{"id":9969,"date":"2024-03-09T10:25:11","date_gmt":"2024-03-09T10:25:11","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=9969"},"modified":"2024-03-09T10:25:11","modified_gmt":"2024-03-09T10:25:11","slug":"semaine-2024-10","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/","title":{"rendered":"Semaine 2024-10"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9969\" class=\"elementor elementor-9969\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65b819a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"65b819a4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4efc0e3c\" data-id=\"4efc0e3c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c513c09 elementor-widget elementor-widget-toggle\" data-id=\"c513c09\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2061\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2061\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Microsoft d\u00e9ploie une IA g\u00e9n\u00e9rative sp\u00e9cialis\u00e9e dans les finances : Copilot Finance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2061\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2061\"><p>\/ <span style=\"font-weight: 400;\">Microsoft lance <\/span>Copilot pour la finance<span style=\"font-weight: 400;\">, un chatbot IA d\u00e9di\u00e9 \u00e0 l&#8217;int\u00e9gration aux syst\u00e8mes financiers de l&#8217;entreprise, visant \u00e0 automatiser les t\u00e2ches op\u00e9rationnelles et \u00e0 simplifier les processus financiers.<\/span><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2062\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2062\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">LG et Meta collaborent pour concevoir un casque de r\u00e9alit\u00e9 mixte haut de gamme<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2062\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2062\"><p>\/ <b>\u00a0<\/b><span style=\"font-weight: 400;\">LG et Meta s&#8217;associent pour cr\u00e9er un casque de r\u00e9alit\u00e9 mixte, int\u00e9grant les contenus Smart TV de LG afin de concurrencer Apple, tout en explorant des fonctionnalit\u00e9s avanc\u00e9es comme les Codec Avatars et l&#8217;intelligence artificielle g\u00e9n\u00e9rative pour une exp\u00e9rience immersive haut de gamme.<\/span><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2063\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2063\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Plus de 100 mod\u00e8les d'IA\/ML malveillants d\u00e9couverts sur Hugging Face<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2063\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2063\"><p>\/ <b> <span style=\"font-weight: 400;\">Plus de 100 mod\u00e8les d&#8217;IA et d&#8217;apprentissage automatique malveillants ont \u00e9t\u00e9 identifi\u00e9s sur Hugging Face, soulevant des pr\u00e9occupations quant \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;IA en raison de leur capacit\u00e9 \u00e0 prendre le contr\u00f4le des machines compromises.<\/span><\/b><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2064\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2064\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Phobos Ransomware cible gouvernements avec Vuln\u00e9rabilit\u00e9 critique<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2064\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2064\"><p>\/ L&#8217;agence am\u00e9ricaine a mis en garde contre le ransomware. Focalisation sur les gouvernements et les infrastructures. Depuis 2019, Phobos est en activit\u00e9 et exploite des services RDP expos\u00e9s en utilisant le phishing. CACTUS organise une attaque en utilisant la vuln\u00e9rabilit\u00e9 (CVE-2023-38035) sur Ivanti Sentry. En d\u00e9pit d&#8217;une augmentation de 20 % des demandes de ran\u00e7on en 2023, le paiement ne garantit pas une r\u00e9cup\u00e9ration s\u00e9curis\u00e9e des donn\u00e9es, avec des organisations souvent r\u00e9attaqu\u00e9es apr\u00e8s avoir effectu\u00e9 le paiement.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2065\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2065\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Controverse autour du logiciel Polygraphe contre les faux avis en ligne<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2065\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2065\"><p>\/ Le logiciel Polygraphe, autoris\u00e9 l&#8217;ann\u00e9e derni\u00e8re pour d\u00e9tecter les faux avis en ligne, suscite des pr\u00e9occupations en raison de sa collecte extensive de donn\u00e9es personnelles. Utilis\u00e9 par la DGCCRF sur Google et TripAdvisor, il analyse les avis en identifiant ceux potentiellement manipul\u00e9s. Bien que l\u00e9galement approuv\u00e9, il est critiqu\u00e9 comme intrusif par le d\u00e9put\u00e9 Philippe Latombe et la Cnil, mettant en lumi\u00e8re la n\u00e9cessit\u00e9 d&#8217;un cadre l\u00e9gal plus strict. Le logiciel pourrait \u00e9galement s&#8217;\u00e9tendre \u00e0 d&#8217;autres plateformes \u00e0 l&#8217;avenir.