{"id":987497170,"date":"2024-10-01T09:59:02","date_gmt":"2024-10-01T07:59:02","guid":{"rendered":"https:\/\/tyrex-cyber.com\/4-cyberattaques-de-legende-qui-ont-marque-les-esprits\/"},"modified":"2024-10-01T10:03:36","modified_gmt":"2024-10-01T08:03:36","slug":"4-legendary-cyberattacks","status":"publish","type":"post","link":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/","title":{"rendered":"4 legendary cyber attacks that made a lasting impression"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">A cyber attack takes place every 39 seconds around the world<\/span><span style=\"font-weight: 400\">[1]<\/span><span style=\"font-weight: 400\">. While many go unnoticed by the general public, others have left their mark on the history books. Here are 4 legendary cyber attacks that should convince you to protect your IT systems!<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Stuxnet: the USB key attack that called Iran&#8217;s nuclear programme into question<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In 2009, the world discovered a new dimension in cyber warfare with the appearance of Stuxnet<\/span><span style=\"font-weight: 400\">[2]<\/span><span style=\"font-weight: 400\">, a highly effective computer worm. This\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/infection-by-usb-5-tips-to-prevent-it\/\"><span style=\"font-weight: 400\">malware, introduced via USB sticks,<\/span><\/a><span style=\"font-weight: 400\">\u00a0managed to infiltrate the most heavily protected industrial systems in Iran, including the nuclear facilities at Natanz.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Designed to target programmable logic controllers (PLCs), Stuxnet discreetly altered the operation of centrifuges used for uranium enrichment, forcing them to run at destructive speeds while displaying normal parameters to operators.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This attack, attributed to collaboration between the United States and Israel, demonstrated for the first time how a cyber weapon could inflict physical damage on critical infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It also highlights the role that USB ports can play in cyber security breaches. To protect themselves, organisations would do well to install USB\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/purpose-of-a-usb-decontamination-station\/\"><span style=\"font-weight: 400\">decontamination terminals<\/span><\/a><span style=\"font-weight: 400\">, such as those offered by the\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/la-solution\/\"><span style=\"font-weight: 400\">Tyrex solution<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Cyber attack against Estonia in 2007: a world first<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">On 27 April 2007, Estonia<\/span><span style=\"font-weight: 400\">[3]<\/span><span style=\"font-weight: 400\">\u00a0was the scene of the first large-scale cyber-attack against a state. Following a controversial decision to move a Soviet statue from Tallinn, coordinated cyber attacks paralysed the country&#8217;s digital infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Government, banking, media and education websites were inaccessible for several days, plunging the country into unprecedented digital chaos. This attack, widely blamed on Russian nationalist groups, highlighted the vulnerability of states to massive digital attacks and led NATO to strengthen its cyber security capabilities.<\/span><\/p>\n<h2><b>WannaCry: digital epidemic and cryptocurrencies<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In May 2017, the WannaCry<\/span><span style=\"font-weight: 400\">[4]<\/span><span style=\"font-weight: 400\">\u00a0ransomware hit the world, causing a veritable digital epidemic. This malware, exploiting a security flaw in Windows systems, encrypted users&#8217; files, demanding a Bitcoin ransom to unlock them. WannaCry spread rapidly, affecting more than 200,000 computers in 150 countries.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Victims included hospitals, businesses, public authorities and even critical infrastructure. The National Health Service (NHS) in the UK was particularly hard hit, with many surgeries cancelled and patients at risk. Although the attack was stopped thanks to the discovery of a \u2018kill switch\u2019, it highlighted the serious shortcomings in IT security around the world.<\/span><\/p>\n<h2><b>NotPetya\/ExPetr: the most expensive attack in history<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In June 2017, a new ransomware variant called NotPetya, also known as ExPetr, swept across the globe. Unlike WannaCry, NotPetya was not designed to generate profits via ransomware, but rather to inflict massive damage.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Originating in Ukraine, this legendary cyberattack quickly affected multinational companies, ports, airports and critical infrastructure. Shipping giant Maersk, pharmaceutical group Merck and food conglomerate Mondelez are among the companies that suffered colossal losses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Experts estimate the overall economic damage from NotPetya at more than $10 billion, making it the costliest attack in history. This attack highlighted the destructive capacity of cyber weapons when deployed on a large scale.<\/span><\/p>\n<h2><b>The London hospital cyber attack: patient data at risk<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Finally, when it comes to cyber security, hospitals are often prey! In June 2024, London&#8217;s hospitals were hit by a devastating cyber attack, jeopardising patient safety and continuity of care. Partner hospitals of Synnovis, a provider of pathology services, were targeted by the Russian hacking group Qilin on 3 June. Leading hospitals such as King&#8217;s College, Guy&#8217;s and St Thomas&#8217;, as well as the Royal Brompton and Evelina London Children&#8217;s Hospital, were severely affected.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The group demanded a ransom of more than \u20ac47 million, threatening to disclose sensitive patient data if their demands were not met. When the NHS refused to pay, Qilin carried out its threat by publishing the stolen information on the dark web.