{"id":9654,"date":"2024-02-25T20:50:19","date_gmt":"2024-02-25T20:50:19","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=9654"},"modified":"2024-02-25T20:50:19","modified_gmt":"2024-02-25T20:50:19","slug":"semaine-2024-08","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/","title":{"rendered":"Semaine 2024-08"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9654\" class=\"elementor elementor-9654\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-15c82e36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15c82e36\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-12f92708\" data-id=\"12f92708\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be7701c elementor-widget elementor-widget-toggle\" data-id=\"be7701c\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1991\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1991\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">La mont\u00e9e alarmante des faux SMS : un risque croissant pour tous<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1991\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1991\"><p>\/ Une r\u00e9cente \u00e9tude r\u00e9v\u00e8le qu&#8217;entre 19,8 et 35,7 milliards de SMS frauduleux ont \u00e9t\u00e9 envoy\u00e9s en 2023, causant des pertes financi\u00e8res importantes pour les entreprises usurp\u00e9es, \u00e9valu\u00e9es \u00e0 1,16 milliard de dollars.&nbsp;<\/p>\n<p>\/ Cette tendance, repr\u00e9sentant pr\u00e8s de 5 % du trafic SMS mondial.&nbsp;<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1992\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1992\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Meta prend des mesures contre 8 soci\u00e9t\u00e9s de logiciels espions<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1992\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1992\"><p>\/ Meta Platforms annonce avoir agi contre huit soci\u00e9t\u00e9s de logiciels espions bas\u00e9es en Italie, en Espagne et aux \u00c9mirats arabes unis.&nbsp;<\/p><p>\/ Ces soci\u00e9t\u00e9s ciblaient les appareils iOS, Android et Windows, collectant diverses informations sensibles. Meta a supprim\u00e9 les comptes li\u00e9s et restreint leurs activit\u00e9s.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1993\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1993\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Accord Anti-Deepfake : les g\u00e9ants de la tech s'unissent<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1993\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1993\"><p>\/ Un accord volontaire sign\u00e9 par des entreprises technologiques majeures vise \u00e0 lutter contre les deepfakes pouvant \u00eatre utilis\u00e9s pour manipuler les \u00e9lections.&nbsp;<\/p><p>\/ Parmi les signataires : Meta, Google, Microsoft, IBM, Amazon et Adobe, ainsi que les plateformes sociales X, Snap et TikTok.&nbsp;<\/p><p>\/ L&#8217;accord propose un nouveau cadre pour identifier et \u00e9tiqueter les deepfakes trompeurs sur les r\u00e9seaux sociaux, visant \u00e0 prot\u00e9ger l&#8217;int\u00e9grit\u00e9 des processus d\u00e9mocratiques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1994\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1994\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Microsoft rapporte l'utilisation de ChatGPT par des pirates informatiques parrain\u00e9s par l'\u00c9tat<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1994\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1994\"><p>\/ Des pirates informatiques soutenus par des \u00c9tats exploitent d\u00e9sormais l&#8217;intelligence artificielle, notamment ChatGPT, dans leurs activit\u00e9s de cybercriminalit\u00e9, selon un rapport de Microsoft.&nbsp;<\/p>\n<p>\/ Cette adoption de l&#8217;IA par les groupes de menaces persistantes avanc\u00e9es (APT) vise \u00e0 am\u00e9liorer leur productivit\u00e9 et \u00e0 contourner les mesures de s\u00e9curit\u00e9.&nbsp;<\/p><p>\/ Microsoft et OpenAI travaillent ensemble pour contrer ces menaces, mais la technologie d&#8217;IA reste vuln\u00e9rable \u00e0 une utilisation abusive.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1995\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1995\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google d\u00e9voile Magika : un outil IA pour rep\u00e9rer les fichiers malveillants<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1995\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1995\"><p>\/ Google a annonc\u00e9 le lancement de Magika, un syst\u00e8me propuls\u00e9 par l&#8217;IA con\u00e7u pour identifier les fichiers dangereux. Avec sa capacit\u00e9 \u00e0 rapidement et pr\u00e9cis\u00e9ment d\u00e9tecter les diff\u00e9rents formats de fichiers, Magika renforce la s\u00e9curit\u00e9 des utilisateurs de&nbsp;<span style=\"-webkit-text-size-adjust: 100%;\">Google en les dirigeant vers les scanners appropri\u00e9s.