{"id":343,"date":"2018-03-29T08:00:18","date_gmt":"2018-03-29T06:00:18","guid":{"rendered":"http:\/\/pragma-security.com\/?p=343"},"modified":"2018-09-06T14:04:25","modified_gmt":"2018-09-06T12:04:25","slug":"qrator-labs-rapport-annuel-cybersecurite-2017","status":"publish","type":"post","link":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/","title":{"rendered":"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"343\" class=\"elementor elementor-343 elementor-bc-flex-widget\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6dd67b0a elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"6dd67b0a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-532fe706\" data-id=\"532fe706\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d8134 elementor-widget elementor-widget-spacer\" data-id=\"12d8134\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22bafa7 elementor-widget elementor-widget-heading\" data-id=\"22bafa7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">Rapport sur la cybers\u00e9curit\u00e9 en 2017<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-563f9e9d elementor-widget elementor-widget-text-editor\" data-id=\"563f9e9d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<h4>Comme chaque ann\u00e9e, notre partenaire Qrator Labs publie son rapport annuel sur la cybers\u00e9curit\u00e9, en collaboration avec l&rsquo;entreprise Wallarm. En 2017, les m\u00e9thodes d&rsquo;attaques se sont multipli\u00e9es, entra\u00eenant une diversification accrue des menaces. Les malfaiteurs ont aujourd&rsquo;hui l&#8217;embarras du choix dans les proc\u00e9d\u00e9s d&rsquo;exploitation des vuln\u00e9rabilit\u00e9s r\u00e9seau. A quelles menaces s&rsquo;attendre en 2018?<\/h4><p>Si 2016 fut l&rsquo;ann\u00e9e des botnets et des attaques par t\u00e9rabits, 2017 s&rsquo;est r\u00e9v\u00e9l\u00e9e \u00eatre l&rsquo;ann\u00e9e des <strong>ransomware<\/strong> et des incidents de routage. Parmi ces incidents reviennent \u00e0 l&rsquo;esprit ceux de\u00a0<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/bgpmon.net\/bgp-leak-causing-internet-outages-in-japan-and-beyond\/\" target=\"_blank\" rel=\"nofollow noopener\" data-href=\"https:\/\/bgpmon.net\/bgp-leak-causing-internet-outages-in-japan-and-beyond\/\">Google<\/a>\u00a0au Japon,\u00a0<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/radar.qrator.net\/blog\/no-no-no-export\" target=\"_blank\" rel=\"nofollow noopener\" data-href=\"https:\/\/radar.qrator.net\/blog\/no-no-no-export\">Level3<\/a>\u00a0aux Etats-Unis ou encore\u00a0<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/arstechnica.com\/information-technology\/2017\/04\/russian-controlled-telecom-hijacks-financial-services-internet-traffic\/\" target=\"_blank\" rel=\"nofollow noopener\" data-href=\"https:\/\/arstechnica.com\/information-technology\/2017\/04\/russian-controlled-telecom-hijacks-financial-services-internet-traffic\/\">Rostelecom<\/a>\u00a0en Russie pour n&rsquo;en citer que quelques uns. Bien d&rsquo;autres exemples d\u00e9montrent que le risque humain persiste et que l&rsquo;automatisation reste insuffisante. En annulant un script, un seul ing\u00e9nieur est capable de causer de graves interruptions de services sur Internet.\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c90d79 elementor-widget elementor-widget-image\" data-id=\"7c90d79\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"426\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Nombre-attaques-Qrator-Labs-768x426.png\" class=\"attachment-medium_large size-medium_large wp-image-378\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Nombre-attaques-Qrator-Labs-768x426.png 768w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Nombre-attaques-Qrator-Labs-300x166.png 300w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Nombre-attaques-Qrator-Labs-e1522099934345.png 700w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-978146e elementor-widget elementor-widget-text-editor\" data-id=\"978146e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Evolution du nombre d&rsquo;attaques par segments 2017-2018<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8d1cff elementor-widget elementor-widget-spacer\" data-id=\"e8d1cff\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5697e042 elementor-widget elementor-widget-text-editor\" data-id=\"5697e042\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p style=\"font-weight: 300;\"><em>De nombreux appareils <strong>IoT<\/strong> sont d\u00e9tourn\u00e9s via l&rsquo;exploitation de failles banales, comme celles li\u00e9es \u00e0 l&rsquo;interface web utilisateur.