{"id":125242,"date":"2020-10-21T00:00:50","date_gmt":"2020-10-21T00:00:50","guid":{"rendered":"https:\/\/www.internetsociety.org\/?post_type=news&#038;p=125242"},"modified":"2025-09-16T20:26:52","modified_gmt":"2025-09-16T20:26:52","slug":"cyberattaque-des-millions-de-logiciels-malveillants-enregistres-au-kenya-nigeria-et-en-afrique-du-sud","status":"publish","type":"news","link":"https:\/\/www.internetsociety.org\/fr\/news\/dans-les-nouvelles\/2020\/cyberattaque-des-millions-de-logiciels-malveillants-enregistres-au-kenya-nigeria-et-en-afrique-du-sud\/","title":{"rendered":"Cyberattaque: des millions de logiciels malveillants enregistr\u00e9s au Kenya, Nig\u00e9ria et en Afrique du Sud"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1551,"featured_media":0,"template":"","categories":[185,4903,4909,4775],"tags":[],"region_news_regions":[113],"content_category":[],"class_list":["post-125242","news","type-news","status-publish","hentry","category-confiance","category-le-mode-de-fonctionnement-du-reseau-internet","category-renforcer-internet","category-securite-fr","region_news_regions-afrique","news_type-dans-les-nouvelles"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"M\u00f4nica Fast","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/fast\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/news\/125242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1551"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=125242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=125242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=125242"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=125242"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=125242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}