{"id":13628,"date":"2024-06-15T17:07:48","date_gmt":"2024-06-15T17:07:48","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=13628"},"modified":"2024-06-16T18:16:54","modified_gmt":"2024-06-16T18:16:54","slug":"semaine-2024-24","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/","title":{"rendered":"Semaine 2024-24"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13628\" class=\"elementor elementor-13628\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5b2e186 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b2e186\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8fe3a5c\" data-id=\"8fe3a5c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ec6ed4 elementor-widget elementor-widget-toggle\" data-id=\"3ec6ed4\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6581\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-6581\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Sticky Werewolf \u00e9tend ses cyberattaques en Russie et en Bi\u00e9lorussie<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6581\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-6581\"><p>Sticky Werewolf a d\u2019abord pris pour cible une soci\u00e9t\u00e9 pharmaceutique et un institut de recherche en microbiologie et vaccins en Russie. Par la suite, les attaques ont gagn\u00e9 le secteur de l\u2019aviation. Finalement, la m\u00e9thode d\u2019infection a chang\u00e9, passant de liens de t\u00e9l\u00e9chargement \u00e0 des fichiers d\u2019archives LNK qui pointent vers des charges utiles sur des serveurs WebDAV.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6582\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-6582\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Microsoft Recall : une fonctionnalit\u00e9 tr\u00e8s critiqu\u00e9e en cybers\u00e9curit\u00e9<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6582\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-6582\"><p>La fonctionnalit\u00e9 Recall permet de prendre des captures d\u2019\u00e9cran en continu sur les PC Copilot+. Malgr\u00e9 les mesures de s\u00e9curit\u00e9 mises en place, des chercheurs ont pu contourner les protections. En effet, cette situation a conduit \u00e0 une vague de critiques contre Microsoft, remettant en question l&#8217;efficacit\u00e9 de leurs pratiques de s\u00e9curit\u00e9 informatique.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6583\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-6583\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Le Kimsuky APT nord-cor\u00e9en cible Facebook et MS console pour des attaques cibl\u00e9es<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6583\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-6583\"><p>Les chercheurs en cybers\u00e9curit\u00e9 de Genians ont d\u00e9couvert que le groupe Kimsuky exploitait activement Facebook et MS Console. Ces cybercriminels se servent de ces plateformes pour contr\u00f4ler les comptes d\u2019utilisateurs et diffuser des logiciels malveillants. L\u2019ampleur de ces attaques en ligne s\u2019intensifie par l\u2019utilisation de plateformes de confiance.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6584\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-6584\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Pourquoi les Chromebooks plus de Google red\u00e9finissent l'IA sur PC<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6584\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-6584\"><p>Lors de son \u00e9v\u00e9nement annuel, Google a pr\u00e9sent\u00e9 ses nouveaux Chromebooks Plus, mettant en avant des fonctionnalit\u00e9s d\u2019IA innovantes. Cette d\u00e9marche se distingue alors que d\u2019autres poids lourds de la technologie, dont Microsoft, d\u00e9voilent \u00e9galement leurs PC \u00e9quip\u00e9s d\u2019IA. Les Chromebooks de Google illustrent v\u00e9ritablement comment l\u2019IA sur les ordinateurs portables devrait \u00eatre mise en \u0153uvre, proposant une approche unique et pionni\u00e8re.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6585\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-6585\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">SecShow : enqu\u00eates DNS massives \u00e0 l'\u00e9chelle mondiale<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6585\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-6585\"><p>Des chercheurs en cybers\u00e9curit\u00e9 ont d\u2019abord d\u00e9couvert que l\u2019acteur chinois SecShow conduit des sondages DNS massifs depuis juin 2023. Op\u00e9rant \u00e0 partir du CERNET, il cible ensuite des r\u00e9solveurs DNS ouverts pour recueillir des donn\u00e9es. Finalement, bien que les objectifs de ces op\u00e9rations restent inconnus, les informations collect\u00e9es pourraient servir \u00e0 des fins malveillantes.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6586\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-6586\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cylance victime d'une cyberattaque: donn\u00e9es en vente sur le Dark Web<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6586\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-6586\"><p>La soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Cylance a d\u2019abord confirm\u00e9 qu\u2019elle avait subi une cyberattaque. On a ensuite r\u00e9v\u00e9l\u00e9 que 34 millions d\u2019e-mails et d\u2019autres informations personnelles identifiables (PII) avaient \u00e9t\u00e9 d\u00e9rob\u00e9s. Finalement, le pirate informatique Sp1d3r vend maintenant ces donn\u00e9es pour 750 000 $.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6587\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-6587\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Violation de donn\u00e9es chez Snowflake : des centaines d'organisations touch\u00e9es<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6587\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-6587\"><p>Une nouvelle \u00e9tude indique d\u2019abord que la violation de Snowflake pourrait toucher des centaines d\u2019organisations. Mandiant, qui m\u00e8ne l\u2019enqu\u00eate sur l\u2019incident, a ensuite d\u00e9j\u00e0 inform\u00e9 165 organisations. Finalement, l\u2019attaque attribu\u00e9e \u00e0 UNC5537 est toujours en cours, et le nombre de victimes devrait continuer \u00e0 augmenter.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6588\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-6588\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Violation de donn\u00e9es chez 23andMe<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6588\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-6588\"><p>Une enqu\u00eate conjointe du Royaume-Uni et du Canada se penche sur la violation de donn\u00e9es chez 23andMe. On a publi\u00e9 sur le dark web des donn\u00e9es sensibles de 13 millions de clients, y compris des informations sur l\u2019origine et la sant\u00e9. Cela pr\u00e9sente des risques d\u2019usurpation d\u2019identit\u00e9 et d\u2019attaques de phishing.