\u00a0 Presque toutes ces failles sont critiques mais les \u00e9quipementiers et fournisseurs ont peu d&rsquo;options pour y rem\u00e9dier: le correctif et la mise \u00e0 jour prennent du temps.<\/em><\/p><p data-scroll=\"native\">Depuis que <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Mirai_(logiciel_malveillant)\" target=\"_blank\" rel=\"noopener\">Mirai<\/a> est devenue une m\u00e9thode standard d&rsquo;intrusion par <strong>botnets<\/strong> en 2017, les intrusions IoT sont en pleine croissance. Mirai reprend dans son code les id\u00e9es d&rsquo;une vague pr\u00e9c\u00e9dente de botnets.\u00a0<\/p><p data-scroll=\"native\">Nous pouvons nous attendre \u00e0 davantage de botnets, tel que\u00a0<a href=\"https:\/\/www.armis.com\/blueborne\/\" target=\"_blank\" rel=\"nofollow noopener\" data-href=\"https:\/\/www.armis.com\/blueborne\/\">BlueBorne<\/a>, plus nombreux et d&rsquo;une plus grande \u00e9chelle. Plus dangereux et plus robustes \u00e9galement.\u00a0Dans un futur proche, il est \u00e0 parier que de nouveaux types de botnets, con\u00e7us pour de plus petits objets comme les montres intelligentes, verront le jour. Nous nous attendons \u00e9galement \u00e0 voir la distribution de botnets massifs capables de se r\u00e9pandre sans le recours \u00e0 un protocole d&rsquo;amplification.<\/p><blockquote data-scroll=\"native\"><p>Les attaques sur la couche applicative (niveau 7) restent toujours aussi dangereuses.\u00a0<\/p><\/blockquote><p data-scroll=\"native\">Si vous \u00eates une entreprise ayant un acc\u00e8s Internet d\u00e9di\u00e9 vers votre fournisseur de services, vous verrez, t\u00f4t ou tard, l&rsquo;exploitation d&rsquo;\u00e9quipements mal s\u00e9curis\u00e9s Nous pouvons \u00e9voquer des \u00e9quipements comme votre CPE ou les objets IoT que vous pourriez utiliser dans les locaux de votre entreprise.<\/p><p data-scroll=\"native\">En 2017 les botnets s&rsquo;appuyant sur Windows ont continu\u00e9 \u00e0 s\u00e9vir. Les effets de <strong>WannaCry<\/strong>, Petya et NotPetya pouvaient \u00eatre recr\u00e9\u00e9s dans le cadre d&rsquo;une attaque DDoS. Qrator Labs pr\u00e9voit d&rsquo;ailleurs que la mont\u00e9e en puissance des botnets marque un tournant: de nouvelles versions de r\u00e9seaux malicieux vont attaquer Internet.\u00a0<\/p><p data-scroll=\"native\">L&rsquo;ann\u00e9e derni\u00e8re, les attaques par botnets Windows ont atteint des niveaux de bande-passante sup\u00e9rieurs \u00e0 1 T\u00e9rabit\/s. On peut donc s&rsquo;attendre \u00e0 des attaques de niveau applicatif d&rsquo;une volum\u00e9trie de 100Gbit\/s et plus en 2018.\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cabd6f elementor-widget elementor-widget-heading\" data-id=\"2cabd6f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-large\"><h3 class=\"elementor-image-box-title elementor-inline-editing pen\" data-elementor-setting-key=\"title_text\" data-elementor-inline-editing-toolbar=\"none\" data-pen-placeholder=\"\u00c9crivez ici...\" style=\"font-family: Roboto, sans-serif; letter-spacing: normal; font-weight: 500; font-size: 27px;\">Infrastructure obsol\u00e8te<\/h3>\n<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19be3708 elementor-widget elementor-widget-text-editor\" data-id=\"19be3708\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p data-scroll=\"native\">En 2017, les incidents de routage ont vol\u00e9 la vedette aux botnets, rendus c\u00e9l\u00e8bres en 2016. Une attaque DDoS r\u00e9ussie pouvait tout aussi bien rendre indisponible une seule ressource ou application web, que mettre \u00e0 terre l&rsquo;ensemble d&rsquo;un \u00e9cosyst\u00e8me d&rsquo;infrastructures, voire l&rsquo;internet d&rsquo;un pays entier.\u00a0<\/p><p data-scroll=\"native\"><strong>L&rsquo;incident r\u00e9seau entre Google et le Japon est peut-\u00eatre le r\u00e9sultat le plus grave d&rsquo;une mauvaise configuration par un fournisseur de contenu.