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2066\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2066\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google Pixel : bient\u00f4t des communications d'urgence via satellite SOS<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2066\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2066\"><p>\/ Google pr\u00e9pare le lancement de &#8220;Satellite SOS&#8221; sur les smartphones Pixel, offrant des communications d&#8217;urgence similaires \u00e0 celles des iPhone 14 d&#8217;Apple. Les d\u00e9tails sur les smartphones \u00e9ligibles seront probablement annonc\u00e9s lors de la conf\u00e9rence Google I\/O en mai.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2067\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2067\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Kaspersky signale une forte augmentation du vol d'identifiants, notamment chez les enfants<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2067\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2067\"><p>\/ Kaspersky signale une forte augmentation du vol d&#8217;identifiants, avec environ 36 millions de comptes actuellement en vente sur le dark web. Des comptes li\u00e9s \u00e0 l&#8217;IA, tels que 688 000 d&#8217;OpenAI, et 1 160 000 comptes Canva sont inclus. Le rapport met \u00e9galement en lumi\u00e8re une tendance croissante des cybercriminels ciblant les enfants, avec 15 500 000 comptes Roblox vendus en 2023, soit trois fois plus qu&#8217;en 2021. La sensibilisation \u00e0 la cybers\u00e9curit\u00e9 est soulign\u00e9e comme cruciale pour pr\u00e9venir les risques.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2068\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-2068\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Alerte s\u00e9curit\u00e9 : forte augmentation des vuln\u00e9rabilit\u00e9s dans les bases de code<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2068\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-2068\"><p>\/ Le nombre de bases de code commerciales avec des vuln\u00e9rabilit\u00e9s \u00e0 haut risque issues de composants open source a fortement augment\u00e9 en un an, passant de 48 % \u00e0 74%, attribu\u00e9 \u00e0 l&#8217;instabilit\u00e9 \u00e9conomique et aux licenciements. Jason Schmitt insiste sur l&#8217;importance d&#8217;une gestion efficace de l&#8217;open source pour renforcer la s\u00e9curit\u00e9 logicielle, alors que 84% des bases de code contiennent au moins une vuln\u00e9rabilit\u00e9 chaque ann\u00e9e.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2069\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-2069\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google Maps teste l'affichage des entr\u00e9es des b\u00e2timents<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2069\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-2069\"><p>\/ Google Maps est en train de tester une nouvelle fonctionnalit\u00e9 permettant d&#8217;afficher les entr\u00e9es des b\u00e2timents, qui est actuellement visible dans certains endroits publics. Cette option, qui est actuellement en cours de test, requiert un zoom en mode pi\u00e9ton et fait partie des initiatives de Google visant \u00e0 am\u00e9liorer la cartographie, avec des fonctionnalit\u00e9s similaires pr\u00e9vues pour les transporteuses.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20610\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-20610\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">TA577 utilise pi\u00e8ces jointes ZIP dans E-mails de Phishing pour voler hachages NTLM<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20610\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-20610\"><p>\/ TA577 r\u00e9alise des attaques avanc\u00e9es en utilisant des courriels de phishing contenant des pi\u00e8ces jointes ZIP afin de d\u00e9rober des certificats NTLM. Les organisations mondiales sont l&#8217;objectif principal, en mettant l&#8217;accent sur la capture de paires Challenge\/R\u00e9ponse NTLMv2 pour des attaques pass-the-hash. L&#8217;acteur se d\u00e9marque par son raffinement et sa capacit\u00e9 \u00e0 s&#8217;adapter rapidement aux \u00e9volutions du monde num\u00e9rique.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20611\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-20611\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">OpenAI r\u00e9pond aux accusations d'Elon Musk : r\u00e9v\u00e9lations sur les \u00e9changes internes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20611\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-20611\"><p>\/ OpenAI r\u00e9pond aux accusations d&#8217;Elon Musk en partageant des \u00e9changes internes, r\u00e9v\u00e9lant que Musk a propos\u00e9 la fusion avec Tesla ou un contr\u00f4le total. Le passage \u00e0 un mod\u00e8le lucratif est justifi\u00e9 par le manque de ressources. OpenAI esp\u00e8re que ces r\u00e9v\u00e9lations mettront fin aux poursuites judiciaires de Musk. L&#8217;issue de l&#8217;affaire reste incertaine.