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-6589\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-6589\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les pirates APT exploitent Google Drive et OneDrive pour diss\u00e9miner des logiciels malveillants<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-6589\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-6589\"><p>Les attaquants utilisent d\u2019abord des services de stockage cloud tels que Google Drive et OneDrive pour h\u00e9berger des scripts malveillants. Ils lancent ensuite des attaques en cha\u00eene, souvent via des fichiers de raccourci, ce qui permet une mise \u00e0 jour facile du malware. Finalement, ces tactiques posent une menace pour la s\u00e9curit\u00e9 en facilitant le vol d\u2019informations sensibles et le d\u00e9ploiement de nouvelles fonctionnalit\u00e9s malveillantes.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-65810\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-65810\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Des pirates exploitent Windows Search pour diffuser des logiciels malveillants<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-65810\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-65810\"><p>Les pirates exploitent d\u2019abord la confiance des utilisateurs envers Windows Search. Ils masquent ensuite leurs intentions en se faisant passer pour inoffensifs. Finalement, ils incitent les victimes \u00e0 ouvrir des pi\u00e8ces jointes aux e-mails.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-65811\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-65811\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nouvelle campagne de Cryptojacking sur Kubernetes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-65811\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-65811\"><p>Les chercheurs ont identifi\u00e9 une attaque qui exploite des clusters Kubernetes mal configur\u00e9s. En effet, l\u2019attaque utilise des DaemonSets, qui semblent inoffensifs, pour d\u00e9ployer des mineurs malveillants. Le nombre d\u2019extractions d\u2019images malveillantes sur Docker Hub a d\u00e9pass\u00e9 les 10 000.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-65812\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-65812\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">L'Union europ\u00e9enne envisage de transformer les appareils num\u00e9riques en outils de surveillance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-65812\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-65812\"><p>Ll&#8217;Union Europ\u00e9enne a r\u00e9vis\u00e9 sa proposition pour lutter contre la diffusion de mat\u00e9riels d&#8217;abus sexuels sur des enfants en ligne. En effet un plan en 42 points divulgu\u00e9 recommande la conservation des donn\u00e9es et l&#8217;interception des services num\u00e9riques. Finalement, l&#8217;objectif est de rendre les appareils num\u00e9riques contr\u00f4lables par les forces de l&#8217;ordre \u00e0 tout moment.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-65813\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-65813\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Noodle RAT : une Nouvelle menace multiplateforme<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-65813\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-65813\"><p>Noodle RAT cible Windows et Linux. Actif depuis 2016, il est distinct des malwares existants. En effet, il est utilis\u00e9 par des cybercriminels chinois pour l&#8217;espionnage et le crime.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sticky Werewolf \u00e9tend ses cyberattaques en Russie et en Bi\u00e9lorussie Sticky Werewolf a d\u2019abord pris pour cible une soci\u00e9t\u00e9 pharmaceutique et un institut de recherche en microbiologie et vaccins en Russie. Par la suite, les attaques ont gagn\u00e9 le secteur de l\u2019aviation. Finalement, la m\u00e9thode d\u2019infection a chang\u00e9, passant de liens de t\u00e9l\u00e9chargement \u00e0 des fichiers d\u2019archives LNK qui pointent vers des charges utiles sur des serveurs WebDAV. Microsoft Recall : une fonctionnalit\u00e9 tr\u00e8s critiqu\u00e9e en cybers\u00e9curit\u00e9 La fonctionnalit\u00e9 Recall permet de prendre des captures d\u2019\u00e9cran en continu sur les PC Copilot+. Malgr\u00e9 les mesures de s\u00e9curit\u00e9 mises en place,<\/p>\n","protected":false},"author":1,"featured_media":13838,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9],"tags":[],"class_list":["post-13628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-24 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-24 (du 10 juin au 16 juin).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-24 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-24 (du 10 juin au 16 juin).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-15T17:07:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-16T18:16:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-24\",\"datePublished\":\"2024-06-15T17:07:48+00:00\",\"dateModified\":\"2024-06-16T18:16:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\"},\"wordCount\":856,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png\",\"articleSection\":[\"Actualit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\",\"name\":\"Semaine 2024-24 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png\",\"datePublished\":\"2024-06-15T17:07:48+00:00\",\"dateModified\":\"2024-06-16T18:16:54+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-24 (du 10 juin au 16 juin).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png\",\"width\":1024,\"height\":1024,\"caption\":\"Actualit\u00e9s Semaine 2024-24\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-24\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-24 - Vitrine outlYing","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-24 (du 10 juin au 16 juin).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-24 - Vitrine outlYing","og_description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-24 (du 10 juin au 16 juin).","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-06-15T17:07:48+00:00","article_modified_time":"2024-06-16T18:16:54+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-24","datePublished":"2024-06-15T17:07:48+00:00","dateModified":"2024-06-16T18:16:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/"},"wordCount":856,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png","articleSection":["Actualit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/","name":"Semaine 2024-24 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png","datePublished":"2024-06-15T17:07:48+00:00","dateModified":"2024-06-16T18:16:54+00:00","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s en s\u00e9curit\u00e9 informatique et intelligence artificielle de la semaine 2024-24 (du 10 juin au 16 juin).","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/06\/Semaine-22-du-27-mai-au-2-Juin-2.png","width":1024,"height":1024,"caption":"Actualit\u00e9s Semaine 2024-24"},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/06\/15\/semaine-2024-24\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-24"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/13628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=13628"}],"version-history":[{"count":183,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/13628\/revisions"}],"predecessor-version":[{"id":13965,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/13628\/revisions\/13965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/13838"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=13628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=13628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=13628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}