{"id":10103,"date":"2024-03-16T10:43:46","date_gmt":"2024-03-16T10:43:46","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=10103"},"modified":"2024-03-16T10:47:44","modified_gmt":"2024-03-16T10:47:44","slug":"semaine-2024-11","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/","title":{"rendered":"Semaine 2024-11"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10103\" class=\"elementor elementor-10103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-237e4301 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"237e4301\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-702612c9\" data-id=\"702612c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2099b4f elementor-widget elementor-widget-toggle\" data-id=\"2099b4f\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3411\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-3411\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Fin de la fonction d'URL sur OneDrive<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3411\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-3411\"><p>\/ <span style=\"font-weight: 400;\">Microsoft supprime la fonction de t\u00e9l\u00e9chargement d&#8217;URL de OneDrive le 29 mars 2024 en raison de co\u00fbts \u00e9lev\u00e9s et d&#8217;une faible utilisation. Les utilisateurs doivent trouver des alternatives, mais les fichiers existants ne seront pas affect\u00e9s.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3412\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-3412\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Piratage COM : adaptation des menaces malveillantes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3412\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-3412\"><p>\/ Depuis 2023, des logiciels malveillants exploitent le piratage COM pour persister sur Windows, notamment Berbeo et des rats. Certains comme le RAT Darkme utilisent le CVE-2024-21412. Ils d\u00e9sactivent le pare-feu et l&#8217;UAC, persistant dans des dossiers tels que \\qmacro. La protection, comme Perimeter81, est cruciale.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3413\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-3413\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Elon Musk lance Grok de xAI : d\u00e9bat sur l'Open Source<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3413\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-3413\"><p>\/ Elon Musk lance Grok, un chatbot concurrent de ChatGPT, via sa startup xAI. Le proc\u00e8s intent\u00e9 contre OpenAI pour son \u00e9loignement de l&#8217;open source suscite un d\u00e9bat sur ce sujet.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3414\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-3414\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">CTEM : nouvelle fronti\u00e8re de la s\u00e9curit\u00e9 num\u00e9rique<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3414\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-3414\"><p>\/ La Gestion Continue de l&#8217;Exposition aux Menaces (CTEM) transforme la s\u00e9curit\u00e9 en int\u00e9grant simulation d&#8217;attaques, \u00e9valuation des risques et conseils de rem\u00e9diation pour une approche proactive et coordonn\u00e9e.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3415\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-3415\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> Microsoft adoucit la promotion d'Edge dans Windows 11, des am\u00e9liorations persistantes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3415\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-3415\"><p>\/ Microsoft r\u00e9duit la promotion d&#8217;Edge dans Windows 11 en r\u00e9ponse aux r\u00e9glementations europ\u00e9ennes, mais doit encore mieux r\u00e9pondre aux attentes des utilisateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3416\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-3416\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">L'IA : un atout sous-utilis\u00e9 pour les PME, mais une tendance croissante<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3416\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-3416\"><p>\/ Les PME britanniques montrent un grand int\u00e9r\u00eat pour l&#8217;IA, mais la plupart n&#8217;en comprennent pas pleinement le potentiel. Seuls 51 % des d\u00e9cideurs informatiques saisissent ses avantages, et 20 % la ma\u00eetrisent totalement. Malgr\u00e9 cela, les investissements dans l&#8217;IA devraient augmenter en 2024, les dirigeants la consid\u00e9rant comme cruciale pour leur succ\u00e8s \u00e0 venir.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3417\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-3417\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Des indices de sortie : Surface Laptop 6 et Surface Pro 10 en approche ?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3417\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-3417\"><p>\/ Apple renforce la confidentialit\u00e9 des messages iMessage en ajoutant le cryptage post-quantique PQ3 pour contrer les menaces potentielles des ordinateurs quantiques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3418\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-3418\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Agences gouvernementales fran\u00e7aises sous l'assaut de puissantes attaques DDoS<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3418\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-3418\"><p>\/ Des attaques DDoS massives ont vis\u00e9 plusieurs agences gouvernementales fran\u00e7aises, provoquant d&#8217;importantes interruptions sur leurs sites Web, confirm\u00e9es par Cloudflare, le Premier ministre fran\u00e7ais Gabriel Attal et FalconFeeds.