&nbsp;<\/span><\/p><p><span style=\"-webkit-text-size-adjust: 100%;\">\/ Gr\u00e2ce \u00e0 un mod\u00e8le d&#8217;apprentissage en profondeur optimis\u00e9 et l&#8217;utilisation de Open Neural Network Exchange (Onnx), Magika offre une solution efficace contre les menaces potentielles.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1996\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1996\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Le FBI redouble d'efforts contre les attaques chinoises sur les infrastructures am\u00e9ricaines<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1996\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1996\"><p>\/ Christopher Wray, directeur du FBI, r\u00e9it\u00e8re l&#8217;engagement de l&#8217;agence \u00e0 contrer les attaques chinoises visant les infrastructures essentielles des \u00c9tats-Unis.&nbsp;<\/p><p>\/ Il met en garde contre la propagation croissante des logiciels malveillants, soulignant la menace s\u00e9rieuse que repr\u00e9sentent ces actions pour la s\u00e9curit\u00e9 nationale.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1997\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1997\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Succ\u00e8s dans la lutte contre LockBit : criminels arr\u00eat\u00e9s, cl\u00e9s de d\u00e9cryptage obtenues<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1997\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1997\"><p>\/ La National Crime Agency (NCA) du Royaume-Uni a r\u00e9ussi \u00e0 neutraliser l&#8217;op\u00e9ration LockBit en proc\u00e9dant \u00e0 l&#8217;arrestation de deux suspects en Pologne et en Ukraine. Cette action a \u00e9t\u00e9 accompagn\u00e9e du gel de plus de 200 comptes de cryptomonnaies associ\u00e9s au groupe.&nbsp;<\/p>\n<p>\/ La NCA a pu mettre la main sur le code source de LockBit ainsi que sur des informations cruciales sur ses activit\u00e9s, mettant en lumi\u00e8re le fait que m\u00eame en payant des ran\u00e7ons, il n&#8217;y a aucune garantie de r\u00e9cup\u00e9ration des donn\u00e9es.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1998\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1998\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Mise en garde : les applications Salesforce personnalis\u00e9es exposent les donn\u00e9es confidentielles des entreprises<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1998\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1998\"><p>\/ <span style=\"font-weight: 400;\">Les entreprises utilisant des instances Salesforce personnalis\u00e9es sont averties des risques de s\u00e9curit\u00e9 li\u00e9s aux erreurs de programmation et de configuration dans le langage Apex.&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\">\/ Des experts en s\u00e9curit\u00e9 ont d\u00e9couvert des vuln\u00e9rabilit\u00e9s compromettant la s\u00e9curit\u00e9 des donn\u00e9es confidentielles telles que les num\u00e9ros de t\u00e9l\u00e9phone, les adresses personnelles et les informations d&#8217;identification.&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\">\/ Les utilisateurs doivent prendre la responsabilit\u00e9 de s\u00e9curiser leur code Apex pour prot\u00e9ger leurs donn\u00e9es.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1999\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1999\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les pirates du ransomware cactus d\u00e9clarent avoir d\u00e9rob\u00e9 des t\u00e9raoctets de donn\u00e9es Schneider Electric<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1999\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1999\"><p>\/ <span style=\"font-weight: 400;\">Le groupe de ransomware Cactus affirme avoir effectu\u00e9 une cyberattaque contre Schneider Electric, pr\u00e9tendant avoir vol\u00e9 1,5 t\u00e9raoctet de donn\u00e9es. Sur leur site web, ils ont publi\u00e9 des \u00e9chantillons des donn\u00e9es vol\u00e9es et r\u00e9clament une ran\u00e7on pour leur s\u00e9curit\u00e9.&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\">\/ Bien qu&#8217;on ne connaisse pas exactement la nature des donn\u00e9es, elles pourraient inclure des informations relatives au Sustainability Business de Schneider Electric, qui fournit des services \u00e0 des entreprises comme DHL, Hilton et Walmart.