{"id":5945,"date":"2025-08-28T07:37:53","date_gmt":"2025-08-28T05:37:53","guid":{"rendered":"https:\/\/tech.kouzay.com\/?p=5945"},"modified":"2026-03-18T08:51:43","modified_gmt":"2026-03-18T07:51:43","slug":"promptlock-le-ransomware-ia-qui-inquiete-les-experts-tech-kouzay","status":"publish","type":"post","link":"https:\/\/tech.kouzay.com\/index.php\/2025\/08\/28\/promptlock-le-ransomware-ia-qui-inquiete-les-experts-tech-kouzay\/","title":{"rendered":"PromptLock : Le ransomware IA qui inqui\u00e8te les experts | Tech Kouzay"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5945\" class=\"elementor elementor-5945\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd172ad e-flex e-con-boxed e-con e-parent\" data-id=\"fd172ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b1e534 elementor-widget elementor-widget-html\" data-id=\"2b1e534\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!DOCTYPE html>\r\n<html lang=\"fr\">\r\n<head>\r\n    <meta charset=\"UTF-8\">\r\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\r\n    <title>PromptLock : Le ransomware IA qui inqui\u00e8te les experts | Tech Kouzay<\/title>\r\n    <link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.4.0\/css\/all.min.css\">\r\n    <style>\r\n        \/* Variables et reset *\/\r\n        :root {\r\n            --primary: #1a5276;\r\n            --secondary: #2e86c1;\r\n            --accent: #e74c3c;\r\n            --light: #ecf0f1;\r\n            --dark: #2c3e50;\r\n            --text: #333;\r\n            --shadow: 0 4px 6px rgba(0, 0, 0, 0.1);\r\n            --transition: all 0.3s ease;\r\n        }\r\n        \r\n        * {\r\n            margin: 0;\r\n            padding: 0;\r\n            box-sizing: border-box;\r\n        }\r\n        \r\n        body {\r\n            font-family: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif;\r\n            line-height: 1.6;\r\n            color: var(--text);\r\n            background-color: #f9f9f9;\r\n            padding: 0;\r\n            margin: 0;\r\n        }\r\n        \r\n        \/* Bandeau de promotion *\/\r\n        .promo-banner {\r\n            background: linear-gradient(90deg, var(--primary), var(--secondary));\r\n            color: white;\r\n            padding: 12px 0;\r\n            text-align: center;\r\n            font-size: 0.9rem;\r\n        }\r\n        \r\n        .promo-banner a {\r\n            color: white;\r\n            text-decoration: none;\r\n            font-weight: bold;\r\n            display: inline-block;\r\n            margin-left: 5px;\r\n            padding: 3px 10px;\r\n            border-radius: 3px;\r\n            background-color: rgba(255, 255, 255, 0.2);\r\n            transition: var(--transition);\r\n        }\r\n        \r\n        .promo-banner a:hover {\r\n            background-color: rgba(255, 255, 255, 0.3);\r\n            transform: translateY(-2px);\r\n        }\r\n        \r\n        \/* Conteneur principal *\/\r\n        .article-container {\r\n            max-width: 900px;\r\n            margin: 0 auto;\r\n            background: white;\r\n            box-shadow: var(--shadow);\r\n            padding: 2rem;\r\n            border-radius: 8px;\r\n            margin-top: 2rem;\r\n            margin-bottom: 2rem;\r\n        }\r\n        \r\n        \/* En-t\u00eate *\/\r\n        .article-header {\r\n            margin-bottom: 2rem;\r\n            border-bottom: 2px solid var(--secondary);\r\n            padding-bottom: 1.5rem;\r\n        }\r\n        \r\n        .article-title {\r\n            font-size: 2.5rem;\r\n            color: var(--primary);\r\n            margin-bottom: 1rem;\r\n            line-height: 1.2;\r\n        }\r\n        \r\n        .article-meta {\r\n            display: flex;\r\n            justify-content: space-between;\r\n            align-items: center;\r\n            flex-wrap: wrap;\r\n            color: #666;\r\n            font-size: 0.9rem;\r\n        }\r\n        \r\n        \/* Contenu *\/\r\n        .article-content {\r\n            font-size: 1.1rem;\r\n        }\r\n        \r\n        .article-content p {\r\n            margin-bottom: 1.5rem;\r\n            text-align: justify;\r\n        }\r\n        \r\n        .article-content h2 {\r\n            color: var(--primary);\r\n            margin: 2rem 0 1rem;\r\n            