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-3419\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-3419\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9 SSRF critique dans ChatGPT-Next-Web expos\u00e9e<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-3419\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-3419\"><p>\/ Faille critique de s\u00e9curit\u00e9, ChatGPT-Next-Web SSRF, menace la confidentialit\u00e9. NextChat \u00e9galement vuln\u00e9rable (CVE-2023-49785, gravit\u00e9 9.1) sans correctif. Urgence de mesures de s\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34110\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-34110\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Faiblesse de s\u00e9curit\u00e9 dans l'IA Gemini de Google face \u00e0 la manipulation de contenu<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34110\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-34110\"><p>\/ L&#8217;IA Gemini de Google pr\u00e9sente des vuln\u00e9rabilit\u00e9s similaires \u00e0 d&#8217;autres outils GenAI comme ChatGPT, exposant un risque pour la confidentialit\u00e9 des donn\u00e9es et suscitant des pr\u00e9occupations en mati\u00e8re de s\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34111\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-34111\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Critiques s\u00e9v\u00e8res contre l'utilisation de Microsoft 365 par la commission europ\u00e9enne<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34111\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-34111\"><p>\/ La Commission europ\u00e9enne est critiqu\u00e9e pour des violations graves de la protection des donn\u00e9es li\u00e9es \u00e0 l&#8217;utilisation de Microsoft 365, mettant en \u00e9vidence les lacunes de protection des donn\u00e9es, notamment en mati\u00e8re de transfert de donn\u00e9es personnelles hors de l&#8217;UE\/EEE.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34112\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-34112\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Sud-Cor\u00e9en arr\u00eat\u00e9 en Russie pour cyberespionnage<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34112\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-34112\"><p>\/ La Russie a arr\u00eat\u00e9 un citoyen sud-cor\u00e9en \u00e0 Vladivostok pour des activit\u00e9s de cyberespionnage, le transf\u00e9rant \u00e0 Moscou pour enqu\u00eate, rapporte l&#8217;agence de presse TASS.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34113\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-34113\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">OpenAI r\u00e9pond promptement aux failles de s\u00e9curit\u00e9 des plugins ChatGPT<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34113\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-34113\"><p>\/ OpenAI a corrig\u00e9 rapidement les failles de s\u00e9curit\u00e9 dans ses plugins ChatGPT, d\u00e9montrant son engagement envers la s\u00e9curit\u00e9 des donn\u00e9es des utilisateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34114\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-34114\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">L'IA : entre les attentes et la r\u00e9alit\u00e9<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34114\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-34114\"><p>\/ En 2023, malgr\u00e9 l&#8217;engouement pour l&#8217;intelligence artificielle, il est important de rappeler que ses capacit\u00e9s sont parfois surestim\u00e9es, par rapport \u00e0 sa popularit\u00e9 croissante. L&#8217;apprentissage automatique, qui en constitue le fondement, existe depuis les ann\u00e9es 1950.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34115\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-34115\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Mars 2024 : Microsoft corrige 59 vuln\u00e9rabilit\u00e9s critiques<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34115\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-34115\"><p>\/ Microsoft a corrig\u00e9 59 vuln\u00e9rabilit\u00e9s dans son Patch Tuesday de mars 2024. Parmi elles, les CVE critiques sont : CVE-2024-21408 (d\u00e9ni de service dans Windows Hyper-V) et CVE-2024-21407 (ex\u00e9cution de code \u00e0 distance dans Hyper-V).<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34116\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-34116\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Alerte : Campagne de phishing via VCURMS et STRRAT<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34116\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-34116\"><p>\/ Nouvelle campagne de phishing utilisant VCURMS et STRRAT via AWS et GitHub. M\u00e9thodes sophistiqu\u00e9es incluent l&#8217;utilisation de Proton Mail. La vigilance est essentielle.