{"id":162,"date":"2025-02-26T12:46:58","date_gmt":"2025-02-26T11:46:58","guid":{"rendered":"http:\/\/45.147.97.221\/wordpress\/?page_id=162"},"modified":"2025-03-27T08:36:03","modified_gmt":"2025-03-27T07:36:03","slug":"veille","status":"publish","type":"page","link":"https:\/\/mathysviewer.fr\/index.php\/veille\/","title":{"rendered":"Veille"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-x-large-font-size\"><strong>Les <strong>enseignements<\/strong> des grandes cyberattaques fran\u00e7aises pour les entreprises.<\/strong><\/h2>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><em>Outils<\/em><\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"296\" height=\"248\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/7684243736.jpg\" alt=\"\" class=\"wp-image-695 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\"><strong>M\u00e9thode Push<\/strong>, c&rsquo;est tout la partie de la veille informationnelle, li\u00e9s \u00e0 la r\u00e9cup\u00e9rations des informations part des moyen dit passif comme les flux rss, ou encore chaine de courielle.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 42%\"><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\"><strong>Flux RSS<\/strong> (<em>Really Simple Syndication)<\/em>, est un flux qui permet de transmettre des informations souvent des articles parurent des sites-web afin que d&rsquo;autres site puissent les afficher pour leur utilisateur. Il est aussi utiliser durent la veille informationnelle afin de centraliser \u00e0 un endroit toutes les informations.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/Feed-icon.png\" alt=\"\" class=\"wp-image-653 size-full\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/Feed-icon.png 400w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/Feed-icon-300x300.png 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/Feed-icon-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Flux RSS : ANSSI<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:33% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/ANSSI_Logo.svg_.png\" alt=\"\" class=\"wp-image-656 size-full\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ANSSI_Logo.svg_.png 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ANSSI_Logo.svg_-300x300.png 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ANSSI_Logo.svg_-150x150.png 150w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ANSSI_Logo.svg_-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\"><strong>ANSSI<\/strong> (<em>Agence de la S\u00e9curit\u00e9 des Syst\u00e8mes d&rsquo;Informations<\/em>), est l&rsquo;organisme \u00e9tatique Fran\u00e7ais charg\u00e9 de la surveillance, ainsi que de la r\u00e9action face au cyber-menace. Il peuvent aussi bien se d\u00e9ployer dans une entreprise victime d&rsquo;une cyberattaque afin de les aid\u00e9 \u00e0 r\u00e9soudre la situation, comme \u00e9crire un rapport sur une campagne de <em>guerre hybride<\/em> d&rsquo;un \u00e9tat \u00e9tranger contre les infrastructure Fran\u00e7aise, ainsi que fournir des conseille de s\u00e9curit\u00e9, le plus connus: le mots de passe \u00e0 12 caract\u00e8res.<\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"gb-text\"><em>Menaces et Incident<\/em><\/h3>\n\n\n<ul class=\"has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/cti\/CERTFR-2026-CTI-002\/'>Panorama de la cybermenace 2025 (11 mars 2026)<\/a><\/div><time datetime=\"2026-03-11T00:00:00+01:00\" class=\"wp-block-rss__item-publish-date\">11 mars 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">En 2025, les fronti\u00e8res qui existent traditionnellement entre acteurs \u00e9tatiques et cybercriminels ont continu\u00e9 de s\u2019\u00e9roder, complexifiant notamment le processus d&#039;imputation. Ainsi par exemple le d\u00e9tournement, \u00e0 des fins malveillantes, d\u2019outils et de services l\u00e9gitimes, [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/cti\/CERTFR-2026-CTI-001\/'>L\u2019intelligence artificielle g\u00e9n\u00e9rative face aux attaques informatiques (04 f\u00e9vrier 2026)<\/a><\/div><time datetime=\"2026-02-04T00:00:00+01:00\" class=\"wp-block-rss__item-publish-date\">4 f\u00e9vrier 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">En tant que service num\u00e9rique innovant, performant et