{"id":10757,"date":"2024-04-13T10:30:34","date_gmt":"2024-04-13T10:30:34","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=10757"},"modified":"2024-04-15T10:37:35","modified_gmt":"2024-04-15T10:37:35","slug":"semaine-2024-15","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/","title":{"rendered":"Semaine 2024-15"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10757\" class=\"elementor elementor-10757\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-09d0c57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09d0c57\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f02206\" data-id=\"2f02206\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd96065 elementor-widget elementor-widget-toggle\" data-id=\"dd96065\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2321\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2321\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cyberattaques chinoises exploitent les failles zero-day dans Ivanti<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2321\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2321\"><p>\/ Des acteurs chinois exploitent des failles zero-day dans les appareils Ivanti en utilisant des outils personnalis\u00e9s comme TONERJAM et PHANTOMNET pour attaquer les r\u00e9seaux via divers clusters. Cette menace souligne l&#8217;importance cruciale de la cybers\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2322\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2322\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Piratage du plugin Notepad++: Code malveillant d\u00e9couvert<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2322\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2322\"><p>\/ Des pirates ont infect\u00e9 le plugin Notepad++ avec du code malveillant, le configurant pour d\u00e9marrer d\u00e8s l\u2019ouverture du logiciel sans que les utilisateurs ne le sachent. Les chercheurs ont d\u00e9tect\u00e9 des signes de compromission et s\u2019activent pour contrer cette menace<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2323\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2323\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Malware Byakugan dissimul\u00e9 dans des fichiers PDF<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2323\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2323\"><p>\/ Des pirates distribuent le malware Byakugan via des fichiers PDF, o\u00f9 un lien t\u00e9l\u00e9charge le logiciel malveillant lorsque cliqu\u00e9. Byakugan espionne l&#8217;\u00e9cran et effectue d&#8217;autres activit\u00e9s nuisibles. Des indices de cette attaque ont \u00e9t\u00e9 trouv\u00e9s par les chercheurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2324\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2324\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Inqui\u00e9tudes concernant la pr\u00e9cision de Grok, une offre premium de X<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2324\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2324\"><p>\/X propose Grok aux abonn\u00e9s premium pour des r\u00e9sum\u00e9s d&#8217;actualit\u00e9s, soulevant des inqui\u00e9tudes quant \u00e0 leur pr\u00e9cision. Musk vise \u00e0 rivaliser avec d&#8217;autres chatbots, mais la transparence des donn\u00e9es d&#8217;entra\u00eenement reste floue.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2325\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2325\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Opera One lance une fonctionnalit\u00e9 d'acc\u00e8s local \u00e0 des mod\u00e8les IA<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2325\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2325\"><p>\/ Opera One introduit une nouvelle fonctionnalit\u00e9 : l&#8217;acc\u00e8s \u00e0 des mod\u00e8les IA en local, en compl\u00e9ment de son agent Aria. Les utilisateurs peuvent choisir parmi une vari\u00e9t\u00e9 de mod\u00e8les, offrant ainsi une alternative rapide \u00e0 l&#8217;utilisation bas\u00e9e sur le cloud.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2326\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2326\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Apple autorise les \u00e9mulateurs de jeux r\u00e9tro et simplifie les achats sur l'App Store<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2326\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2326\"><p>\/ Apple autorise les \u00e9mulateurs de jeux r\u00e9tro dans l&#8217;App Store, autorise les achats int\u00e9gr\u00e9s dans les mini-jeux et les chatbots IA, et simplifie les achats sur les services de streaming musical.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2327\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2327\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Meta \u00e9tend le marquage des contenus g\u00e9n\u00e9r\u00e9s par IA sur ses plateformes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2327\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2327\"><p>\/ Meta \u00e9tend le marquage des contenus g\u00e9n\u00e9r\u00e9s par IA sur ses plateformes, en les \u00e9tiquetant &#8220;Made with AI&#8221;, et supprime les contenus violant ses politiques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2328\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-2328\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9s dans XZ Utils: Attaque r\u00e9v\u00e8le des risques dans la cha\u00eene d'approvisionnement open source<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2328\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-2328\"><p>\/ Une attaque sur XZ Utils a r\u00e9v\u00e9l\u00e9 la CVE-2024-3094, mettant en danger la s\u00e9curit\u00e9 des serveurs Linux. Cela souligne les risques associ\u00e9s \u00e0 la confiance accord\u00e9e aux mainteneurs de logiciels open source.