\u00a0<\/strong><\/p><p data-scroll=\"native\">Les dommages possibles via BGP sont \u00e9lev\u00e9s. Partant du fait que, dans une grande majorit\u00e9 de cas, chaque op\u00e9rateur de r\u00e9seau public (autonomous system) g\u00e8re le trafic et l&rsquo;administration de son r\u00e9seau ind\u00e9pendamment des autres, au-del\u00e0 du probl\u00e8me de latence due \u00e0 une erreur de configuration d&rsquo;un acteur, la possibilit\u00e9 d&rsquo;attaques de type Man in the Middle sur du trafic chiffr\u00e9 est parfaitement possible (notamment via le BGP hijack). De tels incidents peuvent affecter des millions d&rsquo;utilisateurs.\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4458cf3 elementor-widget elementor-widget-image\" data-id=\"4458cf3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"478\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Bande-passante-par-attaque-768x478.png\" class=\"attachment-medium_large size-medium_large wp-image-381\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Bande-passante-par-attaque-768x478.png 768w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Bande-passante-par-attaque-300x187.png 300w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Bande-passante-par-attaque.png 790w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1959417 elementor-widget elementor-widget-spacer\" data-id=\"1959417\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1c06ae elementor-widget elementor-widget-text-editor\" data-id=\"d1c06ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>R\u00e9partition des attaques par tranches de trafic<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40179f60 elementor-widget elementor-widget-heading\" data-id=\"40179f60\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-large\"><h3 class=\"elementor-image-box-title elementor-inline-editing pen\" data-elementor-setting-key=\"title_text\" data-elementor-inline-editing-toolbar=\"none\" data-pen-placeholder=\"\u00c9crivez ici...\" style=\"font-family: Roboto, sans-serif; letter-spacing: normal; font-weight: 500; font-size: 27px;\">Intranet<\/h3><\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-756e5e32 elementor-widget elementor-widget-text-editor\" data-id=\"756e5e32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p data-scroll=\"native\">Le <strong>Cloud<\/strong> est un syst\u00e8me vuln\u00e9rable qui pose des probl\u00e8mes majeurs avec les nouvelles technologies. Les cl\u00e9s Amazon expos\u00e9es publiquement sur Github et ailleurs sont notamment \u00e0 l&rsquo;origine des fuites de Uber et OneLogin .<\/p><p>MongoDB, Cassandra, <strong>Memcached<\/strong> et les autres bases de donn\u00e9es actuelles pr\u00e9sentent un autre probl\u00e8me. Lorsque les administrateurs oublient de d\u00e9finir un niveau de s\u00e9curit\u00e9 appropri\u00e9, les malfaiteurs y trouvent des failles. Comme ce fut le cas avec le clavier du smartphone Ai.Type qui a men\u00e9 \u00e0 la perte de donn\u00e9es de 31 millions d&rsquo;utilisateurs.<\/p><blockquote data-scroll=\"native\"><p>2017 a d\u00e9montr\u00e9 que diff\u00e9rents types d&rsquo;\u00e9quipements pouvaient \u00eatre vuln\u00e9rables \u00e0 de nombreux types d&rsquo;attaques. Il faut s&rsquo;attendre \u00e0 davantage d&rsquo;incidents li\u00e9s \u00e0 des logiciels et des \u00e9quipements d\u00e9pass\u00e9s.\u00a0<\/p><\/blockquote>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ac9a61 elementor-widget elementor-widget-image\" data-id=\"3ac9a61\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"466\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/La-dur\u00e9e-des-attaques-DDoS-en-2017-768x466.png\" class=\"attachment-medium_large size-medium_large wp-image-382\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/La-dur\u00e9e-des-attaques-DDoS-en-2017-768x466.png 768w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/La-dur\u00e9e-des-attaques-DDoS-en-2017-300x182.png 300w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/La-dur\u00e9e-des-attaques-DDoS-en-2017.png 838w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d6ea0e elementor-widget elementor-widget-text-editor\" data-id=\"1d6ea0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>R\u00e9partition des attaques par dur\u00e9e<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d367ed7 elementor-widget elementor-widget-heading\" data-id=\"d367ed7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><h4 class=\"elementor-image-box-title elementor-inline-editing pen\" data-elementor-setting-key=\"title_text\" data-elementor-inline-editing-toolbar=\"none\" data-pen-placeholder=\"\u00c9crivez ici...