{"id":987497233,"date":"2025-02-27T11:47:00","date_gmt":"2025-02-27T10:47:00","guid":{"rendered":"https:\/\/tyrex-cyber.com\/bilan-cybersecurite-2024-tendances-2025\/"},"modified":"2025-02-27T11:55:04","modified_gmt":"2025-02-27T10:55:04","slug":"cybersecurity-2024-review-2025-tendencies","status":"publish","type":"post","link":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/","title":{"rendered":"Cybersecurity review for 2024 and outlook for 2025: what are the key trends?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>The year 2024 ends with a worrying picture for cybersecurity worldwide. Despite a slight decrease in attacks compared to 2023, detailed analysis reveals that the methods used by cybercriminals are becoming more sophisticated, and that the financial impact on the organisations affected is increasing. Tyrex takes a look at the key figures and trends to watch out for in 2025.<\/p>\n<h2><b>The threat landscape in 2024<\/b><\/h2>\n<h3><b>An apparent slight decrease that masks a complex reality<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>The latest data compiled by Comparitech for the year 2024 shows 5,461 claimed ransomware attacks worldwide, of which 1,204 could be formally confirmed. These incidents led to the compromise of more than 195.4 million pieces of sensitive data. While these figures appear to mark a decline compared with the 1,474 attacks and 261.5 million records compromised in 2023, this apparent improvement should be interpreted with caution.<\/p>\n<p>As Comparitech analysts point out, many attacks are not reported until months or even years after they have occurred. The figures for 2024 are therefore likely to be revised upwards in the coming months, as new compromises are documented.<\/p>\n<h3><b>Ransomware: ever-higher ransoms<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>The year 2024 confirms the upward trend in the amounts demanded by cybercriminals. The average ransom demand exceeded 3.5 million dollars, while the average amount actually paid was 9.5 million dollars. In total, victim organisations paid out more than 133.5 million dollars in an attempt to recover their data or prevent it from being disclosed.<\/p>\n<p>This disproportion between the amounts requested and those actually paid reflects a complex negotiation dynamic between attackers and victims. It is also a deliberate strategy on the part of cybercriminals to demand deliberately excessive sums.<\/p>\n<h3><b>Which actors lead the threat?<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>Among the most active groups in 2024, RansomHub emerged as the most widespread ransomware, with 89 confirmed attacks. It was closely followed by<\/p>\n<ul>\n<li><span style=\"font-weight: 400\"> \u00a0 \u00a0 LockBit (83 attacks),\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\"> \u00a0 \u00a0 Medusa (62)\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400\"> \u00a0 \u00a0 Play (57).\u00a0<\/span><\/li>\n<\/ul>\n<h2><b>Which sectors are most affected?<\/b><\/h2>\n<h3><b>Companies, prime targets for attackers<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>Unsurprisingly, the private sector accounted for the majority of attacks, with 728 confirmed incidents affecting companies of all sizes and in all sectors. The impact of the <a href=\"https:\/\/tyrex-cyber.com\/en\/what-are-the-main-categories-of-malware\/\">malware<\/a> was particularly severe, with 166.5 million pieces of data compromised. The average ransom demanded was $3.7 million, but the amount actually paid was a staggering $14.4 million on average.<\/p>\n<h3><b>Public sector and healthcare: targets with a high societal impact<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>Government agencies suffered 179 confirmed attacks in 2024, compromising 1.5 million items of data. The average ransom demanded was $2.3 million, with an average actual payment of $923,000.<\/p>\n<p>The healthcare sector, which is particularly sensitive due to the critical nature of its activities, recorded 181 attacks affecting 25.6 million items of data. Cyber criminals demanded an average of 5.7 million dollars. <a href=\"https:\/\/tyrex-cyber.com\/en\/cyberattacks-in-hospitals-a-growing-threat\/\">Health establishments and hospitals<\/a> generally paid an average of around 900,000 dollars, a significant sum that is putting a strain on health centres&#8217; finances.<\/p>\n<h3><b>Relative improvement in the education sector<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>While almost all sectors of activity saw a stable or upward trend in cyber attacks between 2023 and 2024, education was the exception, with a notable decline. Attacks on educational establishments fell from 188 in 2023 to 116 in 2024. This relative improvement can be explained by the strengthening of cybersecurity measures in this historically vulnerable sector, but remains to be confirmed over the long term.<\/p>\n<p>Nevertheless, the educational establishments affected saw 1.8 million items of data compromised, with ransom demands averaging $847,000.<\/p>\n<h2><b>What is to be expected in 2025?<\/b><\/h2>\n<h3><b>Likely increase in large-scale attacks<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>The experts at Comparitech remain cautious about their forecasts for 2025, pointing out that it is difficult to accurately anticipate developments in a landscape as dynamic as that of ransomware. Nevertheless, several trends are emerging.<\/p>\n<p>Large-scale attacks targeting critical infrastructures or organisations with international ramifications are likely to continue and even intensify.<\/p>\n<p>These operations, which are likely to cause considerable disruption and affect massive volumes of data, represent a major risk for 2025.<\/p>\n<h3><b>The shadow cast by the Cleo performance<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>A specific threat is already looming over the beginning of 2025: the consequences of the Cleo exploit developed by the Clop group. The group threatened to disclose the data of around 66 companies towards the end of 2024, foreshadowing a wave of incidents in the early months of 2025.<\/p>\n<p>Good to know: In today&#8217;s cybersecurity landscape, USB devices represent one of the most accessible and effective attack vectors for cybercriminals. These seemingly innocuous devices can contain sophisticated malware capable of compromising an entire corporate network in a matter of moments. In the face of this threat, it is possible to install a white station system, such as those offered by Tyrex.