{"id":11532,"date":"2024-04-27T11:18:17","date_gmt":"2024-04-27T11:18:17","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=11532"},"modified":"2024-04-27T11:18:17","modified_gmt":"2024-04-27T11:18:17","slug":"semaine-2024-17","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/","title":{"rendered":"Semaine 2024-17"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11532\" class=\"elementor elementor-11532\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f7ab40 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f7ab40\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da89e8a\" data-id=\"da89e8a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4320f3c elementor-widget elementor-widget-toggle\" data-id=\"4320f3c\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7031\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-7031\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Confiance en baisse dans la cybers\u00e9curit\u00e9 gouvernementale britannique<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7031\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-7031\"><p>\/ Un rapport d&#8217;Armis r\u00e9v\u00e8le qu&#8217;une majorit\u00e9 d&#8217;entreprises britanniques doutent de la capacit\u00e9 du gouvernement \u00e0 les prot\u00e9ger contre les cyberattaques. Tout d&#8217;abord, sur les 2 600 d\u00e9cideurs interrog\u00e9s, plus de la moiti\u00e9 estime que le gouvernement ne peut pas d\u00e9fendre efficacement contre la cyberguerre. Ensuite, cette perte de confiance souligne la n\u00e9cessit\u00e9 pour le gouvernement de renforcer ses capacit\u00e9s de cybers\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7032\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-7032\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">TransparentTribe : pirates informatiques ciblant l'Inde<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7032\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-7032\"><p>\/ TransparentTribe, un groupe de hackers bas\u00e9 au Pakistan, intensifie ses attaques contre des organisations indiennes. Tout d&#8217;abord, utilisant des tactiques sophistiqu\u00e9es, ils recourent \u00e0 des sites Web et des documents pi\u00e9g\u00e9s pour voler des informations sensibles, mettant ainsi en danger la s\u00e9curit\u00e9 nationale. Ensuite, leurs actions ne se limitent pas \u00e0 l&#8217;Inde, car ils ont \u00e9galement cibl\u00e9 d&#8217;autres pays tels que l&#8217;Afghanistan, l&#8217;Australie, et les \u00c9tats-Unis. Ces attaques soulignent l&#8217;importance cruciale d&#8217;une cybers\u00e9curit\u00e9 renforc\u00e9e \u00e0 l&#8217;\u00e9chelle mondiale.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7033\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-7033\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> Cyberattaque chez Speedy france : donn\u00e9es clients compromises<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7033\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-7033\"><p>\/ Speedy France, soci\u00e9t\u00e9 de r\u00e9paration automobile, a r\u00e9cemment subi une cyberattaque, exposant les donn\u00e9es personnelles de ses clients. Tout d&#8217;abord annonc\u00e9 le 19 avril, cet incident souligne l&#8217;urgence d&#8217;une meilleure protection des donn\u00e9es dans un paysage num\u00e9rique en constante \u00e9volution. Ensuite, les clients sont incit\u00e9s \u00e0 surveiller leurs comptes de pr\u00e8s, tandis que Speedy promet des mesures correctives pour renforcer la s\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7034\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-7034\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">GitLab lance Duo Chat : Assistant IA pour le d\u00e9veloppement<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7034\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-7034\"><p>\/ GitLab propose Duo Chat, un assistant de d\u00e9veloppement IA par abonnement. Il offre des fonctionnalit\u00e9s telles que la compl\u00e9tion de code et la g\u00e9n\u00e9ration de tests automatiques. Accessible via l\u2019interface de GitLab et des IDE populaires, il promet des am\u00e9liorations futures en s\u00e9curit\u00e9 et en collaboration. De plus, les clients Premium et Ultimate peuvent souscrire \u00e0 l\u2019abonnement GitLab Duo Pro \u00e0 19 dollars par utilisateur et par mois.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7035\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-7035\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Faille de s\u00e9curit\u00e9 corrig\u00e9e dans Forminator pour WordPress<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7035\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-7035\"><p>\/ WPMU DEV a corrig\u00e9 une faille de s\u00e9curit\u00e9 critique, CVE-2024-28890, dans le plugin Forminator pour WordPress. Pour vous prot\u00e9ger, assurez-vous de mettre \u00e0 jour vers la version 1.29.3. En outre, pour renforcer la s\u00e9curit\u00e9, maintenez vos sites WordPress et extensions \u00e0 jour.