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20612\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-20612\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Apple Corrige deux failles actives : CVE-2024-23225 et CVE-2024-23296 <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20612\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-20612\"><p>\/ Deux vuln\u00e9rabilit\u00e9s importantes, CVE-2024-23225 et CVE-2024-23296, ont \u00e9t\u00e9 r\u00e9solues par Apple dans iOS et iPadOS \u00e0 travers les versions 17.4 et 16.7.6, ce qui a permis de r\u00e9soudre trois failles zero-day en 2024. Deux nouvelles vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es par la CISA, \u00e0 savoir CVE-2023-21237 sur les appareils Android Pixel et une injection de commandes syst\u00e8me dans Sunhillo SureLine (CVE-2021-36380), ce qui incite \u00e0 se mettre \u00e0 jour avant le 26 mars 2024.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20613\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-20613\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Google lance une mise \u00e0 jour majeure pour des r\u00e9sultats de recherche de meilleure qualit\u00e9 en 2024<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20613\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-20613\"><p>\/ Google annonce la premi\u00e8re mise \u00e0 jour majeure de ses algorithmes de recherche en 2024, visant \u00e0 am\u00e9liorer la qualit\u00e9 des r\u00e9sultats en r\u00e9duisant les contenus incitatifs aux clics. Cette mise \u00e0 jour, combin\u00e9e \u00e0 des efforts ant\u00e9rieurs, pourrait r\u00e9duire de 40 % la pr\u00e9sence de contenus de faible qualit\u00e9 dans les r\u00e9sultats. En parall\u00e8le, Google a actualis\u00e9 ses r\u00e8gles anti-spam pour mieux g\u00e9rer les pratiques nuisibles.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20614\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-20614\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Attaques Ransomware : GhostSec et Stormous en action<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20614\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-20614\"><p>\/ Le groupe de cybercriminalit\u00e9 GhostSec, li\u00e9 \u00e0 la variante Golang du ransomware GhostLocker, collabore avec Stormous pour des attaques de double extorsion dans divers secteurs et pays. Ils ont r\u00e9cemment lanc\u00e9 le RaaS STMX_GhostLocker, impactant six victimes avec un site de fuite. L&#8217;outil GhostPresser, utilis\u00e9 pour attaquer les sites WordPress, met en lumi\u00e8re l&#8217;\u00e9volution des tactiques du groupe GhostSec.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20615\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-20615\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Les cybercriminels profitent des vuln\u00e9rabilit\u00e9s de ConnectWise ScreenConnect pour propager le logiciel malveillant TODDLERSHARK.<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20615\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-20615\"><p>\/ <b><\/b><span style=\"font-weight: 400;\">Les acteurs nord-cor\u00e9ens exploitent les failles de ConnectWise\u00a0 CVE-2024-1708 et CVE-2024-1709\u00a0ScreenConnect pour d\u00e9ployer le malware TODDLERSHARK, li\u00e9 aux logiciels malveillants Kimsuky. Ce malware vise \u00e0 capturer des informations sensibles et est difficile \u00e0 d\u00e9tecter en raison de son comportement polymorphe.<\/span><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20616\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-20616\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Alerte : GhostSec et Stormous lancent des attaques de ransomwares conjointes dans plus de 15 pays<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20616\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-20616\"><p>\/ <b><\/b><span style=\"font-weight: 400;\">GhostSec et Stormous lancent conjointement des attaques de ransomware dans plus de 15 pays, avec leur nouveau programme RaaS STMX_GhostLocker, exacerbant ainsi les risques de s\u00e9curit\u00e9 dans divers secteurs d&#8217;activit\u00e9.<\/span><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20617\" class=\"elementor-tab-title\" data-tab=\"17\" role=\"button\" aria-controls=\"elementor-tab-content-20617\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Attaques WordPress: Vuln\u00e9rabilit\u00e9s et Malware<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20617\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"17\" role=\"region\" aria-labelledby=\"elementor-tab-title-20617\"><p>\/ Des sites WordPress exploitent une vuln\u00e9rabilit\u00e9 (CVE-2021-4436) dans le plugin 3DPrint Lite pour des attaques distribu\u00e9es par force brute, utilisant une liste de mots de passe courants. Ces actions visent \u00e0 acc\u00e9der ill\u00e9galement \u00e0 d&#8217;autres sites WordPress, potentiellement motiv\u00e9es par des gains financiers, et surviennent apr\u00e8s des pertes significatives li\u00e9es aux draineurs de crypto-monnaie en 2023.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20618\" class=\"elementor-tab-title\" data-tab=\"18\" role=\"button\" aria-controls=\"elementor-tab-content-20618\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Un ancien ing\u00e9nieur de Google inculp\u00e9 pour le vol de secrets d'IA au profit de la Chine <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20618\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"18\" role=\"region\" aria-labelledby=\"elementor-tab-title-20618\"><p>\/ Linwei Ding, ex-ing\u00e9nieur de Google, est accus\u00e9 d&#8217;avoir vol\u00e9 plus de 500 fichiers sur l&#8217;IA pour les transmettre \u00e0 des entreprises chinoises entre mai 2022 et mai 2023. Inculp\u00e9 de quatre chefs de vol de secrets commerciaux, il risque jusqu&#8217;\u00e0 10 ans de prison par chef d&#8217;accusation.