padding-bottom: 0.5rem;\r\n            border-bottom: 1px solid #eee;\r\n        }\r\n        \r\n        .highlight-box {\r\n            background-color: #f8f9fa;\r\n            border-left: 4px solid var(--accent);\r\n            padding: 1.5rem;\r\n            margin: 2rem 0;\r\n            border-radius: 0 4px 4px 0;\r\n        }\r\n        \r\n        .highlight-box p {\r\n            margin-bottom: 0;\r\n            font-style: italic;\r\n        }\r\n        \r\n        \/* Image illustrative *\/\r\n        .article-image {\r\n            width: 100%;\r\n            margin: 2rem 0;\r\n            text-align: center;\r\n        }\r\n        \r\n        .article-image img {\r\n            max-width: 100%;\r\n            height: auto;\r\n            border-radius: 8px;\r\n            box-shadow: var(--shadow);\r\n        }\r\n        \r\n        .image-caption {\r\n            font-size: 0.9rem;\r\n            color: #666;\r\n            margin-top: 0.5rem;\r\n        }\r\n        \r\n        \/* Citation *\/\r\n        blockquote {\r\n            background: linear-gradient(to right, var(--secondary), var(--primary));\r\n            color: white;\r\n            padding: 2rem;\r\n            border-radius: 8px;\r\n            margin: 2rem 0;\r\n            position: relative;\r\n            overflow: hidden;\r\n        }\r\n        \r\n        blockquote:before {\r\n            content: \"\"\";\r\n            position: absolute;\r\n            top: -20px;\r\n            left: 10px;\r\n            font-size: 5rem;\r\n            color: rgba(255, 255, 255, 0.2);\r\n            font-family: Georgia, serif;\r\n        }\r\n        \r\n        blockquote p {\r\n            margin-bottom: 0;\r\n            position: relative;\r\n            z-index: 1;\r\n            font-size: 1.2rem;\r\n        }\r\n        \r\n        \/* Section de s\u00e9curit\u00e9 *\/\r\n        .security-tips {\r\n            background-color: #f8f9fa;\r\n            padding: 2rem;\r\n            border-radius: 8px;\r\n            margin: 2rem 0;\r\n        }\r\n        \r\n        .security-tips h3 {\r\n            color: var(--primary);\r\n            margin-bottom: 1rem;\r\n            display: flex;\r\n            align-items: center;\r\n        }\r\n        \r\n        .security-tips h3 i {\r\n            margin-right: 10px;\r\n            color: var(--accent);\r\n        }\r\n        \r\n        .security-tips ul {\r\n            list-style-type: none;\r\n        }\r\n        \r\n        .security-tips li {\r\n            margin-bottom: 0.8rem;\r\n            padding-left: 30px;\r\n            position: relative;\r\n        }\r\n        \r\n        .security-tips li:before {\r\n            content: \"\u2713\";\r\n            position: absolute;\r\n            left: 0;\r\n            color: var(--secondary);\r\n            font-weight: bold;\r\n        }\r\n        \r\n        \/* Responsive *\/\r\n        @media (max-width: 768px) {\r\n            .article-container {\r\n                padding: 1.5rem;\r\n                margin: 1rem;\r\n            }\r\n            \r\n            .article-title {\r\n                font-size: 2rem;\r\n            }\r\n            \r\n            .article-meta {\r\n                flex-direction: column;\r\n                align-items: flex-start;\r\n            }\r\n            \r\n            .article-meta > div {\r\n                margin-bottom: 0.5rem;\r\n            }\r\n        }\r\n        \r\n        \/* Animations *\/\r\n        .fade-in {\r\n            opacity: 0;\r\n            transform: translateY(20px);\r\n            transition: opacity 0.6s ease, transform 0.6s ease;\r\n        }\r\n        \r\n        .fade-in.visible {\r\n            opacity: 1;\r\n            transform: translateY(0);\r\n        }\r\n        \r\n        .highlight {\r\n            background: linear-gradient(120deg, rgba(46, 134, 193, 0.2) 0%, rgba(46, 134, 193, 0) 100%);\r\n            padding: 2px 4px;\r\n            border-radius: 2px;\r\n        }\r\n        \r\n        \/* Pied de page *\/\r\n        .article-footer {\r\n            margin-top: 3rem;\r\n            padding-top: 1.5rem;\r\n            border-top: 1px solid #eee;\r\n            text-align: center;\r\n            font-size: 0.9rem;\r\n            color: #666;\r\n        }\r\n        \r\n        .article-footer a {\r\n            color: var(--secondary);\r\n            text-decoration: none;\r\n        }\r\n        \r\n        .article-footer a:hover {\r\n            text-decoration: underline;\r\n        }\r\n        \r\n        \/* Bouton de partage *\/\r\n        .share-buttons {\r\n            display: flex;\r\n            justify-content: center;\r\n            gap: 15px;\r\n            margin-top: 1.5rem;\r\n        }\r\n        \r\n        .share-button {\r\n            display: flex;\r\n            align-items: center;\r\n            justify-content: center;\r\n            width: 40px;\r\n            height: 40px;\r\n            border-radius: 50%;\r\n            background-color: var(--secondary);\r\n            color: white;\r\n            transition: var(--transition);\r\n        }\r\n        \r\n        .share-button:hover {\r\n            transform: translateY(-3px);\r\n            box-shadow: var(--shadow);\r\n        }\r\n    <\/style>\r\n<\/head>\r\n<body>\r\n    <div class=\"promo-banner\">\r\n        <i class=\"fas fa-star\"><\/i> D\u00e9couvrez nos solutions de s\u00e9curit\u00e9 avanc\u00e9es \r\n        <a href=\"https:\/\/tech.kouzay.com\/index.php\/2ozn\" target=\"_blank\">Voir l'offre exclusive<\/a>\r\n    <\/div>\r\n    \r\n    <div class=\"article-container\">\r\n        <header class=\"article-header\">\r\n            <h1 class=\"article-title fade-in\">PromptLock : Le ransomware IA qui inqui\u00e8te les experts<\/h1>\r\n            <div class=\"article-meta\">\r\n                <div class=\"author\">Par l'\u00e9quipe Tech Kouzay<\/div>\r\n                <div class=\"date\">Publi\u00e9 le <span id=\"current-date\"><\/span><\/div>\r\n            <\/div>\r\n        <\/header>\r\n        \r\n        <div class=\"article-content\">\r\n            <div class=\"article-image\">\r\n                <img decoding=\"async\" src=\"https:\/\/tech.kouzay.com\/wp-content\/uploads\/2025\/08\/avertissement-de-cyberse-curite.webp\" alt=\"Illustration IA et Cybers\u00e9curit\u00e9\">\r\n                <div class=\"image-caption\">L'IA r\u00e9volutionne aussi la cybercriminalit\u00e9 avec PromptLock<\/div>\r\n            <\/div>\r\n            \r\n            <p>Un ransomware assez insaisissable, <span class=\"highlight\">PromptLock<\/span>, vient d'\u00eatre d\u00e9couvert par ESET Research. Il inqui\u00e8te les experts en ce qu'il g\u00e9n\u00e8re ses attaques \u00e0 l'aide de l'intelligence artificielle, ce qui complique sa d\u00e9tection par les antivirus traditionnels.<\/p>\r\n            \r\n            <p>La cybers\u00e9curit\u00e9 pousse son curseur un peu plus loin encore, avec la d\u00e9couverte de PromptLock, un ransomware d'un genre nouveau qui exploite l'intelligence artificielle pour g\u00e9n\u00e9rer ses propres scripts malveillants. Les \u00e9quipes d'ESET Research ont identifi\u00e9 ce malware sur VirusTotal le 25 ao\u00fbt dernier, en expliquant comment les cybercriminels s'approprient d\u00e9sormais les outils d'IA pour se livrer \u00e0 leurs malveillances. La trouvaille, m\u00eame si elle reste exp\u00e9rimentale, pr\u00e9figure une nouvelle \u00e8re o\u00f9 les attaques deviennent dynamiques et impr\u00e9visibles.<\/p>\r\n            \r\n            <h2>Comment PromptLock exploite l'IA pour cr\u00e9er des cyberattaques uniques<\/h2>\r\n            \r\n            <p>PromptLock bouleverse les codes \u00e9tablis en utilisant le mod\u00e8le gpt-oss-20b via l'API Ollama pour cr\u00e9er ses scripts d'attaque. Au d\u00e9but du mois d'ao\u00fbt, OpenAI a pr\u00e9sent\u00e9 deux mod\u00e8les de raisonnement IA open source, le puissant gpt-oss-120b (120 milliards de param\u00e8tres), et gpt-oss-20b, plus l\u00e9ger, rapide et \u00e9conomique pour des usages quotidiens. Mais revenons \u00e0 nos moutons, et \u00e0 PromptLock.<\/p>\r\n            \r\n            <div class=\"highlight-box fade-in\">\r\n                <p>Comme l'explique le sp\u00e9cialiste cyber Anton Cherepanov d'ESET : \u00ab Le malware envoie des prompts cod\u00e9s en dur \u00e0 un serveur Ollama, qui g\u00e9n\u00e8re ensuite des scripts malveillants \u00bb.<\/p>\r\n            <\/div>\r\n            \r\n            <p>Cela permet au ransomware de s'adapter constamment, en rendant chaque infection potentiellement unique. Sur le papier, on per\u00e7oit le potentiel mal\u00e9fique de la chose.