{"id":11907,"date":"2024-05-11T09:58:31","date_gmt":"2024-05-11T09:58:31","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=11907"},"modified":"2024-05-11T09:58:31","modified_gmt":"2024-05-11T09:58:31","slug":"semaine-2024-19","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/","title":{"rendered":"Semaine 2024-19"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11907\" class=\"elementor elementor-11907\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51b677c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51b677c3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b50a5ad\" data-id=\"4b50a5ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3da16bb elementor-widget elementor-widget-toggle\" data-id=\"3da16bb\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6461\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-6461\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Failles de s\u00e9curit\u00e9 dans pgAdmin de PostgreSQL<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-6461\"><p>\/ Des chercheurs ont d\u00e9couvert deux failles de s\u00e9curit\u00e9 dans pgAdmin de PostgreSQL. En premier lieu, CVE-2024-4216 permet l\u2019ex\u00e9cution de code c\u00f4t\u00e9 client. D\u2019autre part, CVE-2024-4215 autorise le contournement de l\u2019authentification multifacteur. PostgreSQL a rapidement corrig\u00e9 ces vuln\u00e9rabilit\u00e9s. Par cons\u00e9quent, les utilisateurs sont vivement encourag\u00e9s \u00e0 mettre \u00e0 jour vers pgAdmin v4 8.6 pour se prot\u00e9ger contre toute exploitation.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6462\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-6462\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Bug Android menace la vie priv\u00e9e des utilisateurs de VPN<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6462\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-6462\"><p>\/ Un bug sur Android, identifi\u00e9 par Mullvad, expose la vie priv\u00e9e des utilisateurs de VPN. En effet, ce dysfonctionnement provoque des fuites DNS, permettant aux FAI de surveiller les activit\u00e9s en ligne m\u00eame avec un VPN activ\u00e9. Suite \u00e0 cette d\u00e9couverte, Mullvad a inform\u00e9 Google et cherche une solution.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6463\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-6463\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nouvelle apparence pour Google Maps sur Android<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6463\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-6463\"><p>\/ Google lance une refonte de l\u2019interface de Maps sur Android. Tout d&#8217;abord, privil\u00e9giant des encarts en tiroirs pour une meilleure lisibilit\u00e9. Ensuite, cette mise \u00e0 jour, initialement d\u00e9ploy\u00e9e avec un groupe restreint, devrait s\u2019\u00e9tendre prochainement \u00e0 tous les utilisateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6464\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-6464\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cuckoo : Nouveau logiciel espion ciblant les Mac Intel et ARM<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6464\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-6464\"><p>\/ \u201cCuckoo\u201d est un nouveau logiciel espion ciblant les Mac Intel et ARM, d\u00e9guis\u00e9 en applications de conversion de musique. En plus de voler des donn\u00e9es et de s\u2019installer durablement. Cuckoo utilise des astuces pour obtenir des privil\u00e8ges \u00e9lev\u00e9s. De surcro\u00eet, il peut extraire des informations sensibles, telles que celles stock\u00e9es dans le trousseau iCloud, Discord et Steam.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6465\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-6465\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">WhatsApp int\u00e8gre un chatbot Meta AI<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6465\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-6465\"><p>\/ Meta d\u00e9ploie progressivement son intelligence artificielle dans WhatsApp sous forme de chatbot nomm\u00e9 Meta AI. Ainsi, Meta permet aux utilisateurs d&#8217;interagir avec cet assistant pour effectuer des recherches en ligne directement depuis l\u2019application. Actuellement d\u00e9ploy\u00e9e progressivement et disponible en anglais uniquement. Cette fonctionnalit\u00e9 offre une nouvelle dimension aux conversations sur WhatsApp.