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20619\" class=\"elementor-tab-title\" data-tab=\"19\" role=\"button\" aria-controls=\"elementor-tab-content-20619\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Adobe Express en b\u00eata : cr\u00e9ation de contenu social facilit\u00e9e avec l'IA<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20619\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"19\" role=\"region\" aria-labelledby=\"elementor-tab-title-20619\"><p>\/ Adobe lance la version b\u00eata d&#8217;Adobe Express, int\u00e9grant des mod\u00e8les Firefly AI pour simplifier la cr\u00e9ation de contenu social sur mobile. Disponible sur Android, les utilisateurs iOS peuvent s&#8217;inscrire, suivant l&#8217;int\u00e9gration de l&#8217;assistant cr\u00e9atif de TikTok dans l&#8217;application.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20620\" class=\"elementor-tab-title\" data-tab=\"20\" role=\"button\" aria-controls=\"elementor-tab-content-20620\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Serveurs mal s\u00e9curis\u00e9s exploit\u00e9s pour miner sur YARN, Docker, Confluence et Redis.<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20620\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"20\" role=\"region\" aria-labelledby=\"elementor-tab-title-20620\"><p>\/ <span style=\"font-weight: 400;\">Les acteurs malveillants ciblent les serveurs mal configur\u00e9s ex\u00e9cutant YARN, Docker, Confluence et Redis pour le crypto mining et l&#8217;acc\u00e8s \u00e0 distance. L&#8217;activit\u00e9, surnomm\u00e9e &#8220;Spinning YARN&#8221;, d\u00e9voile une sophistication croissante des attaquants dans l&#8217;exploitation des environnements cloud.<\/span><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20621\" class=\"elementor-tab-title\" data-tab=\"21\" role=\"button\" aria-controls=\"elementor-tab-content-20621\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nouveau voleur d'informations Python se propageant via les messages Facebook<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20621\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"21\" role=\"region\" aria-labelledby=\"elementor-tab-title-20621\"><p>\/ <b><\/b> Snake : voleur d&#8217;infos Python se propage via Facebook, envoyant des archives RAR\/ZIP, visant les cookies Facebook pour le piratage de comptes. Des chercheurs notent la mont\u00e9e de menaces similaires, tandis que Meta est critiqu\u00e9 pour les piratages de comptes.<\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20622\" class=\"elementor-tab-title\" data-tab=\"22\" role=\"button\" aria-controls=\"elementor-tab-content-20622\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Exit Scam : Disparition du groupe Black Cat Ransomware apr\u00e8s un paiement de 22 millions de dollars<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20622\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"22\" role=\"region\" aria-labelledby=\"elementor-tab-title-20622\"><p>\/ <b><\/b> Exit scam : BlackCat Ransomware dispara\u00eet apr\u00e8s paiement de 22 millions $. Les affili\u00e9s se sentent flou\u00e9s, alimentant les sp\u00e9culations sur une r\u00e9apparition sous une nouvelle marque.<b><br \/><\/b><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-20623\" class=\"elementor-tab-title\" data-tab=\"23\" role=\"button\" aria-controls=\"elementor-tab-content-20623\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"far fa-newspaper\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-book-open\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Nouvelle technique de piratage DNS exploit\u00e9e par les cybercriminels pour des escroqueries \u00e0 l'investissement<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-20623\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"23\" role=\"region\" aria-labelledby=\"elementor-tab-title-20623\"><p>\/ Savvy Seahorse exploite le DNS avec des enregistrements CNAME pour pi\u00e9ger les investisseurs dans des escroqueries financi\u00e8res sophistiqu\u00e9es, attir\u00e9s par des publicit\u00e9s sur les r\u00e9seaux sociaux. Cette menace soul\u00e8ve des inqui\u00e9tudes quant \u00e0 la s\u00e9curit\u00e9 des utilisateurs face \u00e0 des campagnes de phishing de plus en plus sophistiqu\u00e9es.<b><br \/><\/b><\/p><p>\u00a0<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Microsoft d\u00e9ploie une IA g\u00e9n\u00e9rative sp\u00e9cialis\u00e9e dans les finances : Copilot Finance \/ Microsoft lance Copilot pour la finance, un chatbot IA d\u00e9di\u00e9 \u00e0 l\u2019int\u00e9gration aux syst\u00e8mes financiers de l\u2019entreprise, visant \u00e0 automatiser les t\u00e2ches op\u00e9rationnelles et \u00e0 simplifier les processus financiers. LG et Meta collaborent pour concevoir un casque de r\u00e9alit\u00e9 mixte haut de gamme \/ \u00a0LG et Meta s\u2019associent pour cr\u00e9er un casque de r\u00e9alit\u00e9 mixte, int\u00e9grant les contenus Smart TV de LG afin de concurrencer Apple, tout en explorant des fonctionnalit\u00e9s avanc\u00e9es comme les Codec Avatars et l\u2019intelligence artificielle g\u00e9n\u00e9rative pour une exp\u00e9rience immersive haut de gamme.