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19910\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-19910\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Rapport: Des pirates nord-cor\u00e9ens ciblent les entreprises de d\u00e9fense dans une campagne de cyberespionnage<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19910\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-19910\"><p>\/ Un rapport r\u00e9cent met en \u00e9vidence une campagne de cyberespionnage dirig\u00e9e par des acteurs nord-cor\u00e9ens, ciblant le secteur de la d\u00e9fense \u00e0 l&#8217;\u00e9chelle mondiale.&nbsp;<\/p><p>\/ Le groupe Lazarus est impliqu\u00e9 dans ces attaques, utilisant des tactiques sophistiqu\u00e9es telles que l&#8217;ing\u00e9nierie sociale pour infiltrer les entreprises cibl\u00e9es. Cette menace souligne l&#8217;urgence pour les entreprises du secteur de la d\u00e9fense de renforcer leurs mesures de cybers\u00e9curit\u00e9 pour se prot\u00e9ger contre de telles attaques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19911\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-19911\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Mastodon : nouvelle vague d'attaques de spam<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19911\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-19911\"><p>\/<span style=\"font-weight: 400;\">&nbsp;Mastodon fait face \u00e0 une mont\u00e9e en fl\u00e8che des attaques de spam, compromettant l&#8217;exp\u00e9rience des utilisateurs.&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\">\/ Rochko, le PDG de Mastodon, presse les administrateurs d&#8217;adopter des mesures telles que l&#8217;approbation des inscriptions et le rejet des adresses e-mail temporaires pour contrer cette menace.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19912\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-19912\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nouvelles am\u00e9liorations de copilot AI pour Windows 11 : r\u00e9ponse \u00e0 l'attente des utilisateurs ?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19912\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-19912\"><p>Microsoft d\u00e9ploie des mises \u00e0 jour pour Copilot AI sur Windows 11, afin d&#8217;am\u00e9liorer sa capacit\u00e9 \u00e0 g\u00e9rer les param\u00e8tres du syst\u00e8me. Toutefois, des questions subsistent quant \u00e0 savoir si ces modifications seront \u00e0 la hauteur des attentes des utilisateurs.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19913\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-19913\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Mustang Panda propage la variante DOPLUGS de PlugX en asie<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19913\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-19913\"><p>\/ <span style=\"font-weight: 400;\">Le groupe de menace chinois Mustang Panda intensifie ses activit\u00e9s en Asie en utilisant la variante avanc\u00e9e de la porte d\u00e9rob\u00e9e PlugX, appel\u00e9e DOPLUGS.&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\">\/ Les pays principalement cibl\u00e9s sont Taiwan et le Vietnam, mais d&#8217;autres pays asiatiques sont \u00e9galement touch\u00e9s par cette campagne malveillante.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19914\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-19914\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les biblioth\u00e8ques sous attaque : la menace croissante des cybermenaces<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19914\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-19914\"><p>\/ Les biblioth\u00e8ques, traditionnellement gardiennes du savoir, sont de plus en plus expos\u00e9es aux attaques cybern\u00e9tiques.<\/p><p>\/ L&#8217;incident de ransomware \u00e0 la British Library souligne cette vuln\u00e9rabilit\u00e9 croissante, mettant en danger non seulement les donn\u00e9es, mais aussi le riche patrimoine culturel et historique d\u00e9sormais num\u00e9ris\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19915\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-19915\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Adobe Acrobat int\u00e8gre l'IA g\u00e9n\u00e9rative pour une interaction r\u00e9volutionnaire avec les PDF<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19915\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-19915\"><p>\/ Adobe franchit une nouvelle \u00e9tape dans l&#8217;int\u00e9gration de l&#8217;intelligence artificielle en d\u00e9ployant son propre assistant IA sur Acrobat et Reader, offrant ainsi une exp\u00e9rience in\u00e9dite d&#8217;interaction avec les fichiers PDF.&nbsp;<\/p><p>\/ L&#8217;outil conversationnel g\u00e9n\u00e9ratif, actuellement en phase b\u00eata, vise \u00e0 simplifier les t\u00e2ches telles que la cr\u00e9ation de r\u00e9sum\u00e9s, la r\u00e9ponse aux questions et le formatage des informations \u00e0 partager par e-mail directement dans les applications PDF les plus populaires.