{"id":883,"date":"2021-08-10T09:12:59","date_gmt":"2021-08-10T07:12:59","guid":{"rendered":"https:\/\/cyber-detect.com\/cyber-detect\/"},"modified":"2025-03-25T11:50:50","modified_gmt":"2025-03-25T10:50:50","slug":"our-story","status":"publish","type":"page","link":"https:\/\/cyber-detect.com\/en\/our-story\/","title":{"rendered":"OUR STORY"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:auto 41%\"><div class=\"wp-block-media-text__content\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-left\">Qui sommes nous ?<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Apr\u00e8s <strong>10 ann\u00e9es de recherche<\/strong> au sein du LORIA (Laboratoire Lorrain de Recherche en Intelligence Artificielle), nous utilisons aujourd&#8217;hui notre savoir-faire pour <strong>caract\u00e9riser et prot\u00e9ger<\/strong> les syst\u00e8mes informatiques des <strong>menaces les plus cach\u00e9es<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-left\">Notre sp\u00e9cialit\u00e9 ?<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Nous sommes aujourd&#8217;hui les seuls capables d&#8217;appliquer la m\u00e9thode d&#8217;<strong>analyse morphologique<\/strong> qui consiste \u00e0 <strong>caract\u00e9riser une menace par son comportement<\/strong> et non seulement \u00e0 partir de notre base de donn\u00e9es de malwares. Ainsi, nous pouvons ais\u00e9ment reconna\u00eetre un nouveau virus ou son variant et le mat\u00e9rialiser en <strong>graphes de flot de contr\u00f4le<\/strong>. Cette innovation, coupl\u00e9e aux outils de m\u00e9thodes formelles, offre une <strong>pr\u00e9cision singuli\u00e8re et in\u00e9gal\u00e9e<\/strong> sur les fichiers ex\u00e9cutables et ne n\u00e9cessite <strong>pas de phase d&#8217;apprentissage<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-left\">Pourquoi un Gorille ?<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Bien que nous soyons tous des fans de King Kong, nos solutions ont \u00e9t\u00e9 nomm\u00e9es <strong>GORILLE<\/strong> par la DGA (Direction G\u00e9n\u00e9rale de l&#8217;Armement) au cours de nos premi\u00e8res preuves de concept. <\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Nous avons finalement \u00e9t\u00e9 s\u00e9duits par cette appellation qui repr\u00e9sente \u00e0 merveille notre m\u00e9tier : un outil <strong>puissant<\/strong> face aux menaces, <strong>immuable<\/strong> et surtout <strong>bienveillant<\/strong>.<\/p>\n<\/div><\/div><\/div><\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg\" alt=\"\" class=\"wp-image-1818 size-full\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg 683w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-200x300.jpg 200w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-768x1152.jpg 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-1024x1536.jpg 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-1365x2048.jpg 1365w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-scaled.jpg 1707w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/figure><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Our GORILLE protects you from malware<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"list-icons block-list-icons\" id=\"list-icons-block_ad245919fe96be63d51b2284ba75ed4a\">\n\n    \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/picto2_yellow.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">D\u00e9tection de variants avant 90 % des antivirus du march\u00e9<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/picto1_yellow.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Taux de d\u00e9tection entre 95 et 100%<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/picto3_yellow.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Moins de 5 % de faux-positifs<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/picto4_yellow.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Base de connaissance de plusieurs millions de malwares<\/p>\n                    <\/div>\n\n                            \n        \n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Notre \u00e9quipe<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"membres block-membres\" id=\"membres-block_87810b956013d8b9ea708e2d9d0857d0\">\n\n    \n                            \n                    <div class=\"wrap-membre\">\n                        <div class=\"membre-media\" style=\"background-image: url(https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/rl.jpg);\"><\/div>\n\n                        <h3 class=\"membre-name\">R\u00e9gis Lhoste<\/h3>\n\n                        <p class=\"membre-fonction\">Pr\u00e9sident<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-membre\">\n                        <div class=\"membre-media\" style=\"background-image: url(https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/stg.png);\"><\/div>\n\n                        <h3 class=\"membre-name\">St\u00e9phane G\u00e9gout<\/h3>\n\n                        <p class=\"membre-fonction\">Pr\u00e9sident du conseil de surveillance<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-membre\">\n                        <div class=\"membre-media\" style=\"background-image: url(https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/zzz.png);\"><\/div>\n\n                        <h3 class=\"membre-name\">Guillaume Bonfante<\/h3>\n\n                        <p class=\"membre-fonction\">Conseiller scientifique<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-membre\">\n                        <div class=\"membre-media\" style=\"background-image: url(https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/xxx.png);\"><\/div>\n\n                        <h3 class=\"membre-name\">Jean-Yves Marion<\/h3>\n\n                        <p class=\"membre-fonction\">Conseiller scientifique<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-membre\">\n                        <div class=\"membre-media\" style=\"background-image: url(https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/yyy.png);\"><\/div>\n\n                        <h3 class=\"membre-name\">Fabrice Sabatier<\/h3>\n\n                        <p class=\"membre-fonction\">Conseiller scientifique<\/p>\n                    <\/div>\n\n                            \n        \n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Nos clients &amp; partenaires<\/h2>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"205\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-1024x205.png\" alt=\"\" class=\"wp-image-1648\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-1024x205.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-300x60.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-768x154.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017-1536x308.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Airbus_logo_2017.png 1771w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"154\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/ZwOo7rVsGrYSwbnT_Logo-Jizo-AI-black.png.avif\" alt=\"\" class=\"wp-image-1696\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/ZwOo7rVsGrYSwbnT_Logo-Jizo-AI-black.png.avif 561w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/02\/ZwOo7rVsGrYSwbnT_Logo-Jizo-AI-black.png-300x82.jpg 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"890\" height=\"200\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo.png\" alt=\"\" class=\"wp-image-1652\" style=\"width:229px;height:40px\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo.png 890w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo-300x67.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MergenPro-ThreatDown-Logo-768x173.png 768w\" sizes=\"auto, (max-width: 890px) 100vw, 890px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"120\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/DFM.png\" alt=\"\" class=\"wp-image-1655\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/DFM.png 518w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/DFM-300x69.png 300w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2635\" height=\"657\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3.png\" alt=\"\" class=\"wp-image-1378\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3.png 2635w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-300x75.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-1024x255.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-768x191.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-1536x383.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2022\/02\/TEHTRIS_logo-3-2048x511.png 2048w\" sizes=\"auto, (max-width: 2635px) 100vw, 2635px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"996\" height=\"201\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4.png\" alt=\"\" class=\"wp-image-1582\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4.png 996w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4-300x61.