{"id":1489,"date":"2025-09-18T12:04:36","date_gmt":"2025-09-18T10:04:36","guid":{"rendered":"https:\/\/cyberforgood.org\/media\/"},"modified":"2026-02-17T17:00:41","modified_gmt":"2026-02-17T16:00:41","slug":"media","status":"publish","type":"page","link":"https:\/\/cyberforgood.org\/de\/media\/","title":{"rendered":"M\u00e9dia"},"content":{"rendered":"<section id=\"block-section-hero-block_18cb87a6a326ab27e36309cea1b43d88\" class=\"block-section-hero media\"><div class=\"content-wrapper\"><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/0.jpg\" width=\"498\" height=\"877\" alt=\"Media\"><div class=text-wrapper><h2 class=\"section-title\">\u270d <span>Cyber for Good M\u00e9dia<\/span> I Prot\u00e9ger les journalistes ind\u00e9pendants et de la PQR face \u00e0 la menace informatique<\/h2><p>Les journalistes sont de plus en plus cibl\u00e9s par les cyberattaques et par les manipulations de l\u2019information en raison de leur visibilit\u00e9 et de leur r\u00f4le critique dans la diffusion d\u2019informations parfois tr\u00e8s sensibles.<\/p>\n<p>Notre mission ? Mieux les prot\u00e9ger et les outiller face aux ing\u00e9rences et aux risques de manipulation dans l\u2019espace num\u00e9rique. Ce programme est destin\u00e9 aux journalistes et aux m\u00e9dias ind\u00e9pendants, et \u00e0 la presse quotidienne r\u00e9gionale (PQR).<\/p>\n<p>Un programme fond\u00e9 par Advens for People and Planet et VIGINUM, en partenariat avec Les Surligneurs et coop.m\u00e9dias.<\/p>\n<div class=hero-logos><div><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/Logo-AFPP-2024-couleurs-1-300x104.png\" width=\"300\" height=\"104\" alt=\"Advens for People and Planet\"><\/div><div><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/Viginum-logo.svg\" width=\"1\" height=\"1\" alt=\"Viginum\"><\/div><div><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/cropped-cm-deux-lignes-violet-300x108.png\" width=\"300\" height=\"108\" alt=\"Coop-medias\"><\/div><div><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/10\/logo_lessurligneur-crop-300x71.png\" width=\"300\" height=\"71\" alt=\"Logo Les Surligneurs\"><\/div><\/div><div class=button-wrapper><button class=white-hover><a href=\"#formulaire-media\" title=\"Je postule maintenant\" target=\"\">Je postule maintenant<\/a><\/button><button class=white-hover><a href=\"\/modules\/media\" title=\"J'explore les modules\" target=\"\">J&#8217;explore les modules<\/a><\/button><div class=button-wrapper><\/div><\/div><\/section>\n\n<section id=\"section-point-list-block_7741a3254d843129ae624801e7234408\" class=\"section-point-list\"><div class=content-wrapper><h2 class=section-title>Le programme de l\u2019Academy Cyber for Good MEDIA<\/h2><ul class=col-3><li class=\"point\"><em class=\"big-number\">01.<\/em><div><p><strong>PROT\u00c9GER<\/strong> | S\u00e9curiser les donn\u00e9es personnelles des journalistes et de leurs sources.<\/p>\n<\/div><\/li><li class=\"point\"><em class=\"big-number\">02.<\/em><div><p><strong>OUTILLER<\/strong> | Comprendre les m\u00e9caniques de l\u2019espace informationnel num\u00e9rique, investiguer et v\u00e9rifier les informations \u00e0 travers l&#8217;OSINT.<\/p>\n<\/div><\/li><li class=\"point\"><em class=\"big-number\">03.<\/em><div><p><strong>ACCOMPAGNER<\/strong> | Poursuivre la formation \u00e0 travers des bin\u00f4mes de journalistes et d&#8217;experts cyber-LMI pour appuyer une enqu\u00eate en cours.<\/p>\n<\/div><\/li><\/ul><button><a href=\"#formulaire-media\" title=\"\u270c\ud83c\udffb Je postule maintenant\">\u270c\ud83c\udffb Je postule maintenant<\/a><\/button><\/div><\/section>\n\n<section id=\"block-calendar-block_edfd1ff8db00b9f97554b6b1b85e56b8\" class=\"block-calendar\"><div class=content-wrapper><h2 class=section-title>Le calendrier<\/h2><ul class=\"month-list col-9\"><li class=\"month\"><em class=\"big-number\">3 November 2025<\/em><div class=modules-wrapper><p>Ouverture de l\u2019appel \u00e0 candidature Cyber for Good MEDIA<\/p><\/div><li class=\"month\"><em class=\"big-number\">5 Dezember 2025<\/em><div class=modules-wrapper><p>Cl\u00f4ture de