi\u00f9 approfondita, contattare <strong><em><a href=\"https:\/\/phishia.fr\/it\/contatto\/\">contattateci<\/a><\/em><\/strong> !<\/p>","protected":false},"excerpt":{"rendered":"<p>Oggi il phishing e il ransomware sono diventati le armi preferite dei criminali informatici. E il loro principale punto di accesso \u00e8 spesso... la nostra casella di posta elettronica. Tuttavia, con alcuni semplici riflessi, \u00e8 possibile sventare la maggior parte di queste trappole. Ecco 10 consigli pratici per individuare i tentativi di attacco via e-mail prima che sia troppo tardi.  [...]<\/p>","protected":false},"author":1,"featured_media":3076,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-3075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/10-semplici-consigli-per-individuare-gli-attacchi-di-phishing-e-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia\" \/>\n<meta property=\"og:description\" content=\"Aujourd\u2019hui, le phishing et les ransomwares sont devenus les armes favorites des cybercriminels. Et leur point d\u2019entr\u00e9e principal reste souvent\u2026 notre bo\u00eete mail. Pourtant, avec quelques r\u00e9flexes simples, il est possible de d\u00e9jouer la majorit\u00e9 de ces pi\u00e8ges. Voici 10 conseils pratiques pour rep\u00e9rer les tentatives d\u2019attaques par email avant qu&rsquo;il ne soit trop tard.&nbsp; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/10-semplici-consigli-per-individuare-gli-attacchi-di-phishing-e-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T13:26:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9-683x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"683\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)\",\"datePublished\":\"2025-06-20T13:26:27+00:00\",\"dateModified\":\"2025-11-21T15:09:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\",\"name\":\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"datePublished\":\"2025-06-20T13:26:27+00:00\",\"dateModified\":\"2025-11-21T15:09:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png\",\"width\":1024,\"height\":1536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 semplici consigli per individuare gli attacchi via e-mail (phishing e ransomware) - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/10-semplici-consigli-per-individuare-gli-attacchi-di-phishing-e-ransomware\/","og_locale":"it_IT","og_type":"article","og_title":"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware) - Phishia","og_description":"Aujourd\u2019hui, le phishing et les ransomwares sont devenus les armes favorites des cybercriminels. Et leur point d\u2019entr\u00e9e principal reste souvent\u2026 notre bo\u00eete mail. Pourtant, avec quelques r\u00e9flexes simples, il est possible de d\u00e9jouer la majorit\u00e9 de ces pi\u00e8ges. Voici 10 conseils pratiques pour rep\u00e9rer les tentatives d\u2019attaques par email avant qu&rsquo;il ne soit trop tard.&nbsp; [&hellip;]","og_url":"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/10-semplici-consigli-per-individuare-gli-attacchi-di-phishing-e-ransomware\/","og_site_name":"Phishia","article_published_time":"2025-06-20T13:26:27+00:00","article_modified_time":"2025-11-21T15:09:56+00:00","og_image":[{"width":683,"height":1024,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9-683x1024.png","type":"image\/png"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Hugo Lanier","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)","datePublished":"2025-06-20T13:26:27+00:00","dateModified":"2025-11-21T15:09:56+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/"},"wordCount":594,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","articleSection":["Surveillance"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/","name":"10 semplici consigli per individuare gli attacchi via e-mail (phishing e ransomware) - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","datePublished":"2025-06-20T13:26:27+00:00","dateModified":"2025-11-21T15:09:56+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1524_Phishing-et-Ransomware_simple_compose_01jy6r3kjgfwfvrs79fmgknmg9.png","width":1024,"height":1536},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/10-conseils-simples-pour-reperer-les-attaques-par-mail-phishing-et-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"10 conseils simples pour rep\u00e9rer les attaques par mail (phishing et ransomware)"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"Consulenza informatica, sicurezza informatica, sostenibilit\u00e0","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/comments?post=3075"}],"version-history":[{"count":1,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3075\/revisions"}],"predecessor-version":[{"id":3077,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3075\/revisions\/3077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media\/3076"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media?parent=3075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/categories?post=3075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/tags?post=3075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}