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6466\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-6466\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cyberattaque APT28 : Faille dans Outlook visant Tch\u00e9quie et Allemagne<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6466\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-6466\"><p>\/ L\u2019APT28 russe a exploit\u00e9 la faille CVE-2023-23397 dans Microsoft Outlook pour lancer une campagne de cyberespionnage contre la Tch\u00e9quie et l\u2019Allemagne. Cette attaque, ciblant des entit\u00e9s politiques et \u00e9tatiques, compromet des comptes de messagerie. En outre, l\u2019UE, l\u2019OTAN, le Royaume-Uni et les \u00c9tats-Unis ont condamn\u00e9 les actions de l\u2019APT28, soulignant le risque pour les infrastructures critiques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6467\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-6467\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Dirty Stream : Faille critique sur Android<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6467\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-6467\"><p>\/ D\u00e9couverte par Microsoft sur Android, la faille majeure appel\u00e9e Dirty Stream permet aux cybercriminels de prendre le contr\u00f4le d\u2019applications et de d\u00e9rober des donn\u00e9es sensibles. Actuellement, Microsoft et Google travaillent activement \u00e0 corriger cette vuln\u00e9rabilit\u00e9. De plus, les utilisateurs doivent rester vigilants face \u00e0 cette menace imminente.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6468\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-6468\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Faille critique dans Tinyproxy expose \u00e0 l'ex\u00e9cution de code \u00e0 distance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6468\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-6468\"><p>\/ En ce qui concerne Tinyproxy, une faille critique r\u00e9pertori\u00e9e sous le nom CVE-2023-49606 a \u00e9t\u00e9 d\u00e9couverte, ouvrant la porte \u00e0 l\u2019ex\u00e9cution de code \u00e0 distance sur plus de 50 000 h\u00f4tes. Par cons\u00e9quent, les d\u00e9veloppeurs recommandent vivement une mise \u00e0 jour imm\u00e9diate et de ne pas exposer le service sur Internet public. Alors, cette faille constitue une menace s\u00e9rieuse pour la s\u00e9curit\u00e9 des donn\u00e9es, n\u00e9cessitant une action imm\u00e9diate de la part des utilisateurs concern\u00e9s. D\u2019autant plus que la protection des donn\u00e9es est cruciale dans un environnement en constante \u00e9volution.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6469\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-6469\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Microsoft d\u00e9voile ZTDNS pour une s\u00e9curit\u00e9 DNS renforc\u00e9e<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6469\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-6469\"><p>\/ Quant \u00e0 la nouvelle initiative de Microsoft, ZTDNS vise \u00e0 renforcer la s\u00e9curit\u00e9 DNS en int\u00e9grant le moteur DNS Windows avec la plate-forme de filtrage Windows. Cette int\u00e9gration permet un meilleur contr\u00f4le du trafic DNS sans introduire de nouveaux protocoles r\u00e9seau.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64610\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-64610\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google Play lance un badge pour les applications gouvernementales l\u00e9gitimes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64610\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-64610\"><p>\/ Google Play introduit un nouveau badge pour distinguer les applications gouvernementales l\u00e9gitimes des fausses. Ce badge, visible sur les ic\u00f4nes des applications et dans les r\u00e9sultats de recherche. Il permet aux utilisateurs de les identifier facilement. En outre, les d\u00e9veloppeurs doivent fournir des preuves d\u2019autorisation gouvernementale pour obtenir ce badge. Cette initiative vise \u00e0 restaurer la confiance des utilisateurs apr\u00e8s des incidents de fausses applications gouvernementales, renfor\u00e7ant ainsi la s\u00e9curit\u00e9 et la fiabilit\u00e9 des applications disponibles sur la plateforme.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64611\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-64611\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Alerte s\u00e9curit\u00e9 : Phishing Nord-Cor\u00e9en via DMARC<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64611\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-64611\"><p>\/ Des pirates nord-cor\u00e9ens utilisent des erreurs de configuration dans DMARC pour envoyer des courriels de phishing cr\u00e9dibles. Selon un rapport de la NSA, du FBI et du D\u00e9partement d\u2019\u00c9tat am\u00e9ricain. Sous le nom de Kimsuky, ils usurpent des identit\u00e9s l\u00e9gitimes pour recueillir des renseignements aupr\u00e8s de cibles occidentales, en se faisant passer pour des journalistes ou des universitaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64612\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-64612\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Microsoft renforce la s\u00e9curit\u00e9 des applications Cloud avec defender XDR<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64612\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-64612\"><p>\/ Microsoft am\u00e9liore Defender XDR pour bloquer les applications OAuth malveillantes et ajoute une protection pour les syst\u00e8mes OT et ICS. Gr\u00e2ce \u00e0 l\u2019intelligence artificielle, une r\u00e9ponse rapide aux attaques \u00e9mergentes est assur\u00e9e. Cette