\" style=\"font-family: Roboto, sans-serif; letter-spacing: normal; font-weight: 500; font-size: 27px;\">Cryptomania<\/h4>\n<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebafc29 elementor-widget elementor-widget-text-editor\" data-id=\"ebafc29\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Un tout nouveau march\u00e9 de hacks <strong>ICO<\/strong> s&rsquo;est d\u00e9velopp\u00e9 en 2017. La tendance \u00e0 attaquer une organisation lors de son introduction sur le march\u00e9 persiste. Diverses startups de <strong>crypto-monnaie <\/strong>en ont fait les frais<strong>.\u00a0<\/strong>Les attaques prennent la forme de hacks ou DDoS, et souvent les deux vecteurs d&rsquo;attaques sont combin\u00e9s. Si le march\u00e9 de ICO continue son d\u00e9veloppement, les attaques devraient suivre.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f883fe elementor-widget elementor-widget-heading\" data-id=\"1f883fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h4 class=\"elementor-image-box-title elementor-inline-editing pen\" data-elementor-setting-key=\"title_text\" data-elementor-inline-editing-toolbar=\"none\" data-pen-placeholder=\"\u00c9crivez ici...\" style=\"font-family: Roboto, sans-serif; letter-spacing: normal; font-weight: 500; font-size: 27px;\">Le mot de la fin<\/h4><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce8f99c elementor-widget elementor-widget-text-editor\" data-id=\"ce8f99c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p id=\"6393\" class=\"graf graf--p graf-after--h3\" data-scroll=\"native\">Face \u00e0 ces nouvelles menaces, nos clients ont besoin d&rsquo;un meilleur contr\u00f4le de leur syst\u00e8me de d\u00e9fense. A travers l&rsquo;usage d&rsquo;<strong>APIs (Application Programming Interface), <\/strong>nos solutions\u00a0permettent d&rsquo;exercer un meilleur contr\u00f4le sur le nettoyage et le filtrage du trafic. Il est possible d&rsquo;automatiser des logiques de contre-mesure et d&rsquo;adapter le filtrage sur la base du comportement des couches applicatives.<\/p><p id=\"425e\" class=\"graf graf--p graf-after--p\" data-scroll=\"native\">Il est \u00e0 noter que les fournisseurs de solutions de cybers\u00e9curit\u00e9 commencent \u00e0 mieux coop\u00e9rer afin de pouvoir rem\u00e9dier aux attaques de grandes ampleurs comme celles des botnets. Lorsque ces attaques menacent des industries enti\u00e8res et non plus juste quelques entreprises, la coop\u00e9ration se forme \u00e0 de nombreux niveaux. Cette coop\u00e9ration peut se faire de fa\u00e7on formelle, informelle, entre partenaires, ou encore avec les clients. Cette relation entre acteurs de l&rsquo;internet nous a permis quelques succ\u00e8s dans \u00e9limination de botnets en 2017. Nous esp\u00e9rons r\u00e9it\u00e9rer ce type de succ\u00e8s \u00e0 l&rsquo;avenir.\u00a0<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72a8bdd elementor-widget elementor-widget-spacer\" data-id=\"72a8bdd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-606dd35 elementor-widget elementor-widget-image\" data-id=\"606dd35\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"245\" height=\"300\" src=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/QRator-labs-2017-report-245x300.png\" class=\"attachment-medium size-medium wp-image-377\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/QRator-labs-2017-report-245x300.png 245w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/QRator-labs-2017-report-628x768.png 628w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/QRator-labs-2017-report-838x1024.png 838w, https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/QRator-labs-2017-report.png 1192w\" sizes=\"(max-width: 245px) 100vw, 245px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13deebf elementor-widget elementor-widget-spacer\" data-id=\"13deebf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e65443a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e65443a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/qrator.net\/presentations\/QratorAnnualRepEng.pdf\" class=\"elementor-button-link