l\u2019appel \u00e0 candidature Cyber for Goof MEDIA<\/p><\/div><li class=\"month\"><em class=\"big-number\">16 Dezember 2025<\/em><div class=modules-wrapper><p>Annonce des laur\u00e9ats<\/p><\/div><li class=\"month\"><em class=\"big-number\">23 Januar 2026<\/em><div class=modules-wrapper><p>Bootcamp \u00e0 Paris<\/p><div class=\"module-intro-long\"><p><strong>Module 1<\/strong> I Cyber d\u00e9monstration &amp; bonnes pratiques\u00a0: comprendre les vuln\u00e9rabilit\u00e9s de l\u2019espace num\u00e9rique &#8211; Advens<\/p>\n<p><strong>Module 2<\/strong> I Etat de la menace informationnelle pour les journalistes \u2013 VIGINUM<\/p>\n<p><strong>Module 3<\/strong> I Legal Checking &amp; Municipales : comment trouver un sujet juridiquement v\u00e9rifiable ? Comment angler son article juridiquement ? &#8211; Vincent Couronne, Les Surligneurs<\/p>\n<p><strong>Module 4<\/strong> I La menace informationnelle en p\u00e9riode \u00e9lectorale &#8211; VIGINUM<\/p>\n<\/div><\/div><li class=\"month\"><em class=\"big-number\">Februar<br>2026<\/em><div class=modules-wrapper><p>En ligne<\/p><div class=\"module-intro-long\"><p><strong>Module 5<\/strong> I Comprendre l\u2019Intelligence Artificielle : fonctionnement, outils et bonnes pratiques pour les journalistes \u2013 Advens<\/p>\n<\/div><\/div><li class=\"month\"><em class=\"big-number\">M\u00e4rz<br>2026<\/em><div class=modules-wrapper><p>En ligne<\/p><div class=\"module-intro-long\"><p><strong>Module 6<\/strong> I Dear America, des (fausses) nouvelles d\u2019outre-Atlantique \u2013 Masterclass<\/p>\n<\/div><\/div><li class=\"month\"><em class=\"big-number\">April<br>2026<\/em><div class=modules-wrapper><p>En ligne<\/p><div class=\"module-intro-long\"><p><strong>Module 7<\/strong> I OSINT 1\u00a0: comment investiguer\u00a0comme un analyste de VIGINUM ? \u2013 VIGINUM<\/p>\n<\/div><\/div><li class=\"month\"><em class=\"big-number\">Mai<br>2026<\/em><div class=modules-wrapper><p>En ligne<\/p><div class=\"module-intro-long\"><p><strong>Module 8<\/strong> I OSINT 2\u00a0: Collecter, analyser et capitaliser les donn\u00e9es issues d\u2019investigation &#8211; VIGINUM<\/p>\n<\/div><\/div><li class=\"month\"><em class=\"big-number\">Juni<br>2026<\/em><div class=modules-wrapper><p>Journ\u00e9e de cl\u00f4ture \u00e0 Paris<\/p><div class=\"module-intro-long\"><p><strong>MODULE 9<\/strong> I Keynote + Training \u00e0 l\u2019OSINT I Check First Network<\/p>\n<p><strong>MODULE 10<\/strong> I Identification d\u2019une enqu\u00eate ou d\u2019un projet \u00e9ditorial n\u00e9cessitant de comp\u00e9tences OSINT et\/ou cyber.<\/p>\n<\/div><\/div><\/ul><\/div><\/section>\n\n<section id=\"block-image-text-block_986025ec9ee4bcca9fc3c38ed35f169b\" class=\"block-image-text\"><div class=\"content-wrapper no-image image-left\"><div class=text-wrapper><h1 style=\"text-align: center;\"><strong>Les enjeux<\/strong><\/h1>\n<p>Les manipulations de l\u2019information, et notamment les ing\u00e9rences num\u00e9riques \u00e9trang\u00e8res ont massivement contribu\u00e9 \u00e0 la polarisation de l\u2019opinion publique. Ces ph\u00e9nom\u00e8nes ont facilit\u00e9 la diffusion des discours haineux et radicaux. Ils ont affaibli la stabilit\u00e9 de notre soci\u00e9t\u00e9 en r\u00e9duisant la confiance dans les institutions \u00e9tatiques, le mod\u00e8le d\u00e9mocratique fran\u00e7ais et les m\u00e9dias traditionnels.<\/p>\n<p style=\"text-align: left;\">Bien qu\u2019aucun de ces ph\u00e9nom\u00e8nes ne soit nouveau, ils ont r\u00e9cemment pris une ampleur in\u00e9dite du fait des nouveaux modes de production, de diffusion et de consommation de l\u2019information, \u00e0 la faveur des plateformes en ligne et de l\u2019apparition de nouvelles technologies, dont l\u2019intelligence artificielle g\u00e9n\u00e9rative.