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34117\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-34117\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans l'IA Gemini de Google mises en lumi\u00e8re par des chercheurs<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34117\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-34117\"><p>\/ Des failles de s\u00e9curit\u00e9 dans l&#8217;IA Gemini de Google exposent les utilisateurs aux menaces LLM, mettant en danger les donn\u00e9es et le contenu des entreprises. Une am\u00e9lioration urgente de la s\u00e9curit\u00e9 est n\u00e9cessaire pour prot\u00e9ger les utilisateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34118\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-34118\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Darktrace d\u00e9tecte une attaque de phishing utilisant Dropbox<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34118\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-34118\"><p>\/ En janvier 2024, Darktrace a d\u00e9tect\u00e9 une attaque sophistiqu\u00e9e de phishing exploitant Dropbox. Les utilisateurs doivent rester vigilants et v\u00e9rifier la fiabilit\u00e9 des e-mails et des liens avant de divulguer leurs informations d&#8217;identification.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34119\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-34119\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Oracle int\u00e8gre l'IA g\u00e9n\u00e9rative dans ses solutions de finance et de cha\u00eene d'approvisionnement<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34119\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-34119\"><p>\/ Oracle int\u00e8gre l&#8217;IA g\u00e9n\u00e9rative dans sa gamme de logiciels Oracle Fusion Cloud pour am\u00e9liorer la prise de d\u00e9cision et l&#8217;exp\u00e9rience utilisateur dans les domaines de la finance et de la cha\u00eene d&#8217;approvisionnement.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34120\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-34120\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cerebras frappe fort avec une puce d'IA de 4000 milliards de transistors<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34120\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-34120\"><p>\/ Cerebras d\u00e9voile le Wafer-Scale Engine 3 (WSE-3), une puce d&#8217;IA avec 4000 milliards de transistors. Le syst\u00e8me CS-3 de Cerebras atteint jusqu&#8217;\u00e0 125 p\u00e9taflops de performances IA maximales, ouvrant de nouvelles perspectives dans le domaine de l&#8217;IA.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34121\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-34121\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">RedCurl exploite PCA de Windows pour l'espionnage<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34121\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-34121\"><p>\/ <span style=\"font-weight: 400;\">Le groupe de cybercriminels RedCurl utilise PCA, un composant l\u00e9gitime de Microsoft Windows, pour espionner les entreprises. En d\u00e9tournant cet outil, ils ex\u00e9cutent des commandes malveillantes, \u00e9chappant ainsi aux mesures de s\u00e9curit\u00e9.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34122\" class=\"elementor-tab-title\" data-tab=\"22\" role=\"button\" aria-controls=\"elementor-tab-content-34122\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">TMChecker : nouvel outil de piratage<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34122\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"22\" role=\"region\" aria-labelledby=\"elementor-tab-title-34122\"><p>\/ L&#8217;apparition de TMChecker sur le Dark Web r\u00e9v\u00e8le une nouvelle tendance chez les cybercriminels. Cet outil, con\u00e7u pour cibler les serveurs VPN et les applications de messagerie pris\u00e9es, associe la v\u00e9rification des connexions d&#8217;acc\u00e8s d&#8217;entreprise \u00e0 des attaques par force brute.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34123\" class=\"elementor-tab-title\" data-tab=\"23\" role=\"button\" aria-controls=\"elementor-tab-content-34123\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Ande Loader : nouvelle menace pour le secteur manufacturier<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34123\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"23\" role=\"region\" aria-labelledby=\"elementor-tab-title-34123\"><p>\/ Blind Eagle utilise le logiciel malveillant Ande Loader pour cibler le secteur manufacturier en Am\u00e9rique du Nord. En se servant d&#8217;e-mails de phishing, ce malware propage des chevaux de Troie d&#8217;acc\u00e8s \u00e0 distance tels que Remcos RAT et NjRAT, visant sp\u00e9cifiquement les utilisateurs hispanophones dans cette industrie.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-34124\" class=\"elementor-tab-title\" data-tab=\"24\" role=\"button\" aria-controls=\"elementor-tab-content-34124\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cyberattaque chez France Travail : 43 millions touch\u00e9s<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-34124\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"24\" role=\"region\" aria-labelledby=\"elementor-tab-title-34124\"><p>\/ <span style=\"font-weight: 400;\">France Travail, anciennement P\u00f4le Emploi, a \u00e9t\u00e9 vis\u00e9 par une cyberattaque touchant potentiellement 43 millions d&#8217;utilisateurs. L&#8217;attaque, op\u00e9r\u00e9e par usurpation d&#8217;identit\u00e9 de conseillers Cap Emploi, a compromis les donn\u00e9es personnelles des inscrits des 20 derni\u00e8res ann\u00e9es. France Travail a r\u00e9agi en conformit\u00e9 avec le RGPD et a facilit\u00e9 le d\u00e9p\u00f4t de plaintes pour les victimes.