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2329\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-2329\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9 expos\u00e9e dans le framework Ray: Anyscale publie des outils de d\u00e9tection<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2329\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-2329\"><p>\/ La vuln\u00e9rabilit\u00e9 CVE-2023-48022 a expos\u00e9 les charges de travail de l&#8217;IA et d&#8217;autres informations sensibles sur le framework Ray pendant sept mois. Anyscale a r\u00e9agi en publiant des outils pour aider \u00e0 d\u00e9tecter et \u00e0 att\u00e9nuer les risques associ\u00e9s \u00e0 cette faille de s\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23210\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-23210\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">JSOutProx : Nouvelle menace pour les institutions financi\u00e8res<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23210\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-23210\"><p>\/ La menace cybern\u00e9tique JSOutProx vise les institutions financi\u00e8res en Asie-Pacifique et au Moyen-Orient et en Afrique du Nord. Ce logiciel malveillant, combinant JavaScript et .NET, exige des mesures de s\u00e9curit\u00e9 renforc\u00e9es pour contrer cette menace \u00e9mergente.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23211\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-23211\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9s dans VMware SD-WAN n\u00e9cessitant une r\u00e9ponse rapide<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23211\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-23211\"><p>\/ VMware SD-WAN pr\u00e9sente des vuln\u00e9rabilit\u00e9s significatives, ouvrant la voie \u00e0 l&#8217;ex\u00e9cution de commandes non autoris\u00e9es et potentiellement dangereuses. Bien que des correctifs aient \u00e9t\u00e9 d\u00e9ploy\u00e9s, une r\u00e9ponse rapide demeure cruciale pour att\u00e9nuer ces menaces.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23212\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-23212\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9 critique d\u00e9couverte dans Magento<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23212\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-23212\"><p>\/ La vuln\u00e9rabilit\u00e9 critique CVE-2024-20720 dans Magento permet l&#8217;insertion d&#8217;une porte d\u00e9rob\u00e9e persistante, mettant en danger les sites de commerce en ligne. Des correctifs imm\u00e9diats sont n\u00e9cessaires pour prot\u00e9ger les donn\u00e9es client.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23213\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-23213\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Soutien du maire de New York au chatbot MyCity AI malgr\u00e9 les critiques<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23213\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-23213\"><p>\/ Le maire de New York, Eric Adams, soutient le chatbot MyCity AI malgr\u00e9 les critiques. Bien qu&#8217;il utilise les mod\u00e8les de langage Azure AI de Microsoft, cet outil a \u00e9t\u00e9 critiqu\u00e9 pour ses informations erron\u00e9es. Adams admet les d\u00e9fauts du chatbot mais souligne l&#8217;importance de le tester dans des situations r\u00e9elles pour l&#8217;am\u00e9liorer.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23214\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-23214\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Appel de la maison blanche \u00e0 renforcer la s\u00e9curit\u00e9 des applications<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23214\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-23214\"><p>\/ La Maison Blanche appelle \u00e0 renforcer la s\u00e9curit\u00e9 des applications pour prot\u00e9ger la m\u00e9moire num\u00e9rique, en mettant l&#8217;accent sur l&#8217;utilisation de langages de programmation s\u00e9curis\u00e9s. Cela n\u00e9cessite une collaboration \u00e9troite entre les secteurs public et priv\u00e9 pour relever les d\u00e9fis.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23215\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-23215\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">R\u00e9v\u00e9lations sur les failles critiques chez les fournisseurs d'IA en tant que service<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23215\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-23215\"><p>\/ Des recherches r\u00e9centes ont r\u00e9v\u00e9l\u00e9 des failles critiques chez les fournisseurs d&#8217;IA en tant que service, exposant les mod\u00e8les des clients \u00e0 des risques d&#8217;exploitation et compromettant les pipelines CI\/CD. Cela souligne le danger croissant des attaques de la cha\u00eene d&#8217;approvisionnement dans le domaine de l&#8217;IA.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23216\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-23216\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Intensification de la collaboration UE-\u00c9tats-Unis dans le domaine technologique<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23216\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-23216\"><p>\/ L&#8217;UE et les \u00c9tats-Unis intensifient leur collaboration via le Conseil du commerce et de la technologie, centr\u00e9 sur l&#8217;IA, le 6G, la technologie quantique, les semi-conducteurs, la formation et l&#8217;emploi. Ce partenariat vise \u00e0 unir leurs forces dans le domaine technologique.