<\/p>\n<p style=\"text-align: left;\">L\u2019espace informationnel en ligne est aujourd\u2019hui marqu\u00e9 plusieurs ph\u00e9nom\u00e8nes :<\/p>\n<h3 style=\"text-align: left;\"><strong>1. La prolif\u00e9ration des manipulations de l\u2019information sur internet fragilise les m\u00e9dias traditionnels en tant qu\u2019acteur de confiance<\/strong><\/h3>\n<p>L\u2019espace informationnel est devenu un terrain de conflit o\u00f9 les contenus sont con\u00e7us et d\u00e9ploy\u00e9s comme des armes strat\u00e9giques offensives. La de l\u2019information se manifeste par la diffusion cibl\u00e9e de contenus manipul\u00e9s, visant \u00e0 influencer l\u2019opinion publique, d\u00e9stabiliser des institutions ou semer le chaos.<\/p>\n<p>Ce ph\u00e9nom\u00e8ne est accentu\u00e9 par la prolif\u00e9ration massive des manipulations de l\u2019information sur internet, qui se propagent rapidement gr\u00e2ce aux algorithmes et \u00e0 la viralit\u00e9 des plateformes num\u00e9riques. Ces fausses informations exploitent les biais cognitifs des utilisateurs, exacerbent les tensions sociales et affaiblissent la confiance dans les m\u00e9dias traditionnels et les institutions. La rapidit\u00e9 et la facilit\u00e9 de diffusion de ces contenus rendent leur contr\u00f4le particuli\u00e8rement difficile, transformant internet et ses r\u00e9seaux sociaux en vecteurs puissants de d\u00e9sinformation.<\/p>\n<h3 style=\"text-align: left;\"><strong>2. <\/strong><strong>Les ing\u00e9rences num\u00e9riques \u00e9trang\u00e8res, la manipulation et la radicalisation <\/strong><strong>des discours propuls\u00e9s par l\u2019\u00e9conomie de l\u2019\u00e9motion <\/strong><\/h3>\n<p>Les ing\u00e9rences num\u00e9riques \u00e9trang\u00e8res (INE) dans le d\u00e9bat public num\u00e9rique se traduisent par des campagnes de manipulation sophistiqu\u00e9es, orchestr\u00e9es par des acteurs \u00e9trangers hostiles pour servir des int\u00e9r\u00eats g\u00e9opolitiques, id\u00e9ologiques ou \u00e9conomiques. Ces ing\u00e9rences utilisent des techniques, tactiques et proc\u00e9dures sp\u00e9cifiques pour orienter les opinions, semer la confusion et fragiliser la coh\u00e9sion sociale. Parall\u00e8lement, la radicalisation des propos sur les r\u00e9seaux s\u2019intensifie, largement aliment\u00e9e par une \u00e9conomie de l\u2019\u00e9motion. Les plateformes num\u00e9riques exploitent les \u00e9motions fortes \u2013 col\u00e8re, peur, indignation \u2013 pour maximiser l\u2019engagement des utilisateurs, favorisant ainsi la polarisation et l\u2019exacerbation des discours extr\u00eames. Cette dynamique contribue \u00e0 cr\u00e9er un climat social tendu, o\u00f9 la manipulation se nourrit des passions collectives, renfor\u00e7ant la fragmentation des soci\u00e9t\u00e9s.<\/p>\n<h3 style=\"text-align: left;\"><strong>3. Une pression \u00e9conomique et politique sur les m\u00e9dias sans pr\u00e9c\u00e9dent<\/strong><\/h3>\n<p>La diffusion massive de contenus m\u00e9diatis\u00e9s, souvent sans le filtre rigoureux du journalisme professionnel, constitue une autre facette des d\u00e9fis contemporains. Le flux constant d\u2019informations, d\u2019opinions et de rumeurs circulant sur internet s\u2019affranchit fr\u00e9quemment des crit\u00e8res d\u2019exactitude, de v\u00e9rification et de d\u00e9ontologie journalistique, ce qui complique la distinction entre information fiable et manipulation. Par ailleurs, les m\u00e9dias traditionnels, confront\u00e9s \u00e0 une concurrence accrue, subissent une pression croissante de la r\u00e9gie publicitaire et des actionnaires. Cette d\u00e9pendance \u00e9conomique entra\u00eene une perte d\u2019ind\u00e9pendance \u00e9ditoriale et pousse certains m\u00e9dias \u00e0 adopter des positions moins partisanes mais \u00e9galement moins critiques, ou \u00e0 privil\u00e9gier des contenus sensationnalistes et commerciaux. Cette situation fragilise la qualit\u00e9 de l\u2019information et la confiance du public envers les m\u00e9dias, amplifiant ainsi le r\u00f4le des r\u00e9seaux sociaux comme source d\u2019information principale, mais souvent non v\u00e9rifi\u00e9e.<\/p>\n<p style=\"text-align: left;\">L\u2019information erron\u00e9e et malveillante se propage en quelques heures notamment \u00e0 cause du partage sans v\u00e9rification de textes, d\u2019images, de vid\u00e9os ou de liens vers des sites en ligne, rendu possible \u00e0 travers les contenus sponsoris\u00e9s et les syst\u00e8mes robotis\u00e9s. Le ph\u00e9nom\u00e8ne est d\u00e9sormais global et met en p\u00e9ril les d\u00e9mocraties du monde entier.