flexible, l\u2019IA g\u00e9n\u00e9rative est progressivement int\u00e9gr\u00e9e \u00e0 l\u2019\u00e9ventail d\u2019outils et de services auxquels sont susceptibles de recourir les attaquants informatiques quel que soit leur profil. Des mod\u00e8les [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/cti\/CERTFR-2025-CTI-013\/'>\ud83c\uddec\ud83c\udde7 Mobile phones : Threat landscape since 2015 (26 novembre 2025)<\/a><\/div><time datetime=\"2025-11-26T00:00:00+01:00\" class=\"wp-block-rss__item-publish-date\">26 novembre 2025<\/time> <div class=\"wp-block-rss__item-excerpt\">Version fran\u00e7aise: \ud83c\uddeb\ud83c\uddf7 Mobile phones are an integral part of everyday life. Their use in every aspect of life, personal as well as professional, makes them a prime target for malicious actors. Mobile phones actually [&hellip;]<\/div><\/li><\/ul>\n\n\n<h3 class=\"gb-text\"><em>Alertes<\/em><\/h3>\n\n\n<ul class=\"has-dates has-authors has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/alerte\/CERTFR-2026-ALE-004\/'>Vuln\u00e9rabilit\u00e9 dans F5 BIG-IP Access Policy Manager (31 mars 2026)<\/a><\/div><time datetime=\"2026-03-31T00:00:00+01:00\" class=\"wp-block-rss__item-publish-date\">31 mars 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Le 15 octobre 2025, F5 a publi\u00e9 un avis de s\u00e9curit\u00e9 concernant entre autres la vuln\u00e9rabilit\u00e9 CVE-2025-53521. Celle-ci affecte BIG-IP APM et permet \u00e0 un attaquant non authentifi\u00e9 d&#039;ex\u00e9cuter du code \u00e0 distance. Le 29 mars 2026, l&#039;\u00e9diteur indique que cette vuln\u00e9rabilit\u00e9 est exploit\u00e9e activement. Le&#8230;<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/alerte\/CERTFR-2026-ALE-003\/'>Note d\u2019alerte \u2013 Ciblage des messageries instantan\u00e9es (20 mars 2026)<\/a><\/div><time datetime=\"2026-03-20T00:00:00+01:00\" class=\"wp-block-rss__item-publish-date\">20 mars 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Les travaux conjoints des services membres du **Centre de Coordination des Crises Cyber (C4)** ont permis d\u2019identifier une recrudescence de campagnes d\u2019attaques ciblant les comptes de messagerie instantan\u00e9es. Ces campagnes ciblent particuli\u00e8rement les secteurs r\u00e9galiens (personnalit\u00e9s politiques,&#8230;<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.cert.ssi.gouv.fr\/alerte\/CERTFR-2026-ALE-002\/'>[M\u00e0J] Vuln\u00e9rabilit\u00e9 dans Cisco Catalyst SD-WAN (25 f\u00e9vrier 2026)<\/a><\/div><time datetime=\"2026-02-25T00:00:00+01:00\" class=\"wp-block-rss__item-publish-date\">25 f\u00e9vrier 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Cisco Catalyst SD-WAN. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9. Cisco indique que la vuln\u00e9rabilit\u00e9 CVE-2026-20127 est activement exploit\u00e9e.<\/div><\/li><\/ul>\n\n\n<h3 class=\"gb-text\"><em>Google Alert<\/em>e<\/h3>\n\n\n<ul class=\"has-dates has-authors has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/www.nextplz.fr\/societe\/545661-cyberattaque-dans-des-laboratoires-danalyses-vos-donnees-medicales-potentiellement-compromises-ce-que-cela-change-pour-vous&#038;ct=ga&#038;cd=CAIyGzcxMjc4MThlZjY0MGYyZmE6ZnI6ZnI6RlI6Ug&#038;usg=AOvVaw2uFqwFVZ7VC81DyjaP78K2'>Cyberattaque dans des laboratoires d&#039;analyses, vos donn\u00e9es m\u00e9dicales potentiellement &#8230; &#8211; NextPlz<\/a><\/div><time datetime=\"2026-04-12T14:02:58+01:00\" class=\"wp-block-rss__item-publish-date\">12 avril 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">&#8230; France. Fin mars, le groupe a d\u00e9couvert qu&#039;un prestataire informatique &#8230; L&#039;entreprise, propri\u00e9t\u00e9 de Cerba HealthCare, qui revendique 28\u00a0&#8230;<\/div><\/li><\/ul>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\"><strong>M\u00e9thode Pull<\/strong>, c&rsquo;est tout la partie de la veille informationnelle, li\u00e9s \u00e0 la r\u00e9cup\u00e9rations des informations part des moyen dit actif comme les r\u00e9seau sociaux (avec une priorit\u00e9 le croisement des sources), les sites de m\u00e9dia etc..