mise \u00e0 jour renforce la s\u00e9curit\u00e9 des applications cloud, offrant une meilleure protection contre les menaces en ligne et garantissant la s\u00e9curit\u00e9 des donn\u00e9es des utilisateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64613\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-64613\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google am\u00e9liore la s\u00e9curit\u00e9 avec l'authentification \u00e0 deux facteurs<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64613\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-64613\"><p>\/ Google a simplifi\u00e9 la configuration de l&#8217;authentification \u00e0 deux facteurs, offrant une meilleure s\u00e9curit\u00e9. Les utilisateurs peuvent d\u00e9sormais ajouter une deuxi\u00e8me m\u00e9thode d&#8217;authentification avant d&#8217;activer la 2FA. Malgr\u00e9 cela, des vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes, n\u00e9cessitant l&#8217;adoption de pratiques comme la liaison de jetons pour renforcer la s\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64614\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-64614\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Meta exp\u00e9rimente la publication crois\u00e9e d'Instagram vers Threads<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64614\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-64614\"><p>\/ Meta teste la possibilit\u00e9 de publier des photos d\u2019Instagram directement sur Threads pour augmenter l&#8217;engagement. Cette fonctionnalit\u00e9, facultative, permet aux utilisateurs de partager leurs publications Instagram sur Threads. Meta exp\u00e9rimente \u00e9galement d&#8217;autres initiatives pour encourager l&#8217;utilisation de Threads, telles que la publication crois\u00e9e depuis Facebook et des incitations aux cr\u00e9ateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64615\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-64615\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Adobe VideoGigaGAN : R\u00e9volution de la restauration vid\u00e9o avec l'IA<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64615\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-64615\"><p>\/ Adobe VideoGigaGAN utilise l&#8217;intelligence artificielle pour transformer les anciennes vid\u00e9os de qualit\u00e9 m\u00e9diocre en vid\u00e9os HD avec des d\u00e9tails r\u00e9alistes. Bien que toujours en phase de recherche, cette technologie promet des r\u00e9sultats impressionnants en comblant les lacunes visuelles et en augmentant la r\u00e9solution jusqu&#8217;\u00e0 huit fois celle d&#8217;origine.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64616\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-64616\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Attaque ransomware CL0P : Rapport visa 2023<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64616\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-64616\"><p>\/ En 2023, une attaque de ransomware attribu\u00e9e au groupe CL0P a affect\u00e9 2 620 organisations et compromis les donn\u00e9es de 77,2 millions d&#8217;individus. Cette attaque a exploit\u00e9 deux vuln\u00e9rabilit\u00e9s, dont la zero-day CVE-2023-34362, ainsi que la CVE-2023-0669. L&#8217;Am\u00e9rique du Nord a \u00e9t\u00e9 la r\u00e9gion la plus touch\u00e9e en termes d&#8217;incidents de ransomware et de violations de donn\u00e9es dans l&#8217;\u00e9cosyst\u00e8me des paiements, avec pr\u00e8s de trois fois plus d&#8217;attaques que l&#8217;Europe.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64617\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-64617\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Faille dans LiteSpeed cache WordPress : Alertes de piratage<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64617\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-64617\"><p>\/ Des pirates exploitent activement la faille CVE-2023-40000 dans LiteSpeed Cache pour WordPress pour cr\u00e9er des comptes administrateurs malveillants. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 des utilisateurs non authentifi\u00e9s d&#8217;\u00e9lever leurs privil\u00e8ges. Il est donc imp\u00e9ratif de mettre \u00e0 jour le plugin et de maintenir une vigilance accrue.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64618\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-64618\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">OpenAI d\u00e9veloppe fonction recherche pour ChatGPT<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64618\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-64618\"><p>\/ OpenAI explore l&#8217;ajout d&#8217;une fonction de recherche \u00e0 ChatGPT, selon Bloomberg. Cette capacit\u00e9 permettrait au chatbot de fournir des r\u00e9ponses compl\u00e8tes aux requ\u00eates en parcourant le Web et en citant des sources fiables. En outre, des observations r\u00e9centes sugg\u00e8rent que l&#8217;entreprise travaille sur cette fonctionnalit\u00e9, bien qu&#8217;elle n&#8217;ait pas \u00e9t\u00e9 confirm\u00e9e officiellement.