<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>APTITUDE INFORMATIQUE</provider_name><provider_url>https://www.aptitude-informatique.fr</provider_url><author_name>yann Le Goc</author_name><author_url>https://www.aptitude-informatique.fr/index.php/author/yann/</author_url><title>Cyberattaques - APTITUDE INFORMATIQUE</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Sw8BHcbZyA"&gt;&lt;a href="https://www.aptitude-informatique.fr/index.php/2017/11/15/cyberattaques/"&gt;Cyberattaques&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.aptitude-informatique.fr/index.php/2017/11/15/cyberattaques/embed/#?secret=Sw8BHcbZyA" width="600" height="338" title="&#xAB;&#xA0;Cyberattaques&#xA0;&#xBB; &#x2014; APTITUDE INFORMATIQUE" data-secret="Sw8BHcbZyA" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://i0.wp.com/www.aptitude-informatique.fr/wp-content/uploads/2017/11/cyber-e1510757137263.png?fit=120%2C120&amp;ssl=1</thumbnail_url><thumbnail_width>120</thumbnail_width><thumbnail_height>120</thumbnail_height><description>CCleaner infect&#xE9; par un logiciel malveillant CCleaner a &#xE9;t&#xE9; compromis par un logiciel malveillant. 2,27 millions de personnes ont t&#xE9;l&#xE9;charg&#xE9; les versions infect&#xE9;es. Bien que cette cyberattaque ait atteint des milliers de machines, il semblerait que le groupe de cybercriminels ciblait majoritairement des entreprises technologiques. Parmi elles figurent Sony, Epson, Samsung ou encore Google.</description></oembed>