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7036\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-7036\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Menace Russe: Nouveau malware Kapeka en Europe<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7036\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-7036\"><p>\/ Un nouveau malware russe, nomm\u00e9 Kapeka, a \u00e9t\u00e9 d\u00e9couvert en Estonie. Utilis\u00e9 pour l\u2019espionnage, il peut \u00e9galement causer des dommages aux syst\u00e8mes informatiques. Attribu\u00e9 au groupe Sandworm, ce malware cible principalement des entreprises en Estonie, en Ukraine et en Pologne.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7037\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-7037\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les entreprises de d\u00e9fense sud-cor\u00e9ennes prises pour cible par des attaques nord-cor\u00e9ennes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7037\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-7037\"><p>\/ Tout d&#8217;abord, des chercheurs ont averti que les produits de s\u00e9curit\u00e9 de Microsoft et de Kaspersky pourraient involontairement supprimer des fichiers l\u00e9gitimes, soulevant des inqui\u00e9tudes. Ensuite, bien que Microsoft ait partiellement reconnu le probl\u00e8me, des questions persistent sur la transparence des fournisseurs. Ainsi, les utilisateurs doivent rester vigilants et maintenir leurs logiciels \u00e0 jour pour att\u00e9nuer les risques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7038\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-7038\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Alerte s\u00e9curit\u00e9 : risque de suppression de fichiers par Windows defender et Kaspersky<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7038\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-7038\"><p>\/ <span style=\"font-weight: 400;\">Tout d&#8217;abord, des chercheurs ont averti que les produits de s\u00e9curit\u00e9 de Microsoft et de Kaspersky pourraient involontairement supprimer des fichiers l\u00e9gitimes, provoquant des inqui\u00e9tudes quant aux cons\u00e9quences pour les utilisateurs. Par exemple, bien que Microsoft ait partiellement reconnu le probl\u00e8me, des questions subsistent sur la transparence et la responsabilit\u00e9 des fournisseurs de logiciels de s\u00e9curit\u00e9. Les utilisateurs doivent rester vigilants et maintenir leurs logiciels \u00e0 jour pour att\u00e9nuer les risques.<\/span><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-7039\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-7039\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Elektrobit lance une distribution Linux s\u00e9curis\u00e9e pour l'automobile<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-7039\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-7039\"><p>\/ Tout d&#8217;abord, Elektrobit a lanc\u00e9 EB corbos Linux for Safety Applications, une distribution Linux s\u00e9curis\u00e9e pour l&#8217;industrie automobile. Avec un moniteur de s\u00e9curit\u00e9 externe, cette solution garantit la protection du syst\u00e8me. En collaboration avec Canonical, Elektrobit maintient cette distribution pour assurer sa conformit\u00e9 aux normes de l&#8217;industrie.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70310\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-70310\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Faille de s\u00e9curit\u00e9 dans Cordova App Harness<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70310\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-70310\"><p>\/ Tout d&#8217;abord, une faille de s\u00e9curit\u00e9 majeure a \u00e9t\u00e9 trouv\u00e9e dans Cordova App Harness, projet Apache archiv\u00e9. Cette vuln\u00e9rabilit\u00e9 expose les applications \u00e0 des attaques de confusion de d\u00e9pendances. Bien que certains correctifs aient \u00e9t\u00e9 apport\u00e9s, le risque persiste. Cela souligne l&#8217;importance de surveiller attentivement les projets tiers dans le d\u00e9veloppement logiciel.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70311\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-70311\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Microsoft d\u00e9voile Phi-3-mini pour iPhone<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70311\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-70311\"><p>\/ Tout d&#8217;abord, Microsoft lance Phi-3-mini pour iPhone, un mod\u00e8le de langage naturel compact et performant avec 3,8 milliards de param\u00e8tres. Il rivalise avec des mod\u00e8les plus grands et peut \u00eatre quantifi\u00e9 \u00e0 4 bits pour une efficacit\u00e9 maximale sur les appareils mobiles. Ensuite, l&#8217;entreprise propose des mod\u00e8les de 7 et 14 milliards de param\u00e8tres pour r\u00e9pondre \u00e0 divers besoins. Enfin, cette initiative renforce l&#8217;engagement de Microsoft \u00e0 fournir des solutions innovantes et adapt\u00e9es aux exigences croissantes de l&#8217;informatique mobile.