<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"357\" height=\"253\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/unnamed.jpg\" alt=\"\" class=\"wp-image-797 size-full\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/unnamed.jpg 357w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/unnamed-300x213.jpg 300w\" sizes=\"(max-width: 357px) 100vw, 357px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"743\" height=\"606\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/sax_twitter.png\" alt=\"\" class=\"wp-image-800 size-full\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/sax_twitter.png 743w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/sax_twitter-300x245.png 300w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-medium-font-size\"><strong>SaxX<\/strong>, est un hacker dit <em>white hat<\/em>, c&rsquo;est-\u00e0-dire qu&rsquo;il cherchent \u00e0 lutte contre les cyberattaque malveillante, il depuis plus un ans d\u00e9nonce un certain nombre des grand cyber-attaque Fran\u00e7aise, il fut le premier part exemple \u00e0 parler de la fuite de donn\u00e9e part <em>Humint <\/em>de Free.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"fr\" dir=\"ltr\">\ud83d\udea8\ud83d\udd34CYBERALERT \ud83c\uddeb\ud83c\uddf7FRANCE\ud83d\udd34 | \u26a1Au tour de AUTOSUR de subir une cyberattaque ! C&#39;est au total 10.7M de clients touch\u00e9s et autant de donn\u00e9es personnelles mises en vente pour 5000$ sur le &quot;Amazon de la cybercriminalit\u00e9&quot;  <br><br>\ud83d\udc40\u00c7a n\u2019arr\u00eate pas&#8230; <br>Voici qu&#39;AUTOSUR, un des leaders du\u2026 <a href=\"https:\/\/t.co\/YCNDJKm52K\">pic.twitter.com\/YCNDJKm52K<\/a><\/p>&mdash; SaxX \u00af_(\u30c4)_\/\u00af (@_SaxX_) <a href=\"https:\/\/twitter.com\/_SaxX_\/status\/1904555231444074614?ref_src=twsrc%5Etfw\">March 25, 2025<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"fr\" dir=\"ltr\">Le sp\u00e9cialiste du contr\u00f4le technique Autosur touch\u00e9 par une cyberattaque<a href=\"https:\/\/t.co\/aCyvIhTvqF\">https:\/\/t.co\/aCyvIhTvqF<\/a> <a href=\"https:\/\/t.co\/HfUBdYGABn\">pic.twitter.com\/HfUBdYGABn<\/a><\/p>&mdash; Tech &amp; Co (@techandco) <a href=\"https:\/\/twitter.com\/techandco\/status\/1904907635935092951?ref_src=twsrc%5Etfw\">March 26, 2025<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><em>Point cl\u00e9s<\/em><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Date<\/strong><\/td><td><strong>Entreprise<\/strong><\/td><td><strong>Utilisateur Affect\u00e9<\/strong><\/td><td><strong>Cause<\/strong><\/td><td><strong>Sources (image clickable)<\/strong><\/td><\/tr><tr><td>Mars 2024<\/td><td>LDLC (Magasin d&rsquo;informatique)<\/td><td>1.5 millions<\/td><td>N.A.<\/td><td>  <a href=\"https:\/\/www.01net.com\/actualites\/les-donnees-de-15-million-de-clients-ldlc-ont-ete-piratees.html\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"100\" class=\"wp-image-709\" style=\"width: 150px;\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/ldlc-piratage-896x597-1.webp\" alt=\"\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ldlc-piratage-896x597-1.webp 896w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ldlc-piratage-896x597-1-300x200.webp 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/ldlc-piratage-896x597-1-768x512.webp 768w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/td><\/tr><tr><td>Avril 2024<\/td><td>TicketMaster (Plateforme de vente de billet)<\/td><td>560 millions<\/td><td>Les donn\u00e9es s&rsquo;\u00e9tendent sur une p\u00e9riode de 13 ans (2011-2024).<\/td><td><a href=\"https:\/\/www.clubic.com\/actualite-528357-millions-de-clients-ticketmaster-pirates-le-geant-mondial-de-la-vente-de-billets-dans-la-tourmente.html\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"113\" class=\"wp-image-711\" style=\"width: 150px;\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/raw.jpg\" alt=\"\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/raw.jpg 1600w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/raw-300x225.jpg 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/raw-1024x768.jpg 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/raw-768x576.jpg 768w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/raw-1536x1152.jpg 1536w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/td><\/tr><tr><td>Septembre 2024<\/td><td>RED by SFR (Fournisseur Acc\u00e8s \u00e0 internet)<\/td><td>50.000<\/td><td>Acc\u00e8s externe non autoris\u00e9 \u00e0 un outil de gestion de commandes des clients.