<\/p>\n<p style=\"text-align: left;\"><strong>En tant qu\u2019acteurs cl\u00e9s de l\u2019\u00e9cosyst\u00e8me informationnel, les m\u00e9dias et journalistes sont des cibles de la guerre informationnelle men\u00e9e par des acteurs \u00e9trangers prot\u00e9iformes (\u00e9tat \u00e9tranger, soci\u00e9t\u00e9 priv\u00e9 malveillante, groupes hacktivistes et terroristes<\/strong><strong>).<\/strong><\/p>\n<p style=\"text-align: left;\">Les m\u00e9dias ont aussi vu une augmentation significative des cyberattaques au cours des derni\u00e8res ann\u00e9es, en raison de leur visibilit\u00e9 et de leur r\u00f4le critique dans la diffusion d&#8217;informations parfois tr\u00e8s sensibles d\u2019un point de vue g\u00e9opolitique. Ils doivent pouvoir \u00eatre accompagn\u00e9s par des experts et outill\u00e9s pour faire face aux menaces qui p\u00e8sent sur eux.. et pour mettre en place des bonnes pratiques de protection de leurs donn\u00e9es et de leurs informations sensibles.<\/p>\n<p style=\"text-align: left;\">Fort de ce constat, AFPP et VIGINUM ont d\u00e9cid\u00e9 de s\u2019associer pour cr\u00e9er le programme Cyber for Good MEDIA afin d\u2019accompagner des journalistes les plus expos\u00e9s \u00e0 la menace cyber et aux manipulations de l\u2019information, notamment les journalistes ind\u00e9pendants et de la presse quotidienne r\u00e9gionale (PQR). Ce programme m\u00ealant les bases de cybers\u00e9curit\u00e9 avec les fondamentaux de la lutte contre les manipulations de l\u2019information, offrira les cl\u00e9s de compr\u00e9hension et les outils permettant le renforcement de la r\u00e9silience informationnelle.<\/p>\n<button><a href=\"#formulaire-media\" title=\"Je postule maintenant !\">Je postule maintenant !<\/a><\/button><\/div><\/div><\/section>\n\n<section id=\"formulaire-media\" class=\"block-form\"><div class=\"content-wrapper\"><\/div><\/section>\n\n<section data-block-id=\"block_cca6e30ddda13768741763b2dcbe95cc\" id=\"block-two-sectionsblock_cca6e30ddda13768741763b2dcbe95cc\" class=\"block-two-sections\"><div class=content-wrapper><div class=\"sections-wrapper col-1\" style=\"background-color:#f8d096\"><article class=\"section-site ess\"><div class=two-section-header><img decoding=\"async\" src=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-ESS.svg\" alt=\"Pastille ESS\"><h3><span>Cyber for Good ESS<\/span> I La cybers\u00e9curit\u00e9 pour les organisations \u00e0 impact<\/h3><\/div><div class=two-sections_text><p>Le premier programme gratuit pour sensibiliser et accompagner les acteurs de l\u2019Economie Sociale et Solidaire aux enjeux cyber !<\/p>\n<p>Un programme fond\u00e9 par Advens for People and Planet, Latitudes et Share It.<\/p>\n<\/div><button><a href=\"https:\/\/cyberforgood.org\/ess\/\" title=\"D\u00e9couvrir ESS\" target=\"\">D\u00e9couvrir ESS<\/a><\/button><\/article><\/div><\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1475,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1489","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>M\u00e9dia - Cyber for Good<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforgood.org\/de\/media\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M\u00e9dia - Cyber for Good\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforgood.org\/de\/media\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber for Good\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-17T16:00:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforgood.org\/de\/media\/\",\"url\":\"https:\/\/cyberforgood.org\/de\/media\/\",\"name\":\"M\u00e9dia - Cyber for