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64619\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-64619\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google Chrome am\u00e9liore ses suggestions avec le machine learning<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64619\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-64619\"><p>\/ Google Chrome a r\u00e9cemment am\u00e9lior\u00e9 sa barre d&#8217;adresse en int\u00e9grant des mod\u00e8les de machine learning, ce qui permet des suggestions de pages web plus pr\u00e9cises. Donc cette mise \u00e0 jour rend les suggestions plus flexibles en tenant compte du temps \u00e9coul\u00e9 depuis la derni\u00e8re navigation. De plus, cela ouvre la voie \u00e0 de futures am\u00e9liorations.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64620\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-64620\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Failles dans Ivanti connect secure exploit\u00e9es par Botnet Mirai<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64620\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-64620\"><p>\/ Deux failles de s\u00e9curit\u00e9 dans Ivanti Connect Secure (ICS) sont exploit\u00e9es par le botnet Mirai pour diffuser des charges malveillantes. Alors, ces vuln\u00e9rabilit\u00e9s, CVE-2023-46805 et CVE-2024-21887, permettent aux attaquants de prendre le contr\u00f4le d&#8217;instances sensibles en ex\u00e9cutant du code arbitraire. Donc, ce d\u00e9veloppement met en \u00e9vidence l&#8217;\u00e9volution des cybermenaces, avec la possibilit\u00e9 d&#8217;autres attaques similaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64621\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-64621\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Western Digital innove avec des SSD de 60 To pour les data centers et l'IA<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64621\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-64621\"><p>\/ Western Digital d\u00e9veloppe des SSD allant jusqu&#8217;\u00e0 60 To, une avanc\u00e9e majeure pour la gestion des donn\u00e9es dans les data centers et l&#8217;IA. En effet, ces disques r\u00e9pondent \u00e0 la demande croissante de capacit\u00e9s de stockage pour l&#8217;analyse de donn\u00e9es. Parall\u00e8lement, la soci\u00e9t\u00e9 am\u00e9liore sa technologie HAMR pour les disques durs traditionnels. Malgr\u00e9 les inqui\u00e9tudes de cannibalisation, les HDD et les SSD restent compl\u00e9mentaires dans le stockage des donn\u00e9es IA, favorisant ainsi une am\u00e9lioration globale des capacit\u00e9s de traitement.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64622\" class=\"elementor-tab-title\" data-tab=\"22\" role=\"button\" aria-controls=\"elementor-tab-content-64622\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google simplifie le transfert de donn\u00e9es entre appareils Android<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64622\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"22\" role=\"region\" aria-labelledby=\"elementor-tab-title-64622\"><p>\/ Google d\u00e9veloppe de nouvelles fonctionnalit\u00e9s pour faciliter le transfert de donn\u00e9es entre appareils Android. La premi\u00e8re permet le transfert simultan\u00e9 via Wi-Fi et par c\u00e2ble, acc\u00e9l\u00e9rant la configuration des nouveaux t\u00e9l\u00e9phones. La seconde offre la possibilit\u00e9 de restaurer des donn\u00e9es \u00e0 tout moment sans r\u00e9initialisation, mais avec quelques limitations. Ces am\u00e9liorations simplifient la configuration des nouveaux t\u00e9l\u00e9phones Android.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64623\" class=\"elementor-tab-title\" data-tab=\"23\" role=\"button\" aria-controls=\"elementor-tab-content-64623\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vuln\u00e9rabilit\u00e9s critiques dans les appliances BIG-IP<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64623\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"23\" role=\"region\" aria-labelledby=\"elementor-tab-title-64623\"><p>\/ Des vuln\u00e9rabilit\u00e9s critiques dans les appliances BIG-IP de F5 ont \u00e9t\u00e9 d\u00e9couvertes, dont deux, CVE-2024-21793 (injection Odata) et CVE-2024-26026 (injection SQL), ont \u00e9t\u00e9 confirm\u00e9es et corrig\u00e9es dans la version 20.2.0. Alors, ces failles pourraient permettre aux attaquants de prendre le contr\u00f4le administratif des appareils. Donc, les utilisateurs doivent mettre \u00e0 jour rapidement pour r\u00e9duire les risques d&#8217;intrusion.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-64624\" class=\"elementor-tab-title\" data-tab=\"24\" role=\"button\" aria-controls=\"elementor-tab-content-64624\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">OpenAI lance un outil de d\u00e9tection des images g\u00e9n\u00e9r\u00e9es par Dall-E<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-64624\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"24\" role=\"region\" aria-labelledby=\"elementor-tab-title-64624\"><p>\/ OpenAI a lanc\u00e9 un outil pour d\u00e9tecter les images g\u00e9n\u00e9r\u00e9es par Dall-E, une IA. Cet outil est fiable \u00e0 98 % pour les images non alt\u00e9r\u00e9es, mais sa pr\u00e9cision diminue avec les modifications. Il repr\u00e9sente une avanc\u00e9e contre la d\u00e9sinformation visuelle.