<\/td><td><a href=\"http:\/\/next.ink\/brief_article\/red-by-sfr-informe-ses-clients-dune-nouvelle-fuite-avec-une-ribambelle-de-donnees\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"22\" class=\"wp-image-713\" style=\"width: 150px;\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/next_veille.png\" alt=\"\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/next_veille.png 1547w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/next_veille-300x45.png 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/next_veille-1024x152.png 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/next_veille-768x114.png 768w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/next_veille-1536x228.png 1536w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/td><\/tr><tr><td>Octobre 2024<\/td><td>Free<br>(Fournisseur Acc\u00e8s \u00e0 internet)<\/td><td>19.1 millions<\/td><td>Acc\u00e8s externe non autoris\u00e9 \u00e0 un outil de gestion de commandes des clients.<\/td><td><a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/actualites\/violation-de-donnees-personnelles-free-202410\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"23\" class=\"wp-image-715\" style=\"width: 150px;\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/free-veille.png\" alt=\"\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/free-veille.png 1295w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/free-veille-300x46.png 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/free-veille-1024x157.png 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/free-veille-768x117.png 768w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/td><\/tr><tr><td>Novembre 2024<\/td><td>Auchan (Magasin G\u00e9n\u00e9rale)<\/td><td>500.000<\/td><td>N.A.<\/td><td><a href=\"https:\/\/www.francetvinfo.fr\/internet\/securite-sur-internet\/cyberattaques\/auchan-a-ete-victime-d-une-cyberattaque-ciblant-les-donnees-de-centaines-de-milliers-de-clients_6906749.html\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"84\" class=\"wp-image-719\" style=\"width: 150px;\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/000-36mr29z-673c8a9c4ca20656505108.png\" alt=\"\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/000-36mr29z-673c8a9c4ca20656505108.png 1328w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/000-36mr29z-673c8a9c4ca20656505108-300x169.png 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/000-36mr29z-673c8a9c4ca20656505108-1024x576.png 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/000-36mr29z-673c8a9c4ca20656505108-768x432.png 768w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/td><\/tr><tr><td>Janvier 2025<\/td><td>E.Leclerc (Magasin G\u00e9n\u00e9rale)<\/td><td>N.A<\/td><td>Tentatives frauduleuses d&rsquo;acc\u00e8s aux comptes Primes \u00e9nergie E.Leclerc.<\/td><td><a href=\"https:\/\/www.01net.com\/actualites\/enieme-fuite-donnees-france-eleclerc-victime-cyberattaque.html\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"100\" class=\"wp-image-721\" style=\"width: 150px;\" src=\"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/eleclerc-cyberattaque-896x597-1.webp\" alt=\"\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/eleclerc-cyberattaque-896x597-1.webp 896w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/eleclerc-cyberattaque-896x597-1-300x200.webp 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/eleclerc-cyberattaque-896x597-1-768x512.webp 768w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><em>Conclusion<\/em><\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Un grand nombre de cyberattaque<\/p>\n\n\n\n<div class=\"wp-block-uagb-counter uagb-block-1b271166 wp-block-uagb-counter--number\"><span class=\"wp-block-uagb-counter__icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\"><path d=\"M400 32C426.5 32 448 53.49 448 80V336C448 362.5 426.5 384 400 384H266.7L277.3 416H352C369.7 416 384 430.3 384 448C384 465.7 369.7 480 352 480H96C78.33 480 64 465.7 64 448C64 430.3 78.33 416 96 416H170.7L181.3 384H48C21.49 384 0 362.5 0 336V80C0 53.49 21.49 32 48 32H400zM64 96V320H384V96H64zM592 32C618.5 32 640 53.49 640 80V432C640 458.5 618.5 480 592 480H528C501.5 480 480 458.5 480 432V80C480 53.49 501.5 