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19916\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-19916\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Attaque cyber sur le gouvernement russe : Konni RAT en action<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19916\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-19916\"><p>\/ Le gouvernement russe a \u00e9t\u00e9 la cible d&#8217;une cyberattaque d&#8217;envergure, exposant des vuln\u00e9rabilit\u00e9s significatives. \u00c0 l&#8217;origine de cette attaque, le redoutable Konni RAT a r\u00e9ussi \u00e0 infiltrer les syst\u00e8mes logiciels, mena\u00e7ant ainsi la s\u00e9curit\u00e9 des donn\u00e9es, notamment celles du minist\u00e8re des Affaires \u00e9trang\u00e8res (MID).&nbsp;<\/p><p>\/ Cette situation souligne l&#8217;urgence de renforcer les mesures de protection contre les cybermenaces et la n\u00e9cessit\u00e9 d&#8217;une collaboration internationale pour s\u00e9curiser les infrastructures gouvernementales.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19917\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-19917\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Alerte S\u00e9curit\u00e9 : vuln\u00e9rabilit\u00e9s critiques dans ConnectWise, action urgente requise<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19917\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-19917\"><p>\/ ConnectWise, un leader des solutions d&#8217;acc\u00e8s \u00e0 distance, a corrig\u00e9 deux vuln\u00e9rabilit\u00e9s majeures dans son produit ScreenConnect, signal\u00e9es le 13 f\u00e9vrier 2024.&nbsp;<\/p><p>\/ Bien qu&#8217;aucune exploitation n&#8217;ait \u00e9t\u00e9 confirm\u00e9e, l&#8217;entreprise exhorte les utilisateurs \u00e0 appliquer rapidement les correctifs disponibles pour pr\u00e9venir tout risque de s\u00e9curit\u00e9.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19918\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-19918\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">D\u00e9faillance des Outils d'IA : Probl\u00e8mes pour ChatGPT et Gemini<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19918\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-19918\"><p>\/ Les leaders de l&#8217;intelligence artificielle, OpenAI et Google, sont confront\u00e9s \u00e0 des dysfonctionnements majeurs avec leurs outils d&#8217;IA g\u00e9n\u00e9rative. ChatGPT, aliment\u00e9 par GPT-4, a donn\u00e9 des r\u00e9ponses absurdes, tandis que Gemini de Google a produit des images d\u00e9form\u00e9es.<\/p><p>\/ Ces incidents soul\u00e8vent des pr\u00e9occupations quant \u00e0 la fiabilit\u00e9 et \u00e0 la qualit\u00e9 des syst\u00e8mes d&#8217;IA, soulignant la n\u00e9cessit\u00e9 de renforcer les contr\u00f4les de qualit\u00e9 et la transparence dans leur d\u00e9veloppement.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19919\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-19919\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Apple renforce la s\u00e9curit\u00e9 d'iMessage avec le cryptage post-quantique PQ3<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19919\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-19919\"><p>\/ Apple a r\u00e9cemment annonc\u00e9 l&#8217;ajout du cryptage post-quantique PQ3 \u00e0 iMessage, am\u00e9liorant ainsi la confidentialit\u00e9 des messages \u00e9chang\u00e9s. Cette \u00e9volution, entam\u00e9e en 2019 avec le passage \u00e0 la cryptographie ECC, vise \u00e0 contrer les menaces potentielles des ordinateurs quantiques.<\/p><p>\/ La transition vers PQ3 sera d\u00e9ploy\u00e9e progressivement dans les futures mises \u00e0 jour logicielles, offrant ainsi une protection renforc\u00e9e contre les attaques futures.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19920\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-19920\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nokia et Nvidia transforment les r\u00e9seaux mobiles<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19920\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-19920\"><p>\/ Nokia et Nvidia annoncent un partenariat pour int\u00e9grer l&#8217;intelligence artificielle dans les r\u00e9seaux d&#8217;acc\u00e8s radio (RAN), ouvrant ainsi une nouvelle \u00e8re dans les t\u00e9l\u00e9communications.&nbsp;<\/p><p>\/ Cette collaboration vise \u00e0 optimiser les op\u00e9rations r\u00e9seaux et \u00e0 am\u00e9liorer la connectivit\u00e9 mobile gr\u00e2ce \u00e0 l&#8217;utilisation de l&#8217;IA, combinant les technologies de pointe des deux entreprises.