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23217\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-23217\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cr\u00e9ation d'un consortium sur l'IA dans les TIC par des entreprises de premier plan<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23217\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-23217\"><p>\/ Cisco, Accenture, Google, IBM et Microsoft collaborent pour former un consortium sur l&#8217;IA dans les TIC, visant \u00e0 g\u00e9rer les impacts de l&#8217;IA sur l&#8217;emploi par le biais de la formation et de la reconversion professionnelle.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23218\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-23218\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Des fuites r\u00e9v\u00e8lent que les processeurs Zen 5 d'AMD promettent des performances enrichies de 15 \u00e0 20 %<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23218\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-23218\"><p>\/ Des fuites indiquent que les futurs processeurs Zen 5 d&#8217;AMD pourraient pr\u00e9senter une am\u00e9lioration des performances de 15 \u00e0 20 %, rivalisant potentiellement avec les futurs produits d&#8217;Intel Arrow Lake. Cependant, ces chiffres doivent encore \u00eatre confirm\u00e9s officiellement.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23219\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-23219\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Annonces test\u00e9es dans le menu d\u00e9marrer de Windows 11 par Microsoft<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23219\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-23219\"><p>\/ Microsoft teste des annonces int\u00e9gr\u00e9es dans le menu D\u00e9marrer de Windows 11 aupr\u00e8s des utilisateurs am\u00e9ricains du programme Windows Insiders, ressemblant \u00e0 des recommandations d&#8217;applications, avec la possibilit\u00e9 pour les utilisateurs de les d\u00e9sactiver, dans le but de recueillir des avis pour am\u00e9liorer cette fonctionnalit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23220\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-23220\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Des militants des droits humains au Maroc et au Sahara occidental sont la cible de phishing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23220\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-23220\"><p>\/ Des militants des droits humains au Maroc et au Sahara occidental sont la cible de cyberattaques de phishing orchestr\u00e9es par un groupe nomm\u00e9 Starry Addax. Ce groupe utilise des tactiques sophistiqu\u00e9es pour inciter les victimes \u00e0 divulguer leurs informations d&#8217;identification sur de faux sites Web.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23221\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-23221\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Faille de s\u00e9curit\u00e9 dans le noyau Linuxz<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23221\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-23221\"><p>\/ Une faille, r\u00e9f\u00e9renc\u00e9e sous le code CVE-2024-2201, dans le noyau Linux permet une exploitation appel\u00e9e Native Branch History Injection (BHI), affectant les syst\u00e8mes Intel. Elle contourne les protections Spectre v2\/BHI pour acc\u00e9der \u00e0 des donn\u00e9es sensibles. Parall\u00e8lement, des attaques Ahoi ciblent les environnements s\u00e9curis\u00e9s comme AMD SEV-SNP et Intel TDX.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23222\" class=\"elementor-tab-title\" data-tab=\"22\" role=\"button\" aria-controls=\"elementor-tab-content-23222\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Une attaque Zero-Day contre Palo Alto Networks utilise une porte d\u00e9rob\u00e9e Python<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23222\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"22\" role=\"region\" aria-labelledby=\"elementor-tab-title-23222\"><p>\/ Depuis le 26 mars 2024, une faille zero-day, CVE-2024-3400, dans PAN-OS de Palo Alto Networks est exploit\u00e9e, permettant l&#8217;ex\u00e9cution de code sur les pare-feu. L&#8217;attaque, Op\u00e9ration MidnightEclipse, utilisant une porte d\u00e9rob\u00e9e Python pour les commandes \u00e0 distance, est attribu\u00e9e \u00e0 l&#8217;acteur UTA0218, apparemment soutenu par un \u00c9tat.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23223\" class=\"elementor-tab-title\" data-tab=\"23\" role=\"button\" aria-controls=\"elementor-tab-content-23223\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google introduit Gemini dans Android Studio pour am\u00e9liorer le codage<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23223\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"23\" role=\"region\" aria-labelledby=\"elementor-tab-title-23223\"><p>\/ Google a lanc\u00e9 Gemini, une IA bas\u00e9e sur PaLM-2, dans Android Studio, baptis\u00e9e Jellyfish. Disponible dans plus de 180 pays, en outre, Jellyfish offre des r\u00e9ponses de meilleure qualit\u00e9 pour le codage. Les utilisateurs doivent se connecter pour y acc\u00e9der et peuvent \u00e9galement utiliser son API pour int\u00e9grer des fonctionnalit\u00e9s bas\u00e9es sur l&#8217;IA dans les applications, ce qui permet \u00e0 Google de rivaliser avec des outils comme GitHub Copilot.