32 528 32H592zM544 96C535.2 96 528 103.2 528 112C528 120.8 535.2 128 544 128H576C584.8 128 592 120.8 592 112C592 103.2 584.8 96 576 96H544zM544 192H576C584.8 192 592 184.8 592 176C592 167.2 584.8 160 576 160H544C535.2 160 528 167.2 528 176C528 184.8 535.2 192 544 192zM560 400C577.7 400 592 385.7 592 368C592 350.3 577.7 336 560 336C542.3 336 528 350.3 528 368C528 385.7 542.3 400 560 400z\"><\/path><\/svg><\/span><div class=\"wp-block-uagb-counter__number\"><span class=\"uagb-counter-block-number\" data-duration=\"1.5\" data-to-value=\"15\" data-from-value=\"0\" data-delimiter=\",\"><\/span><span class=\"uagb-counter-block-suffix\">%<\/span><\/div><div class=\"wp-block-uagb-counter__title\"><a href=\"https:\/\/www.lefigaro.fr\/secteur\/high-tech\/cyberattaques-hausse-de-15-des-incidents-traites-en-france-en-2024-20250311\" target=\"_blank\" rel=\"noreferrer noopener\">Augmentation de cyberattaque entre 2023 et 2024 en France<\/a><\/div><\/div>\n\n\n\n<p class=\"has-medium-font-size\">Ing\u00e9nierie Sociales &#8211; En t\u00eate des tentatives intrusion<\/p>\n\n\n\n<div class=\"wp-block-uagb-counter uagb-block-2a288d67 wp-block-uagb-counter--number\"><span class=\"wp-block-uagb-counter__icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\"><path d=\"M400 32C426.5 32 448 53.49 448 80V336C448 362.5 426.5 384 400 384H266.7L277.3 416H352C369.7 416 384 430.3 384 448C384 465.7 369.7 480 352 480H96C78.33 480 64 465.7 64 448C64 430.3 78.33 416 96 416H170.7L181.3 384H48C21.49 384 0 362.5 0 336V80C0 53.49 21.49 32 48 32H400zM64 96V320H384V96H64zM592 32C618.5 32 640 53.49 640 80V432C640 458.5 618.5 480 592 480H528C501.5 480 480 458.5 480 432V80C480 53.49 501.5 32 528 32H592zM544 96C535.2 96 528 103.2 528 112C528 120.8 535.2 128 544 128H576C584.8 128 592 120.8 592 112C592 103.2 584.8 96 576 96H544zM544 192H576C584.8 192 592 184.8 592 176C592 167.2 584.8 160 576 160H544C535.2 160 528 167.2 528 176C528 184.8 535.2 192 544 192zM560 400C577.7 400 592 385.7 592 368C592 350.3 577.7 336 560 336C542.3 336 528 350.3 528 368C528 385.7 542.3 400 560 400z\"><\/path><\/svg><\/span><div class=\"wp-block-uagb-counter__number\"><span class=\"uagb-counter-block-number\" data-duration=\"1.5\" data-to-value=\"70\" data-from-value=\"0\" data-delimiter=\",\"><\/span><span class=\"uagb-counter-block-suffix\">%<\/span><\/div><div class=\"wp-block-uagb-counter__title\"><a href=\"https:\/\/www.lefigaro.fr\/secteur\/high-tech\/cyberattaques-hausse-de-15-des-incidents-traites-en-france-en-2024-20250311?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">de Fran\u00e7ais toucher part u<\/a><a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/actualites\/cybermois-cp-mobilisons-nous\" target=\"_blank\" rel=\"noreferrer noopener\">ne tentative de Phising<\/a><\/div><\/div>\n\n\n\n<p class=\"has-medium-font-size\">Un risque pour les entreprise?<\/p>\n\n\n\n<div class=\"wp-block-uagb-counter uagb-block-53e4155d wp-block-uagb-counter--number\"><span class=\"wp-block-uagb-counter__icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\"><path d=\"M400 32C426.5 32 448 53.49 448 80V336C448 362.5 426.5 384 400 384H266.7L277.3 416H352C369.7 416 384 430.3 384 448C384 465.7 369.7 480 352 480H96C78.33 480 64 465.7 64 448C64 430.3 78.33 416 96 416H170.7L181.3 384H48C21.49 384 0 362.5 0 336V80C0 53.49 21.49 32 48 32H400zM64 96V320H384V96H64zM592 32C618.5 32 640 53.49 640 80V432C640 458.5 618.5 480 592 480H528C501.5 480 480 458.5 480 432V80C480 53.49 501.5 32 528 32H592zM544 96C535.2 96 528 103.2 528 112C528 120.8 535.2 128 544 128H576C584.8 128 592 120.8 592 112C592 103.2 584.8 96 576 96H544zM544 192H576C584.8 192 592 184.8 592 176C592 167.2 584.8 160 576 160H544C535.2 160 528 167.2 528 176C528 184.8 535.2 192 544 192zM560 400C577.7 400 592 385.7 592 368C592 350.3 577.7 336 560 336C542.3 336 528 350.3 528 368C528 385.7 542.3 400 560 400z\"><\/path><\/svg><\/span><div class=\"wp-block-uagb-counter__number\"><span class=\"uagb-counter-block-number\" data-duration=\"1.5\" data-to-value=\"15\" data-from-value=\"0\" data-delimiter=\",\"><\/span><span class=\"uagb-counter-block-suffix\">%<\/span><\/div><div class=\"wp-block-uagb-counter__title\"><a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/lettre-information-octobre-2024\" target=\"_blank\" rel=\"noreferrer noopener\">de TPE-PME victimes en 2023 d&rsquo;un cyberattaque<\/a><\/div><\/div>\n\n\n\n<p class=\"has-medium-font-size\">Les solutions<\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-cfd3eeb4\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-c9b49f14\"><a target=\"_blank\" aria-label=\"La formation: Afin de lutter au mieux contre ing\u00e9nierie sociales (ex: Phising), former les collaborateur part exemple \u00e0 ne fournir aucun informations sensibles part mail.