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70312\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-70312\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Augmentation alarmante des cyberattaques OT en 2023<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70312\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-70312\"><p>\/ Une \u00e9tude r\u00e9cente r\u00e9v\u00e8le une augmentation de 19 % des cyberattaques contre les syst\u00e8mes op\u00e9rationnels industriels (OT) en 2023. Tout d&#8217;abord, avec 68 attaques ayant perturb\u00e9 plus de 500 op\u00e9rations physiques, les experts pr\u00e9voient une tendance \u00e0 la hausse encore plus marqu\u00e9e en 2024.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70313\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-70313\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">IA chez les 16-25 ans : Utilisation, Usages, et Confiance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70313\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-70313\"><p>\/ Tout d&#8217;abord, une \u00e9tude de Diplomeo r\u00e9v\u00e8le que 80 % des 16-25 ans utilisent l&#8217;IA pour leurs \u00e9tudes. Puis, leurs usages varient, de l&#8217;aide aux devoirs \u00e0 l&#8217;optimisation du temps. Mais, malgr\u00e9 cette utilisation r\u00e9pandue, la confiance envers l&#8217;IA reste mitig\u00e9e, oscillant entre optimisme et inqui\u00e9tude. Enfin, cette \u00e9tude souligne l&#8217;importance d&#8217;une \u00e9ducation critique pour naviguer dans ce paysage technologique en \u00e9volution.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70314\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-70314\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">FlexAI l\u00e8ve 28,5 millions d'euros pour son innovation en IA<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70314\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-70314\"><p>\/ FlexAI, une start-up fran\u00e7aise, annonce une lev\u00e9e de fonds de 28,5 millions d&#8217;euros pour son approche novatrice de l&#8217;entra\u00eenement des mod\u00e8les d&#8217;IA. Tout d&#8217;abord, en int\u00e9grant une vari\u00e9t\u00e9 de composants mat\u00e9riels, FlexAI rend l&#8217;IA plus accessible aux d\u00e9veloppeurs via une interface utilisateur simplifi\u00e9e. Enfin, cette lev\u00e9e de fonds soutiendra l&#8217;acc\u00e9l\u00e9ration du d\u00e9veloppement de FlexAI pour r\u00e9pondre \u00e0 la demande croissante de solutions d&#8217;IA plus accessibles. Par exemple, cette injection de capital permettra \u00e0 FlexAI d&#8217;\u00e9tendre sa port\u00e9e sur le march\u00e9 de l&#8217;IA et de continuer \u00e0 innover. Mais, surtout, elle t\u00e9moigne de la confiance croissante dans le potentiel de l&#8217;entreprise \u00e0 transformer le paysage de l&#8217;IA.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70315\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-70315\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Snowflake d\u00e9voile Arctic LLM : IA g\u00e9n\u00e9rative pour les entreprises<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70315\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-70315\"><p>\/ Snowflake lance Arctic LLM, un mod\u00e8le d&#8217;IA g\u00e9n\u00e9rative ax\u00e9 sur les entreprises, pour des t\u00e2ches comme la g\u00e9n\u00e9ration de code de base de donn\u00e9es. Bien qu&#8217;il promette des performances sup\u00e9rieures, il affronte une forte concurrence sur un march\u00e9 d\u00e9j\u00e0 satur\u00e9 de solutions similaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70316\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-70316\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Attaque par phishing : Campagne FROZEN#SHADOW<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70316\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-70316\"><p>\/ Des chercheurs ont d\u00e9couvert une campagne d&#8217;attaque nomm\u00e9e FROZEN#SHADOW, utilisant SSLoad, Cobalt Strike et ConnectWise ScreenConnect. Les attaquants exploitent des e-mails de phishing pour infiltrer les syst\u00e8mes, collecter des donn\u00e9es sensibles et maintenir l&#8217;acc\u00e8s \u00e0 distance. Cette m\u00e9thode soul\u00e8ve des pr\u00e9occupations concernant la s\u00e9curit\u00e9 des syst\u00e8mes informatiques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70317\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-70317\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Anon lance une authentification IA s\u00e9curis\u00e9e<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70317\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-70317\"><p>\/ Anon propose une solution d&#8217;authentification automatis\u00e9e pour les applications IA. Leur SDK permet une int\u00e9gration facile et s\u00e9curis\u00e9e de l&#8217;authentification. Avec un investissement de 6,5 millions de dollars, Anon vise \u00e0 devenir une plateforme d&#8217;int\u00e9gration de confiance pour les automatisations s\u00e9curis\u00e9es.