Good\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforgood.org\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforgood.org\/de\/media\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforgood.org\/de\/media\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg\",\"datePublished\":\"2025-09-18T10:04:36+00:00\",\"dateModified\":\"2026-02-17T16:00:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforgood.org\/de\/media\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforgood.org\/de\/media\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/cyberforgood.org\/de\/media\/#primaryimage\",\"url\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg\",\"contentUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg\",\"caption\":\"Pastille M\u00e9dia\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforgood.org\/de\/media\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/cyberforgood.org\/de\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"M\u00e9dia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforgood.org\/de\/#website\",\"url\":\"https:\/\/cyberforgood.org\/de\/\",\"name\":\"Cyber for Good\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyberforgood.org\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforgood.org\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforgood.org\/de\/#organization\",\"name\":\"Cyber for Good\",\"url\":\"https:\/\/cyberforgood.org\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/cyberforgood.org\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg\",\"contentUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg\",\"caption\":\"Cyber for Good\"},\"image\":{\"@id\":\"https:\/\/cyberforgood.org\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"M\u00e9dia - Cyber for Good","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforgood.org\/de\/media\/","og_locale":"de_DE","og_type":"article","og_title":"M\u00e9dia - Cyber for Good","og_url":"https:\/\/cyberforgood.org\/de\/media\/","og_site_name":"Cyber for Good","article_modified_time":"2026-02-17T16:00:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberforgood.org\/de\/media\/","url":"https:\/\/cyberforgood.org\/de\/media\/","name":"M\u00e9dia - Cyber for Good","isPartOf":{"@id":"https:\/\/cyberforgood.org\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforgood.org\/de\/media\/#primaryimage"},"image":{"@id":"https:\/\/cyberforgood.org\/de\/media\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg","datePublished":"2025-09-18T10:04:36+00:00","dateModified":"2026-02-17T16:00:41+00:00","breadcrumb":{"@id":"https:\/\/cyberforgood.org\/de\/media\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforgood.org\/de\/media\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/cyberforgood.org\/de\/media\/#primaryimage","url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg","contentUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Pastille-MEDIA.svg","caption":"Pastille M\u00e9dia"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforgood.org\/de\/media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cyberforgood.org\/de\/home\/"},{"@type":"ListItem","position":2,"name":"M\u00e9dia"}]},{"@type":"WebSite","@id":"https:\/\/cyberforgood.org\/de\/#website","url":"https:\/\/cyberforgood.org\/de\/","name":"Cyber for Good","description":"","publisher":{"@id":"https:\/\/cyberforgood.org\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforgood.org\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/cyberforgood.org\/de\/#organization","name":"Cyber for Good","url":"https:\/\/cyberforgood.org\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/cyberforgood.org\/de\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","contentUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","caption":"Cyber for Good"},"image":{"@id":"https:\/\/cyberforgood.org\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/pages\/1489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/comments?post=1489"}],"version-history":[{"count":1,"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/pages\/1489\/revisions"}],"predecessor-version":[{"id":1495,"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/pages\/1489\/revisions\/1495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/media\/1475"}],"wp:attachment":[{"href":"https:\/\/cyberforgood.org\/de\/wp-json\/wp\/v2\/media?parent=1489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}