elementor-button elementor-size-lg\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-book\" aria-hidden=\"true\"><\/i>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">T\u00e9l\u00e9charger le rapport complet (en anglais)<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6659b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6659b8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af36778\" data-id=\"af36778\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Rapport sur la cybers\u00e9curit\u00e9 en 2017 Comme chaque ann\u00e9e, notre partenaire Qrator Labs publie son rapport annuel sur la cybers\u00e9curit\u00e9, en collaboration avec l&rsquo;entreprise Wallarm. En 2017, les m\u00e9thodes d&rsquo;attaques se sont multipli\u00e9es, entra\u00eenant une diversification accrue des menaces. Les malfaiteurs ont aujourd&rsquo;hui l&#8217;embarras du choix dans les proc\u00e9d\u00e9s d&rsquo;exploitation des vuln\u00e9rabilit\u00e9s r\u00e9seau. A quelles [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[6],"tags":[12,11,10,13],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017 - Pragma Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017 - Pragma Security\" \/>\n<meta property=\"og:description\" content=\"Rapport sur la cybers\u00e9curit\u00e9 en 2017 Comme chaque ann\u00e9e, notre partenaire Qrator Labs publie son rapport annuel sur la cybers\u00e9curit\u00e9, en collaboration avec l&rsquo;entreprise Wallarm. En 2017, les m\u00e9thodes d&rsquo;attaques se sont multipli\u00e9es, entra\u00eenant une diversification accrue des menaces. Les malfaiteurs ont aujourd&rsquo;hui l&#8217;embarras du choix dans les proc\u00e9d\u00e9s d&rsquo;exploitation des vuln\u00e9rabilit\u00e9s r\u00e9seau. A quelles [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"Pragma Security\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-29T06:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-06T12:04:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Nombre-attaques-Qrator-Labs-768x426.png\" \/>\n<meta name=\"author\" content=\"Solene Souquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Solene Souquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\"},\"author\":{\"name\":\"Solene Souquet\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd\"},\"headline\":\"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017\",\"datePublished\":\"2018-03-29T06:00:18+00:00\",\"dateModified\":\"2018-09-06T12:04:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\"},\"wordCount\":1013,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/pragma-security.com\/#organization\"},\"keywords\":[\"botnets\",\"Cloud\",\"DDoS par amplification\",\"ICO\"],\"articleSection\":[\"Tendances\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\",\"url\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\",\"name\":\"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017 - Pragma Security\",\"isPartOf\":{\"@id\":\"https:\/\/pragma-security.com\/#website\"},\"datePublished\":\"2018-03-29T06:00:18+00:00\",\"dateModified\":\"2018-09-06T12:04:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/pragma-security.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pragma-security.com\/#website\",\"url\":\"https:\/\/pragma-security.com\/\",\"name\":\"Pragma Security\",\"description\":\"Protection anti-DDoS | DNS | WAF\",\"publisher\":{\"@id\":\"https:\/\/pragma-security.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pragma-security.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pragma-security.com\/#organization\",\"name\":\"Pragma Security\",\"url\":\"https:\/\/pragma-security.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg\",\"contentUrl\":\"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg\",\"width\":436,\"height\":394,\"caption\":\"Pragma Security\"},\"image\":{\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd\",\"name\":\"Solene Souquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/pragma-security.