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70318\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-70318\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">D\u00e9fis cybern\u00e9tiques en 2024 : IA, cyberattaques et d\u00e9sinformation<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70318\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-70318\"><p>\/ En 2024, les cyberattaques aliment\u00e9es par l&#8217;IA et la propagation de la d\u00e9sinformation posent des d\u00e9fis urgents. Tout d&#8217;abord, la sophistication croissante des attaques rend la d\u00e9fense plus difficile que jamais. Ensuite, la d\u00e9sinformation sur les r\u00e9seaux sociaux aggrave la situation. Mais une coop\u00e9ration internationale renforc\u00e9e est essentielle pour contrer ces menaces. Enfin, des campagnes de sensibilisation \u00e0 la cybers\u00e9curit\u00e9 sont n\u00e9cessaires pour renforcer la r\u00e9silience face \u00e0 ces attaques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70319\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-70319\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Le ver USB PlugX infecte 2,5 millions d'appareils : une menace globale<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70319\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-70319\"><p>\/ Tout d&#8217;abord, le ver PlugX infecte massivement via les cl\u00e9s USB. Ensuite, malgr\u00e9 la destruction d&#8217;un serveur de commande, la propagation persiste. Mais, avec 2,5 millions d&#8217;appareils affect\u00e9s, la lutte contre cette menace n\u00e9cessite une action urgente.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70320\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-70320\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">R\u00e9v\u00e9lation de failles Cisco : Pirates utilisent des attaques Zero Day<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70320\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-70320\"><p>\/ Tout d&#8217;abord, des acteurs sophistiqu\u00e9s ont exploit\u00e9 deux failles de Cisco VPN et pare-feu pour des activit\u00e9s d&#8217;espionnage. Ensuite, la campagne &#8220;Porte Arcane&#8221; vise les gouvernements et les infrastructures critiques mondiales. Puis, les failles CVE-2024-20353 et CVE-2024-20359 ont \u00e9t\u00e9 exploit\u00e9es pour diffuser des logiciels malveillants. Mais des rapports de s\u00e9curit\u00e9 conjoints ont \u00e9t\u00e9 publi\u00e9s pour sensibiliser aux risques. Enfin, la coop\u00e9ration internationale est essentielle pour contrer de telles menaces.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70321\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-70321\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Brokewell : Nouveau malware Android voleur de donn\u00e9es bancaires<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70321\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-70321\"><p>\/ Brokewell, un nouveau malware Android, vole les informations bancaires via de fausses mises \u00e0 jour de Google Chrome. Il peut aussi surveiller les interactions de l&#8217;utilisateur. Son d\u00e9veloppeur, Baron Samedit, a contourn\u00e9 les mesures de s\u00e9curit\u00e9 d&#8217;Android 13. La distribution de Brokewell aux pirates pourrait entra\u00eener de nouvelles cyberattaques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70322\" class=\"elementor-tab-title\" data-tab=\"22\" role=\"button\" aria-controls=\"elementor-tab-content-70322\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google \u00e9largit la compatibilit\u00e9 de Gemini sur Android<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70322\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"22\" role=\"region\" aria-labelledby=\"elementor-tab-title-70322\"><p>\/ Google rend son application Gemini compatible avec des versions Android ant\u00e9rieures \u00e0 la 12, n\u00e9cessitant 4 Go de RAM minimum. Les utilisateurs d&#8217;iPhone doivent disposer d&#8217;iOS 16. Une r\u00e9cente mise \u00e0 jour permet l&#8217;importation de PDF et de documents.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-70323\" class=\"elementor-tab-title\" data-tab=\"23\" role=\"button\" aria-controls=\"elementor-tab-content-70323\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google retarde la suppression des cookies tiers dans Chrome<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-70323\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"23\" role=\"region\" aria-labelledby=\"elementor-tab-title-70323\"><p>\/ Google repousse la suppression des cookies tiers dans Chrome \u00e0 l&#8217;ann\u00e9e prochaine en raison de pr\u00e9occupations r\u00e9glementaires, notamment de la part de l&#8217;autorit\u00e9 britannique de la concurrence. La soci\u00e9t\u00e9 met en avant son initiative Privacy Sandbox et des API alternatives