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/4-768x155.png 768w\" sizes=\"auto, (max-width: 996px) 100vw, 996px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"160\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/ATEMPO_Logo-COUL.png.webp\" alt=\"\" class=\"wp-image-1657\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/deveryware.com\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"286\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-1024x286.png\" alt=\"\" class=\"wp-image-1588\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-1024x286.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-300x84.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-768x215.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware-1536x429.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/deveryware.png 1947w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"138\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-HEXATRUST.png.webp\" alt=\"\" class=\"wp-image-1576\"\/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"176\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-ovh-horizontal-blue-3.png\" alt=\"\" class=\"wp-image-1578\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-ovh-horizontal-blue-3.png 636w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-ovh-horizontal-blue-3-300x83.png 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"579\" height=\"113\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/Logos-Partenaires-CyberDetect-THALES-1.png\" alt=\"\" class=\"wp-image-559\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/Logos-Partenaires-CyberDetect-THALES-1.png 579w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/09\/Logos-Partenaires-CyberDetect-THALES-1-300x59.png 300w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"119\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-300x119.png\" alt=\"\" class=\"wp-image-1584\" style=\"width:180px\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-300x119.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-1024x407.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip-768x305.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/tracip.png 1340w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"298\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-1024x298.png\" alt=\"\" class=\"wp-image-1592\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-1024x298.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-300x87.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-768x224.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-1536x447.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_hd-1-2048x596.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cybi.fr\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"424\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi.png\" alt=\"\" class=\"wp-image-1606\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi-300x124.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo-cybi-768x318.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"452\" height=\"227\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/systancia-1.png\" alt=\"\" class=\"wp-image-1667\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/systancia-1.png 452w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/systancia-1-300x151.png 300w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"371\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_loria_complet.jpg\" alt=\"\" class=\"wp-image-1590\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_loria_complet.jpg 700w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/logo_loria_complet-300x159.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"445\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet.png\" alt=\"\" class=\"wp-image-1661\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet.png 792w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet-300x169.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/Logotype_DGA_internet-768x432.png 768w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3083\" height=\"2758\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo.png\" alt=\"\" class=\"wp-image-1663\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo.png 3083w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-300x268.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-1024x916.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-768x687.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-1536x1374.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/MINARM-logo-2048x1832.png 2048w\" sizes=\"auto, (max-width: 3083px) 100vw, 3083px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-thumbnail is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/01\/LOGO-PWC-3-150x150.png\" alt=\"\" class=\"wp-image-1677\" style=\"width:128px;height:auto\"\/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1258\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo.png\" alt=\"\" class=\"wp-image-1600\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo.png 2000w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-300x189.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-1024x644.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-768x483.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/EDF-Logo-1536x966.png 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1378\" height=\"630\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2.png\" alt=\"\" class=\"wp-image-1594\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2.png 1378w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2-300x137.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2-1024x468.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2023\/04\/assurance-maladie-logo-png-2-768x351.png 768w\" sizes=\"auto, (max-width: 1378px) 100vw, 1378px\" \/><\/figure>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Our GORILLE protects you from malware Notre \u00e9quipe Nos clients &amp; partenaires<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-883","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OUR STORY - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/our-story\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OUR STORY - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"Our GORILLE protects you from malware Notre \u00e9quipe Nos clients &amp; partenaires\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/our-story\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T10:50:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/our-story\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/our-story\/\",\"name\":\"OUR STORY - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/our-story\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/our-story\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg\",\"datePublished\":\"2021-08-10T07:12:59+00:00\",\"dateModified\":\"2025-03-25T10:50:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/our-story\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/our-story\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/our-story\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/our-story\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OUR STORY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OUR STORY - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/our-story\/","og_locale":"en_US","og_type":"article","og_title":"OUR STORY - Cyber-Detect","og_description":"Our GORILLE protects you from malware Notre \u00e9quipe Nos clients &amp; partenaires","og_url":"https:\/\/cyber-detect.com\/en\/our-story\/","og_site_name":"Cyber-Detect","article_modified_time":"2025-03-25T10:50:50+00:00","og_image":[{"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/our-story\/","url":"https:\/\/cyber-detect.com\/en\/our-story\/","name":"OUR STORY - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/our-story\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/our-story\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg","datePublished":"2021-08-10T07:12:59+00:00","dateModified":"2025-03-25T10:50:50+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/our-story\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/our-story\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/our-story\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/iStock-1170936846-683x1024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/our-story\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"OUR STORY"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":10,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/883\/revisions"}],"predecessor-version":[{"id":2109,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/883\/revisions\/2109"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}