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g\",\"caption\":\"Solene Souquet\"},\"url\":\"https:\/\/pragma-security.com\/index.php\/author\/soso\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017 - Pragma Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/","og_locale":"fr_FR","og_type":"article","og_title":"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017 - Pragma Security","og_description":"Rapport sur la cybers\u00e9curit\u00e9 en 2017 Comme chaque ann\u00e9e, notre partenaire Qrator Labs publie son rapport annuel sur la cybers\u00e9curit\u00e9, en collaboration avec l&rsquo;entreprise Wallarm. En 2017, les m\u00e9thodes d&rsquo;attaques se sont multipli\u00e9es, entra\u00eenant une diversification accrue des menaces. Les malfaiteurs ont aujourd&rsquo;hui l&#8217;embarras du choix dans les proc\u00e9d\u00e9s d&rsquo;exploitation des vuln\u00e9rabilit\u00e9s r\u00e9seau. A quelles [&hellip;]","og_url":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/","og_site_name":"Pragma Security","article_published_time":"2018-03-29T06:00:18+00:00","article_modified_time":"2018-09-06T12:04:25+00:00","og_image":[{"url":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/03\/Nombre-attaques-Qrator-Labs-768x426.png"}],"author":"Solene Souquet","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Solene Souquet","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#article","isPartOf":{"@id":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/"},"author":{"name":"Solene Souquet","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd"},"headline":"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017","datePublished":"2018-03-29T06:00:18+00:00","dateModified":"2018-09-06T12:04:25+00:00","mainEntityOfPage":{"@id":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/"},"wordCount":1013,"commentCount":0,"publisher":{"@id":"https:\/\/pragma-security.com\/#organization"},"keywords":["botnets","Cloud","DDoS par amplification","ICO"],"articleSection":["Tendances"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/","url":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/","name":"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017 - Pragma Security","isPartOf":{"@id":"https:\/\/pragma-security.com\/#website"},"datePublished":"2018-03-29T06:00:18+00:00","dateModified":"2018-09-06T12:04:25+00:00","breadcrumb":{"@id":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pragma-security.com\/index.php\/2018\/03\/29\/qrator-labs-rapport-annuel-cybersecurite-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/pragma-security.com\/"},{"@type":"ListItem","position":2,"name":"Rapport annuel sur la cybers\u00e9curit\u00e9 en 2017"}]},{"@type":"WebSite","@id":"https:\/\/pragma-security.com\/#website","url":"https:\/\/pragma-security.com\/","name":"Pragma Security","description":"Protection anti-DDoS | DNS | WAF","publisher":{"@id":"https:\/\/pragma-security.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pragma-security.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/pragma-security.com\/#organization","name":"Pragma Security","url":"https:\/\/pragma-security.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/","url":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg","contentUrl":"https:\/\/pragma-security.com\/wp-content\/uploads\/2018\/01\/Pragma-JPG.jpg","width":436,"height":394,"caption":"Pragma Security"},"image":{"@id":"https:\/\/pragma-security.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/271be415fa46ce40ec08a9e065ee2cbd","name":"Solene Souquet","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/pragma-security.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8356f56b8f863d3351aca1c526ce48a1?s=96&d=mm&r=g","caption":"Solene Souquet"},"url":"https:\/\/pragma-security.com\/index.php\/author\/soso\/"}]}},"_links":{"self":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/343"}],"collection":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":29,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":798,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/posts\/343\/revisions\/798"}],"wp:attachment":[{"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/media?parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/categories?post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pragma-security.com\/index.php\/wp-json\/wp\/v2\/tags?post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}