\" rel=\"noopener noreferrer\" href=\"https:\/\/www.economie.gouv.fr\/particuliers\/phishing-hameconnage-filoutage\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">La formation: Afin de lutter au mieux contre ing\u00e9nierie sociales (ex: Phising), former les collaborateur part exemple \u00e0 ne fournir aucun informations sensibles part mail.<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-7b7b1680\"><a target=\"_blank\" aria-label=\"Les recommandations: Suivez les conseils en terme de s\u00e9curit\u00e9, comme ceux fournir part ANSSI (ex: minimum 8 caract\u00e8res dans un mot de passe).\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber.gouv.fr\/bonnes-pratiques-protegez-vous#:~:text=Cr%C3%A9ez%20un%20mot%20de%20passe,chiffres%20et%20des%20caract%C3%A8res%20sp%C3%A9ciaux.\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Les recommandations: Suivez les conseils en terme de s\u00e9curit\u00e9, comme ceux fournir part ANSSI (ex: minimum 8 caract\u00e8res dans un mot de passe).<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-45f37765\"><a target=\"_blank\" aria-label=\"EDR (Endpoint Detection &amp; Response): C'est un anti-virus moderne, qui ne cherchera pas uniquement des signatures malveillante (IOC's), mais aussi des comportement malicieux, part exemple: la destruction massive de donn\u00e9s (soit l'ex\u00e9cution d'une o\u00f9 plusieurs partie de la kill chain d'une cyber-attaque)\" rel=\"noopener noreferrer\" href=\"https:\/\/www.ibm.com\/fr-fr\/topics\/edr\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">EDR (Endpoint Detection &amp; Response): C&rsquo;est un anti-virus moderne, qui ne cherchera pas uniquement des signatures malveillante (IOC&rsquo;s), mais aussi des comportement malicieux, part exemple: la destruction massive de donn\u00e9s (soit l&rsquo;ex\u00e9cution d&rsquo;une o\u00f9 plusieurs partie de la kill chain d&rsquo;une cyber-attaque)<\/span><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-c83515b8\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n\n\n\n\t\t\t<div class=\"wp-block-uagb-post-carousel uagb-post-grid  uagb-post__image-position-top uagb-post__image-enabled uagb-block-31670dd6     uagb-post__arrow-outside uagb-slick-carousel uagb-post__items uagb-post__columns-3 is-carousel uagb-post__columns-tablet-2 uagb-post__columns-mobile-1\" data-total=\"2\" style=\"\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__image'>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/26\/mission-9-versionning\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-5474285-5474285-1024x683.jpg\" class=\"attachment-large size-large\" alt=\"Close-up of hands typing on a laptop with a USB device on a white background. Ideal for tech and cybersecurity themes.\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-5474285-5474285-1024x683.jpg 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-5474285-5474285-300x200.jpg 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-5474285-5474285-768x512.jpg 768w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-5474285-5474285-1536x1024.jpg 1536w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-5474285-5474285-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/26\/mission-9-versionning\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Mission 9 &#8211; Versioning<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-03-26T16:52:47+01:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t26 mars 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t\t<span class=\"uagb-post__comment\">\n\t\t\t\t<span class=\"dashicons-admin-comments dashicons\"><\/span>\t\t\t\t\tAucun commentaire\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>Versionning avec Mercurial, est un syst\u00e8me de sauvegarde visant \u00e0 d\u00e9velopper de site, logicielle etc&#8230;..