<\/p>\r\n            \r\n            <p>Le fonctionnement repose sur la g\u00e9n\u00e9ration en temps r\u00e9el de scripts Lua, un langage de programmation l\u00e9ger mais redoutablement efficace. Ces scripts, cr\u00e9\u00e9s \u00e0 la vol\u00e9e par l'IA, orchestrent l'ensemble du processus d'infection, autrement dit la reconnaissance du syst\u00e8me, l'identification des fichiers sensibles et le chiffrement des donn\u00e9es. L'architecture du malware cible \u00e0 la fois les environnements Windows et Linux, ce qui \u00e9largit consid\u00e9rablement son rayon d'action potentiel.<\/p>\r\n            \r\n            <blockquote class=\"fade-in\">\r\n                <p>\u00ab Avec l'aide de l'IA, lancer des attaques sophistiqu\u00e9es est devenu dramatiquement plus facile \u2013 \u00e9liminant le besoin d'\u00e9quipes de d\u00e9veloppeurs qualifi\u00e9s \u00bb<\/p>\r\n            <\/blockquote>\r\n            \r\n            <p>Cette mutation technologique inqui\u00e8te les experts. \u00ab Avec l'aide de l'IA, lancer des attaques sophistiqu\u00e9es est devenu dramatiquement plus facile \u2013 \u00e9liminant le besoin d'\u00e9quipes de d\u00e9veloppeurs qualifi\u00e9s \u00bb, soulignent les chercheurs d'ESET. Le constat est gla\u00e7ant, mais il red\u00e9finit les r\u00e8gles du jeu en mati\u00e8re de cybercriminalit\u00e9, o\u00f9 un seul individu peut d\u00e9sormais orchestrer des attaques complexes.<\/p>\r\n            \r\n            <h2>Une menace encore embryonnaire mais d\u00e9j\u00e0 pr\u00e9occupante<\/h2>\r\n            \r\n            <p>Faut-il c\u00e9der \u00e0 la panique ? Pour l'instant, PromptLock reste confin\u00e9 aux laboratoires virtuels. ESET pr\u00e9cise n'avoir \u00ab pas observ\u00e9 ces \u00e9chantillons dans [leur] t\u00e9l\u00e9m\u00e9trie \u00bb, ce qui sugg\u00e8re que le malware n'a pas encore frapp\u00e9 de vraies victimes. Pas encore. Les chercheurs restent prudents et pr\u00e9f\u00e8rent alerter : \u00ab Nous pensons qu'il est de notre responsabilit\u00e9 d'informer la communaut\u00e9 cybers\u00e9curit\u00e9 de ces d\u00e9veloppements \u00bb, disent-ils.<\/p>\r\n            \r\n            <p>L'aspect le plus troublant r\u00e9side dans la variabilit\u00e9 des indicateurs de compromission (IoCs). Chaque ex\u00e9cution g\u00e9n\u00e8re potentiellement des scripts diff\u00e9rents qui compliquent, et pas qu'un peu, le travail des solutions antivirus traditionnelles. \u00ab Si correctement impl\u00e9ment\u00e9, cela pourrait consid\u00e9rablement compliquer la d\u00e9tection et rendre le travail des d\u00e9fenseurs consid\u00e9rablement plus difficile \u00bb, pr\u00e9vient l'\u00e9quipe d'ESET Research.<\/p>\r\n            \r\n            <p>La viabilit\u00e9 technique de l'attaque ne fait, pour elle, aucun doute. Les cybercriminels n'ont pas besoin de d\u00e9ployer le mod\u00e8le IA complet sur les r\u00e9seaux compromis. Un simple tunnel ou proxy vers un serveur externe h\u00e9bergeant le mod\u00e8le suffit, une technique au passage couramment ma\u00eetris\u00e9e dans les cyberattaques modernes. Cette simplicit\u00e9 de mise en \u0153uvre laisse pr\u00e9sager une adoption rapide par les groupes criminels organis\u00e9s.<\/p>\r\n            \r\n            <div class=\"security-tips\">\r\n                <h3><i class=\"fas fa-shield-alt\"><\/i> Conseils de s\u00e9curit\u00e9 pour se prot\u00e9ger<\/h3>\r\n                <ul>\r\n                    <li>Maintenez tous vos logiciels et syst\u00e8mes d'exploitation \u00e0 jour<\/li>\r\n                    <li>Utilisez des solutions antivirus de nouvelle g\u00e9n\u00e9ration<\/li>\r\n                    <li>Sauvegardez r\u00e9guli\u00e8rement vos donn\u00e9es importantes<\/li>\r\n                    <li>M\u00e9fiez-vous des emails et pi\u00e8ces jointes suspects<\/li>\r\n                    <li>Formez vos \u00e9quipes aux bonnes pratiques de cybers\u00e9curit\u00e9<\/li>\r\n                <\/ul>\r\n            <\/div>\r\n            \r\n            <p>Pour en savoir plus sur les solutions de protection avanc\u00e9es contre ce type de menace, <a href=\"https:\/\/tech.kouzay.com\/index.php\/2ozn\" target=\"_blank\">d\u00e9couvrez notre s\u00e9lection d'outils de s\u00e9curit\u00e9<\/a> sp\u00e9cialement adapt\u00e9s aux nouvelles menaces IA.