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Failles de s\u00e9curit\u00e9 dans pgAdmin de PostgreSQL \/ Des chercheurs ont d\u00e9couvert deux failles de s\u00e9curit\u00e9 dans pgAdmin de PostgreSQL. En premier lieu, CVE-2024-4216 permet l\u2019ex\u00e9cution de code c\u00f4t\u00e9 client. D\u2019autre part, CVE-2024-4215 autorise le contournement de l\u2019authentification multifacteur. PostgreSQL a rapidement corrig\u00e9 ces vuln\u00e9rabilit\u00e9s. Par cons\u00e9quent, les utilisateurs sont vivement encourag\u00e9s \u00e0 mettre \u00e0 jour vers pgAdmin v4 8.6 pour se prot\u00e9ger contre toute exploitation. Bug Android menace la vie priv\u00e9e des utilisateurs de VPN \/ Un bug sur Android, identifi\u00e9 par Mullvad, expose la vie priv\u00e9e des utilisateurs de VPN. En effet, ce dysfonctionnement provoque des fuites DNS,<\/p>\n","protected":false},"author":1,"featured_media":12110,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9,3],"tags":[531,533,76,413,534,45,532,182,530],"class_list":["post-11907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite","category-cat_revue","tag-applications-mobiles","tag-authentification-multi-facteurs","tag-cyberattaques","tag-failles-de-securite","tag-innovation-technologique","tag-intelligence-artificielle","tag-messagerie-instantanee","tag-securite-informatique","tag-vie-privee-en-ligne"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-19 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-19.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-19 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-19.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-11T09:58:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png\" \/>\n\t<meta property=\"og:image:width\" content=\"7972\" \/>\n\t<meta property=\"og:image:height\" content=\"5315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-19\",\"datePublished\":\"2024-05-11T09:58:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\"},\"wordCount\":1775,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png\",\"keywords\":[\"Applications mobiles\",\"Authentification multi-facteurs\",\"cyberattaques\",\"Failles de S\u00e9curit\u00e9\",\"Innovation technologique\",\"intelligence artificielle\",\"Messagerie instantan\u00e9e\",\"S\u00e9curit\u00e9 informatique\",\"Vie priv\u00e9e en ligne\"],\"articleSection\":[\"Actualit\u00e9\",\"Revue\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\",\"name\":\"Semaine 2024-19 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png\",\"datePublished\":\"2024-05-11T09:58:31+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-19.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png\",\"width\":7972,\"height\":5315,\"caption\":\"Semaine 2024-19\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-19\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-19 - Vitrine outlYing","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-19.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-19 - Vitrine outlYing","og_description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-19.","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-05-11T09:58:31+00:00","og_image":[{"width":7972,"height":5315,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-19","datePublished":"2024-05-11T09:58:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/"},"wordCount":1775,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png","keywords":["Applications mobiles","Authentification multi-facteurs","cyberattaques","Failles de S\u00e9curit\u00e9","Innovation technologique","intelligence artificielle","Messagerie instantan\u00e9e","S\u00e9curit\u00e9 informatique","Vie priv\u00e9e en ligne"],"articleSection":["Actualit\u00e9","Revue"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/","name":"Semaine 2024-19 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png","datePublished":"2024-05-11T09:58:31+00:00","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-19.","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/05\/Semaine-19.png","width":7972,"height":5315,"caption":"Semaine 2024-19"},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/05\/11\/semaine-2024-19\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-19"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/11907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=11907"}],"version-history":[{"count":416,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/11907\/revisions"}],"predecessor-version":[{"id":12347,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/11907\/revisions\/12347"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/12110"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=11907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=11907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=11907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}