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The consequences of this attack were disastrous. NHS England declared a major regional incident, resulting in:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400\"> the cancellation of 4,913 outpatient appointments<\/span><\/li>\n<li><span style=\"font-weight: 400\"> the postponement of 1,391 operations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These legendary cyber-attacks show the extent to which cyber-security in businesses and critical organisations has become an issue. Any security breach can have devastating consequences. That&#8217;s why it&#8217;s so important to protect your IT infrastructure and train your employees!<\/span><\/p>\n<p><span style=\"font-weight: 400\">Read also:\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"><span style=\"font-weight: 400\">Cybersecurity: 5 key actions for businesses and public authorities<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?<\/p>\n","protected":false},"author":7,"featured_media":987497165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-987497170","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 legendary cyber attacks that made a lasting impression - TYREX - d\u00e9contamination USB<\/title>\n<meta name=\"description\" content=\"Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 legendary cyber attacks that made a lasting impression - TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"og:description\" content=\"Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-01T07:59:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-01T08:03:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"894\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre-Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre-Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\"},\"author\":{\"name\":\"Alexandre-Admin\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\"},\"headline\":\"4 legendary cyber attacks that made a lasting impression\",\"datePublished\":\"2024-10-01T07:59:02+00:00\",\"dateModified\":\"2024-10-01T08:03:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\"},\"wordCount\":700,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\",\"name\":\"4 legendary cyber attacks that made a lasting impression - TYREX - d\u00e9contamination USB\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg\",\"datePublished\":\"2024-10-01T07:59:02+00:00\",\"dateModified\":\"2024-10-01T08:03:36+00:00\",\"description\":\"Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?\",\"breadcrumb\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg\",\"width\":1280,\"height\":894,\"caption\":\"Attaque cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tyrex-cyber.com\/en\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 legendary cyber attacks that made a lasting impression\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"name\":\"TYREX - d\u00e9contamination USB\",\"description\":\"TYREX - d\u00e9contamination USB\",\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\",\"name\":\"TYREX - d\u00e9contamination USB\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"width\":4000,\"height\":4118,\"caption\":\"TYREX - d\u00e9contamination USB\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\",\"name\":\"Alexandre-Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"caption\":\"Alexandre-Admin\"},\"url\":\"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 legendary cyber attacks that made a lasting impression - TYREX - d\u00e9contamination USB","description":"Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"4 legendary cyber attacks that made a lasting impression - TYREX - d\u00e9contamination USB","og_description":"Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?","og_url":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/","og_site_name":"TYREX - d\u00e9contamination USB","article_published_time":"2024-10-01T07:59:02+00:00","article_modified_time":"2024-10-01T08:03:36+00:00","og_image":[{"width":1280,"height":894,"url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg","type":"image\/jpeg"}],"author":"Alexandre-Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandre-Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/"},"author":{"name":"Alexandre-Admin","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b"},"headline":"4 legendary cyber attacks that made a lasting impression","datePublished":"2024-10-01T07:59:02+00:00","dateModified":"2024-10-01T08:03:36+00:00","mainEntityOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/"},"wordCount":700,"commentCount":0,"publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/","url":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/","name":"4 legendary cyber attacks that made a lasting impression - TYREX - d\u00e9contamination USB","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg","datePublished":"2024-10-01T07:59:02+00:00","dateModified":"2024-10-01T08:03:36+00:00","description":"Stuxnet, NotPetya, London Hospitals, Estonia, here are 4 legendary cyber attacks that made the headlines. What can we learn from them?","breadcrumb":{"@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#primaryimage","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/world-wide-web-7104406_1280.jpg","width":1280,"height":894,"caption":"Attaque cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tyrex-cyber.com\/en\/accueil\/"},{"@type":"ListItem","position":2,"name":"4 legendary cyber attacks that made a lasting impression"}]},{"@type":"WebSite","@id":"https:\/\/tyrex-cyber.com\/en\/#website","url":"https:\/\/tyrex-cyber.com\/en\/","name":"TYREX - d\u00e9contamination USB","description":"TYREX - d\u00e9contamination USB","publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tyrex-cyber.com\/en\/#organization","name":"TYREX - d\u00e9contamination USB","url":"https:\/\/tyrex-cyber.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","width":4000,"height":4118,"caption":"TYREX - d\u00e9contamination USB"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b","name":"Alexandre-Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","caption":"Alexandre-Admin"},"url":"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/"}]}},"_links":{"self":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=987497170"}],"version-history":[{"count":2,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497170\/revisions"}],"predecessor-version":[{"id":987497173,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497170\/revisions\/987497173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media\/987497165"}],"wp:attachment":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=987497170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=987497170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=987497170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}