<\/p>\r\n        <\/div>\r\n        \r\n       \r\n    <\/div>\r\n\r\n    <script>\r\n        \/\/ Animation d'apparition des \u00e9l\u00e9ments au d\u00e9filement\r\n        document.addEventListener('DOMContentLoaded', function() {\r\n            \/\/ Afficher la date du jour\r\n            const now = new Date();\r\n            const options = { day: 'numeric', month: 'long', year: 'numeric' };\r\n            document.getElementById('current-date').textContent = now.toLocaleDateString('fr-FR', options);\r\n            \r\n            const fadeElements = document.querySelectorAll('.fade-in');\r\n            \r\n            const fadeInOptions = {\r\n                threshold: 0.3,\r\n                rootMargin: '0px 0px -50px 0px'\r\n            };\r\n            \r\n            const fadeInObserver = new IntersectionObserver(function(entries, observer) {\r\n                entries.forEach(entry => {\r\n                    if (entry.isIntersecting) {\r\n                        entry.target.classList.add('visible');\r\n                        observer.unobserve(entry.target);\r\n                    }\r\n                });\r\n            }, fadeInOptions);\r\n            \r\n            fadeElements.forEach(element => {\r\n                fadeInObserver.observe(element);\r\n            });\r\n            \r\n            \/\/ Animation pour les \u00e9l\u00e9ments highlight au survol\r\n            const highlights = document.querySelectorAll('.highlight');\r\n            highlights.forEach(highlight => {\r\n                highlight.addEventListener('mouseenter', function() {\r\n                    this.style.transition = 'var(--transition)';\r\n                    this.style.background = 'linear-gradient(120deg, rgba(46, 134, 193, 0.3) 0%, rgba(46, 134, 193, 0.1) 100%)';\r\n                });\r\n                \r\n                highlight.addEventListener('mouseleave', function() {\r\n                    this.style.background = 'linear-gradient(120deg, rgba(46, 134, 193, 0.2) 0%, rgba(46, 134, 193, 0) 100%)';\r\n                });\r\n            });\r\n            \r\n            \/\/ Animation pour le bouton de promotion\r\n            const promoLink = document.querySelector('.promo-banner a');\r\n            promoLink.addEventListener('mouseenter', function() {\r\n                this.style.transform = 'translateY(-2px)';\r\n            });\r\n            \r\n            promoLink.addEventListener('mouseleave', function() {\r\n                this.style.transform = 'translateY(0)';\r\n            });\r\n        });\r\n    <\/script>\r\n<\/body>\r\n<\/html>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>PromptLock : Le ransomware IA qui inqui\u00e8te les experts | Tech Kouzay D\u00e9couvrez nos solutions de s\u00e9curit\u00e9 avanc\u00e9es Voir l&rsquo;offre exclusive PromptLock : Le ransomware&#8230;<\/p>\n","protected":false},"author":2,"featured_media":5952,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_wp_convertkit_post_meta":{"form":"-1","landing_page":"","tag":"0","restrict_content":"0"},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[189,190,204,208,210,211,213,214],"tags":[],"class_list":["post-5945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accueil","category-actualites","category-consommateurs-high-tech","category-cybersecurite-vpn","category-dossier","category-education","category-entrepreneurs-tech","category-etudiants-parents"],"jetpack_featured_media_url":"https:\/\/tech.kouzay.com\/wp-content\/uploads\/2025\/08\/PromptLock.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/posts\/5945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/comments?post=5945"}],"version-history":[{"count":10,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/posts\/5945\/revisions"}],"predecessor-version":[{"id":5958,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/posts\/5945\/revisions\/5958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/media\/5952"}],"wp:attachment":[{"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/media?parent=5945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/categories?post=5945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.kouzay.com\/index.php\/wp-json\/wp\/v2\/tags?post=5945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}