{"id":53,"date":"2021-08-10T09:12:50","date_gmt":"2021-08-10T07:12:50","guid":{"rendered":"http:\/\/cyber-detect.com\/page-daccueil\/"},"modified":"2025-03-25T11:45:34","modified_gmt":"2025-03-25T10:45:34","slug":"page-daccueil","status":"publish","type":"page","link":"https:\/\/cyber-detect.com\/en\/","title":{"rendered":"HOME"},"content":{"rendered":"<div class=\"container fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:150px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">OUR SOLUTION: <span style=\"color:#4ec7f2\" class=\"has-inline-color\">GORILLE<\/span><\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\"><strong><span style=\"color:#4ec7f2\" class=\"has-inline-color\">GORILLE<\/span><\/strong> est une suite logicielle venant <strong>renforcer la d\u00e9tection<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">et la<strong> caract\u00e9risation<\/strong> <strong>de malwares<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-style-default has-white-color has-text-color has-background has-link-color wp-elements-c925cd943ee4086dc74538eeecbdd165 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#0f1636\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"62\" height=\"42\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/cloud-computing.svg\" alt=\"\" class=\"wp-image-190\" style=\"width:auto;height:45px\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">GORILLE Server<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">vous prot\u00e8ge des attaques cibl\u00e9es<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cyber-detect.com\/en\/gorille\/#gorille-server\">D\u00e9couvrir GORILLE Server<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-style-default has-white-color has-text-color has-background has-link-color wp-elements-49cc2ceaf0e4b939b9fd256df24e6bb0 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#0f1636\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"29\" height=\"69\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/boy.svg\" alt=\"\" class=\"wp-image-188\" style=\"width:auto;height:45px\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">GORILLE Expert<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">vous aide \u00e0 r\u00e9pondre aux incidents<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cyber-detect.com\/en\/gorille\/#gorille-expert\">D\u00e9couvrir GORILLE Expert<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-style-default has-white-color has-text-color has-background has-link-color wp-elements-c6021cdf23f1b806801d6fca5918d465 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#0f1636\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"69\" height=\"50\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/\/2021\/08\/helicopter.svg\" alt=\"\" class=\"wp-image-192\" style=\"width:auto;height:45px\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">GORILLE Patrol<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\">d\u00e9busque les menaces dormantes<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cyber-detect.com\/en\/gorille\/#gorille-patrol\">D\u00e9couvrir GORILLE Patrol<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Our GORILLE protects you from malware<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"list-icons block-list-icons\" id=\"list-icons-block_f45bdd7c2d3dd1da0a332de9cae8dbe8\">\n\n    \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto1-1.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">D\u00e9tection de variants avant 90 % des antivirus du march\u00e9<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto2.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Taux de d\u00e9tection entre 95 et 100%<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto3.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Moins de 5 % de faux-positifs<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/picto4.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Base de connaissance de plusieurs millions de malwares<\/p>\n                    <\/div>\n\n                            \n        \n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-2 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:80px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Our latest news<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-center\"><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"actualites block-actualites\" id=\"actualites-block_1492c59433e039d042645317ce5386a3\">\n\n        <!-- 3 derni\u00e8res actus de la cat\u00e9gorie Actualit\u00e9s -->\n        \n            \n            \n                <div class=\"wrap-actualite\" style=\"background-image: url('https:\/\/cyber-detect.com\/wp-content\/uploads\/2026\/02\/CyD-Template_linkedin-12-640x496.png');\">\n                    <a href=\"https:\/\/cyber-detect.com\/en\/packers-detection-a-key-challenge-in-analyzing-and-combating-malware\/\">\n                        <div class=\"content-actualite\">\n                            <p class=\"date-actualite\">27\/02\/2026<\/p>\n\n                            <h3 class=\"title-actualite\">Packers detection: A key challenge in analyzing and combating malware<\/h3>\n\n                            <p class=\"excerpt-actualite\">Malware deployed in modern cyberattacks now primarily uses protection systems called&nbsp;packers&nbsp;to deceive antivirus tools. These protections often cause antivirus engines to&nbsp;poorly characterize threats, which can lead to: 1. What Is a Packer in Cybersecurity? Packers (or crypters)&nbsp;are used to encrypt sensitive information within software and can also compress programs in order to optimize disk space. [&hellip;]<\/p>\n\n\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t\t\t.excerpt-actualite {\n                                  display: -webkit-box;\n                                  overflow: hidden;\n                                  -webkit-line-clamp: 2;\n                                  line-clamp: 2;\n                                  -webkit-box-orient: vertical;\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t<\/style>\n                        <\/div>\n                    <\/a>\n                <\/div>\n\n                                \n            \n            \n            <div class=\"wrap-parent-actualites\">\n                <div class=\"wrap-actualite\" style=\"background-image: url('https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/j-kelly-brito-PeUJyoylfe4-unsplash-640x496.jpg');\">\n                    <a href=\"https:\/\/cyber-detect.com\/en\/malware-protecting-against-variants-with-morphological-analysis\/\">\n                        <div class=\"content-actualite\">\n                            <p class=\"date-actualite\">28\/02\/2022<\/p>\n\n                            <h3 class=\"title-actualite\">Malware: Protecting against variants with Morphological Analysis<\/h3>\n\n                            <p class=\"excerpt-actualite\">Find here the replay of our webinar with Aubay, the reference partner for digital transition.