<\/p>\n<p><a href=\"https:\/\/tyrex-cyber.com\/en\/la-solution\/\">Discover the Tyrex solution<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The year 2024 ends with a worrying picture for cybersecurity worldwide. Despite a slight decrease in attacks compared to 2023, detailed analysis reveals that the methods used by cybercriminals are becoming more sophisticated, and that the financial impact on the organisations affected is increasing. Tyrex takes a look at the key figures and trends to watch out for in 2025.<\/p>\n","protected":false},"author":7,"featured_media":987497228,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-987497233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity review for 2024 and outlook for 2025: what are the key trends? - TYREX - d\u00e9contamination USB<\/title>\n<meta name=\"description\" content=\"A round-up of the key figures and cybersecurity trends for 2024, as well as the threats to watch out for in 2025!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity review for 2024 and outlook for 2025: what are the key trends? - TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"og:description\" content=\"A round-up of the key figures and cybersecurity trends for 2024, as well as the threats to watch out for in 2025!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\" \/>\n<meta property=\"og:site_name\" content=\"TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-27T10:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-27T10:55:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre-Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre-Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\"},\"author\":{\"name\":\"Alexandre-Admin\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\"},\"headline\":\"Cybersecurity review for 2024 and outlook for 2025: what are the key trends?\",\"datePublished\":\"2025-02-27T10:47:00+00:00\",\"dateModified\":\"2025-02-27T10:55:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\",\"name\":\"Cybersecurity review for 2024 and outlook for 2025: what are the key trends? - TYREX - d\u00e9contamination USB\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg\",\"datePublished\":\"2025-02-27T10:47:00+00:00\",\"dateModified\":\"2025-02-27T10:55:04+00:00\",\"description\":\"A round-up of the key figures and cybersecurity trends for 2024, as well as the threats to watch out for in 2025!\",\"breadcrumb\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg\",\"width\":1280,\"height\":761,\"caption\":\"tendances cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tyrex-cyber.com\/en\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity review for 2024 and outlook for 2025: what are the key trends?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"name\":\"TYREX - d\u00e9contamination USB\",\"description\":\"TYREX - d\u00e9contamination USB\",\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\",\"name\":\"TYREX - d\u00e9contamination USB\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"width\":4000,\"height\":4118,\"caption\":\"TYREX - d\u00e9contamination USB\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\",\"name\":\"Alexandre-Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"caption\":\"Alexandre-Admin\"},\"url\":\"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity review for 2024 and outlook for 2025: what are the key trends? - TYREX - d\u00e9contamination USB","description":"A round-up of the key figures and cybersecurity trends for 2024, as well as the threats to watch out for in 2025!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity review for 2024 and outlook for 2025: what are the key trends? - TYREX - d\u00e9contamination USB","og_description":"A round-up of the key figures and cybersecurity trends for 2024, as well as the threats to watch out for in 2025!","og_url":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/","og_site_name":"TYREX - d\u00e9contamination USB","article_published_time":"2025-02-27T10:47:00+00:00","article_modified_time":"2025-02-27T10:55:04+00:00","og_image":[{"width":1280,"height":761,"url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg","type":"image\/jpeg"}],"author":"Alexandre-Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandre-Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#article","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/"},"author":{"name":"Alexandre-Admin","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b"},"headline":"Cybersecurity review for 2024 and outlook for 2025: what are the key trends?","datePublished":"2025-02-27T10:47:00+00:00","dateModified":"2025-02-27T10:55:04+00:00","mainEntityOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/","url":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/","name":"Cybersecurity review for 2024 and outlook for 2025: what are the key trends? - TYREX - d\u00e9contamination USB","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg","datePublished":"2025-02-27T10:47:00+00:00","dateModified":"2025-02-27T10:55:04+00:00","description":"A round-up of the key figures and cybersecurity trends for 2024, as well as the threats to watch out for in 2025!","breadcrumb":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#primaryimage","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2025\/02\/security-5043368_1280.jpg","width":1280,"height":761,"caption":"tendances cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurity-2024-review-2025-tendencies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tyrex-cyber.com\/en\/accueil\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity review for 2024 and outlook for 2025: what are the key trends?"}]},{"@type":"WebSite","@id":"https:\/\/tyrex-cyber.com\/en\/#website","url":"https:\/\/tyrex-cyber.com\/en\/","name":"TYREX - d\u00e9contamination USB","description":"TYREX - d\u00e9contamination USB","publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tyrex-cyber.com\/en\/#organization","name":"TYREX - d\u00e9contamination USB","url":"https:\/\/tyrex-cyber.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","width":4000,"height":4118,"caption":"TYREX - d\u00e9contamination USB"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b","name":"Alexandre-Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","caption":"Alexandre-Admin"},"url":"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/"}]}},"_links":{"self":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=987497233"}],"version-history":[{"count":2,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497233\/revisions"}],"predecessor-version":[{"id":987497235,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497233\/revisions\/987497235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media\/987497228"}],"wp:attachment":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=987497233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=987497233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=987497233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}