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19921\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-19921\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">PIA am\u00e9liore la confidentialit\u00e9 en ligne sur MacOS VPN et Apple TV<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19921\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-19921\"><p>\/ Private Internet Access (PIA) renforce la s\u00e9curit\u00e9 en ligne avec le retour du tunneling fractionn\u00e9 sur MacOS VPN. Cette fonctionnalit\u00e9, indisponible depuis 2021, offre aux utilisateurs un contr\u00f4le accru sur leur trafic VPN.&nbsp;<\/p>\n<p>\/ En parall\u00e8le, PIA lance une nouvelle application VPN pour Apple TV, avec une option IP d\u00e9di\u00e9e pour une s\u00e9curit\u00e9 renforc\u00e9e.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La mont\u00e9e alarmante des faux SMS : un risque croissant pour tous \/ Une r\u00e9cente \u00e9tude r\u00e9v\u00e8le qu\u2019entre 19,8 et 35,7 milliards de SMS frauduleux ont \u00e9t\u00e9 envoy\u00e9s en 2023, causant des pertes financi\u00e8res importantes pour les entreprises usurp\u00e9es, \u00e9valu\u00e9es \u00e0 1,16 milliard de dollars. \/ Cette tendance, repr\u00e9sentant pr\u00e8s de 5 % du trafic SMS mondial. Meta prend des mesures contre 8 soci\u00e9t\u00e9s de logiciels espions \/ Meta Platforms annonce avoir agi contre huit soci\u00e9t\u00e9s de logiciels espions bas\u00e9es en Italie, en Espagne et aux \u00c9mirats arabes unis. \/ Ces soci\u00e9t\u00e9s ciblaient les appareils iOS, Android et Windows, collectant<\/p>\n","protected":false},"author":1,"featured_media":9659,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9],"tags":[35,258,256,74,257,47],"class_list":["post-9654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite","tag-apple","tag-asie","tag-chatgpt","tag-chine","tag-cyberattaque","tag-google"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-08 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"Les derni\u00e8res actualit\u00e9s \u00e0 port\u00e9 de main !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-08 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"Les derni\u00e8res actualit\u00e9s \u00e0 port\u00e9 de main !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-25T20:50:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-08\",\"datePublished\":\"2024-02-25T20:50:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\"},\"wordCount\":1653,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png\",\"keywords\":[\"apple\",\"asie\",\"chatgpt\",\"chine\",\"cyberattaque\",\"Google\"],\"articleSection\":[\"Actualit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\",\"name\":\"Semaine 2024-08 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png\",\"datePublished\":\"2024-02-25T20:50:19+00:00\",\"description\":\"Les derni\u00e8res actualit\u00e9s \u00e0 port\u00e9 de main !\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png\",\"width\":17717,\"height\":11811},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-08\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-08 - Vitrine outlYing","description":"Les derni\u00e8res actualit\u00e9s \u00e0 port\u00e9 de main !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-08 - Vitrine outlYing","og_description":"Les derni\u00e8res actualit\u00e9s \u00e0 port\u00e9 de main !","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-02-25T20:50:19+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08-1024x683.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-08","datePublished":"2024-02-25T20:50:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/"},"wordCount":1653,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png","keywords":["apple","asie","chatgpt","chine","cyberattaque","Google"],"articleSection":["Actualit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/","name":"Semaine 2024-08 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png","datePublished":"2024-02-25T20:50:19+00:00","description":"Les derni\u00e8res actualit\u00e9s \u00e0 port\u00e9 de main !","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Semaine-08.png","width":17717,"height":11811},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/25\/semaine-2024-08\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-08"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=9654"}],"version-history":[{"count":30,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9654\/revisions"}],"predecessor-version":[{"id":9841,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9654\/revisions\/9841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/9659"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=9654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=9654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=9654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}