<\/p>\n\n\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t\t\t.excerpt-actualite {\n                                  display: -webkit-box;\n                                  overflow: hidden;\n                                  -webkit-line-clamp: 2;\n                                  line-clamp: 2;\n                                  -webkit-box-orient: vertical;\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t<\/style>\n                        <\/div>\n                    <\/a>\n                <\/div>\n\n                                \n            \n            \n            \n                <div class=\"wrap-actualite\" style=\"background-image: url('https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/hizir-kaya-ExxuYNsViC4-unsplash-scaled-640x496.jpg');\">\n                    <a href=\"https:\/\/cyber-detect.com\/en\/morphological-analysis-to-identify-the-invisible-variant-of-emotet\/\">\n                        <div class=\"content-actualite\">\n                            <p class=\"date-actualite\">28\/02\/2022<\/p>\n\n                            <h3 class=\"title-actualite\">Morphological Analysis to identify the invisible variant of EMOTET<\/h3>\n\n                            <p class=\"excerpt-actualite\">Emotet is a banking virus that has been rampant since 2014 and is one of the most costly according to the U.S. Department of Homeland Security on par with Ryuk or TrickBot malware. Present in an email or in a booby-trapped link, Emotet sneaks into fake invoices, shipping notices or even health information linked to [&hellip;]<\/p>\n\n\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t\t\t.excerpt-actualite {\n                                  display: -webkit-box;\n                                  overflow: hidden;\n                                  -webkit-line-clamp: 2;\n                                  line-clamp: 2;\n                                  -webkit-box-orient: vertical;\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t<\/style>\n                        <\/div>\n                    <\/a>\n                <\/div>\n\n            <\/div>                    \n            \n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/cyber-detect.com\/blog\/\">All of our articles<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">A propos de nous<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Dans la jungle des solutions de cybers\u00e9curit\u00e9, <strong>CYBER-DETECT propose des outils de d\u00e9tection de variants 0 day<\/strong>. <\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Le constat aujourd&#8217;hui est sans appel : <strong>m\u00eame avec des outils de d\u00e9tection de type antivirus, EDR ou XDR, certains ransomwares et leurs variants r\u00e9ussissent \u00e0 passer ces syst\u00e8mes de protection.<\/strong><\/p>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Notre \u00e9quipe est sp\u00e9cialis\u00e9e dans la <strong>d\u00e9tection<\/strong> mais aussi la <strong>caract\u00e9risation de malware<\/strong> afin de faire gagner du temps aux analystes, lever des doutes en cas de crise, alerter avant l&#8217;attaque.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Cr\u00e9\u00e9 en 2017, <strong>apr\u00e8s 10 ann\u00e9es de recherche<\/strong>, GORILLE n&#8217;est pas n\u00e9 dans une cage, mais dans l&#8217;esprit de nos conseillers scientifiques internationalement reconnus en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"205\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-1024x205.png\" alt=\"\" class=\"wp-image-1648\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-1024x205.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-300x60.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-768x154.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-1536x308.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017.png 1771w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"154\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/ZwOo7rVsGrYSwbnT_Logo-Jizo-AI-black.png.avif\" alt=\"\" class=\"wp-image-1696\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/ZwOo7rVsGrYSwbnT_Logo-Jizo-AI-black.png.avif 561w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/ZwOo7rVsGrYSwbnT_Logo-Jizo-AI-black.png-300x82.jpg 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"890\" height=\"200\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo.png\" alt=\"\" class=\"wp-image-1652\" style=\"width:229px;height:40px\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo.png 890w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo-300x67.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo-768x173.png 768w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"120\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/DFM.png\" alt=\"\" class=\"wp-image-1655\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/DFM.png 518w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/DFM-300x69.png 300w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2635\" height=\"657\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3.png\" alt=\"\" class=\"wp-image-1378\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3.png 2635w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-300x75.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-1024x255.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-768x191.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-1536x383.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-2048x511.png 2048w\" sizes=\"auto, (max-width: 2635px) 100vw, 2635px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"996\" height=\"201\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4.png\" alt=\"\" class=\"wp-image-1582\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4.png 996w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4-300x61.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4-768x155.png 768w\" sizes=\"auto, (max-width: 996px) 100vw, 996px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"160\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/ATEMPO_Logo-COUL.png.webp\" alt=\"\" class=\"wp-image-1657\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/deveryware.com\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"286\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-1024x286.png\" alt=\"\" class=\"wp-image-1588\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-1024x286.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-300x84.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-768x215.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-1536x429.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware.png 1947w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"138\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-HEXATRUST.png.webp\" alt=\"\" class=\"wp-image-1576\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"176\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-ovh-horizontal-blue-3.png\" alt=\"\" class=\"wp-image-1578\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-ovh-horizontal-blue-3.png 636w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-ovh-horizontal-blue-3-300x83.png 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"579\" height=\"113\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/Logos-Partenaires-CyberDetect-THALES-1.png\" alt=\"\" class=\"wp-image-559\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/Logos-Partenaires-CyberDetect-THALES-1.png 579w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/Logos-Partenaires-CyberDetect-THALES-1-300x59.png 300w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"119\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-300x119.png\" alt=\"\" class=\"wp-image-1584\" style=\"width:180px\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-300x119.