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fin de la fonction d&#8217;URL sur OneDrive \/ Microsoft supprime la fonction de t\u00e9l\u00e9chargement d\u2019URL de OneDrive le 29 mars 2024 en raison de co\u00fbts \u00e9lev\u00e9s et d\u2019une faible utilisation. Les utilisateurs doivent trouver des alternatives, mais les fichiers existants ne seront pas affect\u00e9s. Piratage COM : adaptation des menaces malveillantes \/ Depuis 2023, des logiciels malveillants exploitent le piratage COM pour persister sur Windows, notamment Berbeo et des rats. Certains comme le RAT Darkme utilisent le CVE-2024-21412. Ils d\u00e9sactivent le pare-feu et l\u2019UAC, persistant dans des dossiers tels que qmacro. La protection, comme Perimeter81, est cruciale. Elon Musk lance<\/p>\n","protected":false},"author":1,"featured_media":10104,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9],"tags":[446,257,183,45,323,445,42,43,182,38],"class_list":["post-10103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite","tag-actualites-technologiques","tag-cyberattaque","tag-cybercriminalite","tag-intelligence-artificielle","tag-phishing","tag-piratage","tag-protection-des-donnees","tag-rgpd","tag-securite-informatique","tag-technologie"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-11 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-11.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-11 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-11.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-16T10:43:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-16T10:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png\" \/>\n\t<meta property=\"og:image:width\" content=\"7972\" \/>\n\t<meta property=\"og:image:height\" content=\"5315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-11\",\"datePublished\":\"2024-03-16T10:43:46+00:00\",\"dateModified\":\"2024-03-16T10:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\"},\"wordCount\":1174,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png\",\"keywords\":[\"Actualit\u00e9s technologiques\",\"cyberattaque\",\"Cybercriminalit\u00e9\",\"intelligence artificielle\",\"Phishing\",\"Piratage\",\"protection des donn\u00e9es\",\"rgpd\",\"S\u00e9curit\u00e9 informatique\",\"technologie\"],\"articleSection\":[\"Actualit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\",\"name\":\"Semaine 2024-11 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png\",\"datePublished\":\"2024-03-16T10:43:46+00:00\",\"dateModified\":\"2024-03-16T10:47:44+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-11.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png\",\"width\":7972,\"height\":5315,\"caption\":\"les derni\u00e8res actualit\u00e9s technologiques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-11\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-11 - Vitrine outlYing","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-11.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-11 - Vitrine outlYing","og_description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-11.","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-03-16T10:43:46+00:00","article_modified_time":"2024-03-16T10:47:44+00:00","og_image":[{"width":7972,"height":5315,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-11","datePublished":"2024-03-16T10:43:46+00:00","dateModified":"2024-03-16T10:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/"},"wordCount":1174,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png","keywords":["Actualit\u00e9s technologiques","cyberattaque","Cybercriminalit\u00e9","intelligence artificielle","Phishing","Piratage","protection des donn\u00e9es","rgpd","S\u00e9curit\u00e9 informatique","technologie"],"articleSection":["Actualit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/","name":"Semaine 2024-11 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png","datePublished":"2024-03-16T10:43:46+00:00","dateModified":"2024-03-16T10:47:44+00:00","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-11.","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-11.png","width":7972,"height":5315,"caption":"les derni\u00e8res actualit\u00e9s technologiques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/16\/semaine-2024-11\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-11"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/10103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=10103"}],"version-history":[{"count":30,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/10103\/revisions"}],"predecessor-version":[{"id":10204,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/10103\/revisions\/10204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/10104"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=10103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=10103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=10103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}