pour les fonctionnalit\u00e9s publicitaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Confiance en baisse dans la cybers\u00e9curit\u00e9 gouvernementale britannique \/ Un rapport d\u2019Armis r\u00e9v\u00e8le qu\u2019une majorit\u00e9 d\u2019entreprises britanniques doutent de la capacit\u00e9 du gouvernement \u00e0 les prot\u00e9ger contre les cyberattaques. Tout d\u2019abord, sur les 2 600 d\u00e9cideurs interrog\u00e9s, plus de la moiti\u00e9 estime que le gouvernement ne peut pas d\u00e9fendre efficacement contre la cyberguerre. Ensuite, cette perte de confiance souligne la n\u00e9cessit\u00e9 pour le gouvernement de renforcer ses capacit\u00e9s de cybers\u00e9curit\u00e9. TransparentTribe : pirates informatiques ciblant l&#8217;Inde \/ TransparentTribe, un groupe de hackers bas\u00e9 au Pakistan, intensifie ses attaques contre des organisations indiennes. Tout d\u2019abord, utilisant des tactiques sophistiqu\u00e9es, ils recourent<\/p>\n","protected":false},"author":1,"featured_media":11690,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9,3],"tags":[516,117,413,45,515,517,501,42,182,518],"class_list":["post-11532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite","category-cat_revue","tag-attaques-cybernetiques","tag-cybersecurite","tag-failles-de-securite","tag-intelligence-artificielle","tag-malware","tag-menaces-en-ligne","tag-piratage-informatique","tag-protection-des-donnees","tag-securite-informatique","tag-technologies-emergentes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-17 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-17.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-17 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-17.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-27T11:18:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png\" \/>\n\t<meta property=\"og:image:width\" content=\"7972\" \/>\n\t<meta property=\"og:image:height\" content=\"5315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-17\",\"datePublished\":\"2024-04-27T11:18:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\"},\"wordCount\":1696,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png\",\"keywords\":[\"Attaques cybern\u00e9tiques\",\"cybers\u00e9curit\u00e9\",\"Failles de S\u00e9curit\u00e9\",\"intelligence artificielle\",\"Malware\",\"Menaces en ligne\",\"Piratage informatique\",\"protection des donn\u00e9es\",\"S\u00e9curit\u00e9 informatique\",\"Technologies \u00e9mergentes\"],\"articleSection\":[\"Actualit\u00e9\",\"Revue\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\",\"name\":\"Semaine 2024-17 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png\",\"datePublished\":\"2024-04-27T11:18:17+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-17.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png\",\"width\":7972,\"height\":5315,\"caption\":\"Semaine 2024-17\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-17\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-17 - Vitrine outlYing","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-17.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-17 - Vitrine outlYing","og_description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-17.","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-04-27T11:18:17+00:00","og_image":[{"width":7972,"height":5315,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-17","datePublished":"2024-04-27T11:18:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/"},"wordCount":1696,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png","keywords":["Attaques cybern\u00e9tiques","cybers\u00e9curit\u00e9","Failles de S\u00e9curit\u00e9","intelligence artificielle","Malware","Menaces en ligne","Piratage informatique","protection des donn\u00e9es","S\u00e9curit\u00e9 informatique","Technologies \u00e9mergentes"],"articleSection":["Actualit\u00e9","Revue"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/","name":"Semaine 2024-17 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png","datePublished":"2024-04-27T11:18:17+00:00","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-17.","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/04\/Semaine-17.png","width":7972,"height":5315,"caption":"Semaine 2024-17"},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/04\/27\/semaine-2024-17\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-17"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/11532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=11532"}],"version-history":[{"count":161,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/11532\/revisions"}],"predecessor-version":[{"id":11700,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/11532\/revisions\/11700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/11690"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=11532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=11532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=11532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}