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-1024x407.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-768x305.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip.png 1340w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"298\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-1024x298.png\" alt=\"\" class=\"wp-image-1592\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-1024x298.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-300x87.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-768x224.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-1536x447.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-2048x596.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cybi.fr\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"424\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi.png\" alt=\"\" class=\"wp-image-1606\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi-300x124.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi-768x318.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"452\" height=\"227\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/systancia-1.png\" alt=\"\" class=\"wp-image-1667\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/systancia-1.png 452w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/systancia-1-300x151.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"371\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_loria_complet.jpg\" alt=\"\" class=\"wp-image-1590\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_loria_complet.jpg 700w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_loria_complet-300x159.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"445\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet.png\" alt=\"\" class=\"wp-image-1661\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet.png 792w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet-300x169.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet-768x432.png 768w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3083\" height=\"2758\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo.png\" alt=\"\" class=\"wp-image-1663\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo.png 3083w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-300x268.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-1024x916.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-768x687.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-1536x1374.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-2048x1832.png 2048w\" sizes=\"auto, (max-width: 3083px) 100vw, 3083px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-thumbnail is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/LOGO-PWC-3-150x150.png\" alt=\"\" class=\"wp-image-1677\" style=\"width:128px;height:auto\"\/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1258\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo.png\" alt=\"\" class=\"wp-image-1600\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo.png 2000w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-300x189.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-1024x644.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-768x483.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-1536x966.png 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1378\" height=\"630\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2.png\" alt=\"\" class=\"wp-image-1594\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2.png 1378w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2-300x137.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2-1024x468.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2-768x351.png 768w\" sizes=\"auto, (max-width: 1378px) 100vw, 1378px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/cyber-detect\/\">En savoir plus<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>OUR SOLUTION: GORILLE GORILLE est une suite logicielle venant renforcer la d\u00e9tection et la caract\u00e9risation de malwares. GORILLE Server vous prot\u00e8ge des attaques cibl\u00e9es GORILLE Expert vous aide \u00e0 r\u00e9pondre aux incidents GORILLE Patrol d\u00e9busque les menaces dormantes Our GORILLE protects you from malware Our latest news A propos de nous Dans la jungle des [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":752,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-accueil.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-53","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HOME - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HOME - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"OUR SOLUTION: GORILLE GORILLE est une suite logicielle venant renforcer la d\u00e9tection et la caract\u00e9risation de malwares. GORILLE Server vous prot\u00e8ge des attaques cibl\u00e9es GORILLE Expert vous aide \u00e0 r\u00e9pondre aux incidents GORILLE Patrol d\u00e9busque les menaces dormantes Our GORILLE protects you from malware Our latest news A propos de nous Dans la jungle des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T10:45:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"903\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"HOME - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg\",\"datePublished\":\"2021-08-10T07:12:50+00:00\",\"dateModified\":\"2025-03-25T10:45:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg\",\"width\":903,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HOME\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HOME - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/","og_locale":"en_US","og_type":"article","og_title":"HOME - Cyber-Detect","og_description":"OUR SOLUTION: GORILLE GORILLE est une suite logicielle venant renforcer la d\u00e9tection et la caract\u00e9risation de malwares. GORILLE Server vous prot\u00e8ge des attaques cibl\u00e9es GORILLE Expert vous aide \u00e0 r\u00e9pondre aux incidents GORILLE Patrol d\u00e9busque les menaces dormantes Our GORILLE protects you from malware Our latest news A propos de nous Dans la jungle des [&hellip;]","og_url":"https:\/\/cyber-detect.com\/en\/","og_site_name":"Cyber-Detect","article_modified_time":"2025-03-25T10:45:34+00:00","og_image":[{"width":903,"height":2560,"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/","url":"https:\/\/cyber-detect.com\/en\/","name":"HOME - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg","datePublished":"2021-08-10T07:12:50+00:00","dateModified":"2025-03-25T10:45:34+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/iStock-1170936846-min-scaled.jpg","width":903,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"HOME"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":43,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/53\/revisions"}],"predecessor-version":[{"id":2108,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/53\/revisions\/2108"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media\/752"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}