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-23224\" class=\"elementor-tab-title\" data-tab=\"24\" role=\"button\" aria-controls=\"elementor-tab-content-23224\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">TikTok d\u00e9veloppe une app photo concurrente \u00e0 Instagram : TikTok Notes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-23224\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"24\" role=\"region\" aria-labelledby=\"elementor-tab-title-23224\"><p>\/ TikTok envisage de lancer une application concurrente d&#8217;Instagram pour le partage de photos, potentiellement nomm\u00e9e TikTok Notes. Bien que confirm\u00e9e en d\u00e9veloppement, elle n&#8217;est pas encore disponible. Cette initiative s&#8217;inscrit dans la comp\u00e9tition intense entre TikTok et Meta (anciennement Facebook) dans le domaine des m\u00e9dias sociaux.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyberattaques chinoises exploitent les failles zero-day dans Ivanti \/ Des acteurs chinois exploitent des failles zero-day dans les appareils Ivanti en utilisant des outils personnalis\u00e9s comme TONERJAM et PHANTOMNET pour attaquer les r\u00e9seaux via divers clusters. Cette menace souligne l\u2019importance cruciale de la cybers\u00e9curit\u00e9. Piratage du plugin Notepad++: Code malveillant d\u00e9couvert \/ Des pirates ont infect\u00e9 le plugin Notepad++ avec du code malveillant, le configurant pour d\u00e9marrer d\u00e8s l\u2019ouverture du logiciel sans que les utilisateurs ne le sachent. Les chercheurs ont d\u00e9tect\u00e9 des signes de compromission et s\u2019activent pour contrer cette menace Malware Byakugan dissimul\u00e9 dans des fichiers PDF \/<\/p>\n","protected":false},"author":1,"featured_media":10818,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9],"tags":[506,76,353,503,505,501,507,182,38,504],"class_list":["post-10757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite","tag-collaboration-internationale","tag-cyberattaques","tag-developpement-logiciel","tag-fuites-de-donnees","tag-ia-intelligence-artificielle","tag-piratage-informatique","tag-reseaux-sociaux","tag-securite-informatique","tag-technologie","tag-vulnerabilites"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-15 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-15.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-15 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-15.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-13T10:30:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-15T10:37:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"7972\" \/>\n\t<meta property=\"og:image:height\" content=\"5315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-15\",\"datePublished\":\"2024-04-13T10:30:34+00:00\",\"dateModified\":\"2024-04-15T10:37:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\"},\"wordCount\":1412,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png\",\"keywords\":[\"Collaboration internationale\",\"cyberattaques\",\"D\u00e9veloppement Logiciel\",\"Fuites de donn\u00e9es\",\"IA (Intelligence Artificielle)\",\"Piratage informatique\",\"R\u00e9seaux sociaux\",\"S\u00e9curit\u00e9 informatique\",\"technologie\",\"Vuln\u00e9rabilit\u00e9s\"],\"articleSection\":[\"Actualit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\",\"name\":\"Semaine 2024-15 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png\",\"datePublished\":\"2024-04-13T10:30:34+00:00\",\"dateModified\":\"2024-04-15T10:37:35+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-15.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png\",\"width\":7972,\"height\":5315,\"caption\":\"Semaine 2024-15\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-15\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-15 - Vitrine outlYing","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-15.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-15 - Vitrine outlYing","og_description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-15.","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-04-13T10:30:34+00:00","article_modified_time":"2024-04-15T10:37:35+00:00","og_image":[{"width":7972,"height":5315,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-15","datePublished":"2024-04-13T10:30:34+00:00","dateModified":"2024-04-15T10:37:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/"},"wordCount":1412,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png","keywords":["Collaboration internationale","cyberattaques","D\u00e9veloppement Logiciel","Fuites de donn\u00e9es","IA (Intelligence Artificielle)","Piratage informatique","R\u00e9seaux sociaux","S\u00e9curit\u00e9 informatique","technologie","Vuln\u00e9rabilit\u00e9s"],"articleSection":["Actualit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/","name":"Semaine 2024-15 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png","datePublished":"2024-04-13T10:30:34+00:00","dateModified":"2024-04-15T10:37:35+00:00","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-15.","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-15.png","width":7972,"height":5315,"caption":"Semaine 2024-15"},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/13\/semaine-2024-15\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-15"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/10757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=10757"}],"version-history":[{"count":242,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/10757\/revisions"}],"predecessor-version":[{"id":11024,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/10757\/revisions\/11024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/10818"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=10757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=10757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=10757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}