<\/p>\n","protected":false},"author":1,"featured_media":9982,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[9],"tags":[420,417,416,423,421,413,412,409,36,45,227,71,414,49,323,424,422,415,408,182,410,419,411,418],"class_list":["post-9969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_actualite","tag-adobe-express","tag-attaques-informatiques","tag-connectwise-screenconnect","tag-exit-scam","tag-exploitation-de-serveurs-pour-le-minage-de-cryptomonnaie","tag-failles-de-securite","tag-google-maps","tag-google-pixel","tag-ia","tag-intelligence-artificielle","tag-logiciels-malveillants","tag-microsoft","tag-mises-a-jour-logicielles","tag-openai","tag-phishing","tag-piratage-dns","tag-piratage-via-facebook","tag-ransomware","tag-realite-mixte","tag-securite-informatique","tag-vol-didentifiants","tag-vol-de-secrets-dia","tag-vulnerabilites-informatiques","tag-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Semaine 2024-10 - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s technologiques\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semaine 2024-10 - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s technologiques\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-09T10:25:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Semaine 2024-10\",\"datePublished\":\"2024-03-09T10:25:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\"},\"wordCount\":1620,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png\",\"keywords\":[\"Adobe Express\",\"Attaques Informatiques\",\"ConnectWise ScreenConnect\",\"Exit Scam\",\"Exploitation de Serveurs pour le Minage de Cryptomonnaie\",\"Failles de S\u00e9curit\u00e9\",\"Google Maps\",\"Google Pixel\",\"IA\",\"intelligence artificielle\",\"Logiciels malveillants\",\"Microsoft\",\"Mises \u00e0 Jour Logicielles\",\"OpenAI\",\"Phishing\",\"Piratage DNS\",\"Piratage via Facebook\",\"Ransomware\",\"R\u00e9alit\u00e9 Mixte\",\"S\u00e9curit\u00e9 informatique\",\"Vol d'Identifiants\",\"Vol de Secrets d'IA\",\"Vuln\u00e9rabilit\u00e9s Informatiques\",\"WordPress\"],\"articleSection\":[\"Actualit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\",\"name\":\"Semaine 2024-10 - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png\",\"datePublished\":\"2024-03-09T10:25:11+00:00\",\"description\":\"D\u00e9couvrez les derni\u00e8res actualit\u00e9s technologiques\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png\",\"width\":17717,\"height\":11811},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Semaine 2024-10\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semaine 2024-10 - Vitrine outlYing","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s technologiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/","og_locale":"fr_FR","og_type":"article","og_title":"Semaine 2024-10 - Vitrine outlYing","og_description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s technologiques","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-03-09T10:25:11+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10-1024x683.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Semaine 2024-10","datePublished":"2024-03-09T10:25:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/"},"wordCount":1620,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png","keywords":["Adobe Express","Attaques Informatiques","ConnectWise ScreenConnect","Exit Scam","Exploitation de Serveurs pour le Minage de Cryptomonnaie","Failles de S\u00e9curit\u00e9","Google Maps","Google Pixel","IA","intelligence artificielle","Logiciels malveillants","Microsoft","Mises \u00e0 Jour Logicielles","OpenAI","Phishing","Piratage DNS","Piratage via Facebook","Ransomware","R\u00e9alit\u00e9 Mixte","S\u00e9curit\u00e9 informatique","Vol d'Identifiants","Vol de Secrets d'IA","Vuln\u00e9rabilit\u00e9s Informatiques","WordPress"],"articleSection":["Actualit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/","name":"Semaine 2024-10 - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png","datePublished":"2024-03-09T10:25:11+00:00","description":"D\u00e9couvrez les derni\u00e8res actualit\u00e9s technologiques","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/03\/Semaine-10.png","width":17717,"height":11811},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/03\/09\/semaine-2024-10\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Semaine 2024-10"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=9969"}],"version-history":[{"count":45,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9969\/revisions"}],"predecessor-version":[{"id":10039,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9969\/revisions\/10039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/9982"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=9969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=9969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=9969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}