\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"uagb-post__text uagb-post__cta wp-block-button\">\n\t\t\t\t<a class=\"wp-block-button__link uagb-text-link\" style=\"\" href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/26\/mission-9-versionning\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Lire la suite<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__image'>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/14\/activite-8-travail-en-mode-projet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-3183183-3183183-1024x683.jpg\" class=\"attachment-large size-large\" alt=\"Overhead view of a diverse team discussing around a wooden table, using technology.\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-3183183-3183183-1024x683.jpg 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-3183183-3183183-300x200.jpg 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-3183183-3183183-768x513.jpg 768w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-3183183-3183183-1536x1025.jpg 1536w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-3183183-3183183-2048x1367.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/14\/activite-8-travail-en-mode-projet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Mission 8 &#8211; Travail en mode projet<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-03-14T08:41:44+01:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t14 mars 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t\t<span class=\"uagb-post__comment\">\n\t\t\t\t<span class=\"dashicons-admin-comments dashicons\"><\/span>\t\t\t\t\tAucun commentaire\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>Gantt, est un diagramme de gestion de projet, cr\u00e9e part Herny Laurence Gantt, en 1910&#8230;.\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"uagb-post__text uagb-post__cta wp-block-button\">\n\t\t\t\t<a class=\"wp-block-button__link uagb-text-link\" style=\"\" href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/14\/activite-8-travail-en-mode-projet\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Lire la suite<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__image'>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/11\/mission-7-aeroclub\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"46\" src=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/aeroclub.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/11\/mission-7-aeroclub\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Mission 7: A\u00e9roclub<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-03-11T14:36:53+01:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t11 mars 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t\t<span class=\"uagb-post__comment\">\n\t\t\t\t<span class=\"dashicons-admin-comments dashicons\"><\/span>\t\t\t\t\tAucun commentaire\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>A\u00e9roclub, c&rsquo;est notre second projet r\u00e9aliser durent le cursus visant \u00e0 nous faires travailler comme&#8230;\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"uagb-post__text uagb-post__cta wp-block-button\">\n\t\t\t\t<a class=\"wp-block-button__link uagb-text-link\" style=\"\" href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/11\/mission-7-aeroclub\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Lire la suite<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__image'>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/11\/mission-6-idologis\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"224\" height=\"100\" src=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/logo_noir.png\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/11\/mission-6-idologis\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Mission 6 : Idologis<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-03-11T14:14:56+01:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t11 mars 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t\t<span class=\"uagb-post__comment\">\n\t\t\t\t<span class=\"dashicons-admin-comments dashicons\"><\/span>\t\t\t\t\tAucun commentaire\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>Idologis, \u00e9tait notre premier de travail en groupe de classe, qui consister \u00e0 la r\u00e9alisions,&#8230;\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"uagb-post__text uagb-post__cta wp-block-button\">\n\t\t\t\t<a class=\"wp-block-button__link uagb-text-link\" style=\"\" href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/11\/mission-6-idologis\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Lire la suite<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__image'>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/07\/mission-5-ia4help\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-943096-943096-1024x683.jpg\" class=\"attachment-large size-large\" alt=\"Red backlit keyboard and code on laptop screen create a tech-focused ambiance.\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-943096-943096-1024x683.jpg 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-943096-943096-300x200.jpg 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-943096-943096-768x512.jpg 768w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-943096-943096-1536x1024.jpg 1536w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-943096-943096-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/07\/mission-5-ia4help\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Mission 5: IA4Help<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-03-07T09:31:05+01:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t7 mars 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t\t<span class=\"uagb-post__comment\">\n\t\t\t\t<span class=\"dashicons-admin-comments dashicons\"><\/span>\t\t\t\t\tAucun commentaire\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\t<p>Python, c&rsquo;est un langage de d\u00e9veloppement tr\u00e8s populaire, cr\u00e9e en 1991 par Guidp van Rossum&#8230;.\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"uagb-post__text uagb-post__cta wp-block-button\">\n\t\t\t\t<a class=\"wp-block-button__link uagb-text-link\" style=\"\" href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/07\/mission-5-ia4help\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Lire la suite<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article class=\"uagb-post__inner-wrap\">\t\t\t\t\t\t\t\t<div class='uagb-post__image'>\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/06\/mission-4-bastion-rubycat\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-1181325-1181325-1024x684.jpg\" class=\"attachment-large size-large\" alt=\"A woman deeply engrossed in programming on a laptop at night in a data center.\" srcset=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-1181325-1181325-1024x684.jpg 1024w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-1181325-1181325-300x200.jpg 300w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-1181325-1181325-768x513.jpg 768w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-1181325-1181325-1536x1025.jpg 1536w, https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/pexels-photo-1181325-1181325-2048x1367.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<h4 class=\"uagb-post__title uagb-post__text\">\n\t\t\t\t<a href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/06\/mission-4-bastion-rubycat\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Mission 4 : Bastion RubyCat<\/a>\n\t\t\t<\/h4>\n\t\t\t\t\t\t<div class='uagb-post__text uagb-post-grid-byline'>\n\t\t\t\t\t\t\t\t<time datetime=\"2025-03-06T16:36:22+01:00\" class=\"uagb-post__date\">\n\t\t\t\t<span class=\"dashicons-calendar dashicons\"><\/span>\t\t\t\t\t6 mars 2025\t\t\t\t<\/time>\n\t\t\t\t\t\t\t<span class=\"uagb-post__comment\">\n\t\t\t\t<span class=\"dashicons-admin-comments dashicons\"><\/span>\t\t\t\t\tAucun commentaire\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class='uagb-post__text uagb-post__excerpt'>\n\t\t\t\t\tBastion, c&rsquo;est un serveur qui vient s&rsquo;intercaler entre le r\u00e9seau publique et priv\u00e9e pour permettre&#8230;\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"uagb-post__text uagb-post__cta wp-block-button\">\n\t\t\t\t<a class=\"wp-block-button__link uagb-text-link\" style=\"\" href=\"https:\/\/mathysviewer.fr\/index.php\/2025\/03\/06\/mission-4-bastion-rubycat\/\" target=\"_self\" rel=\"bookmark noopener noreferrer\">Lire la suite<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__avatar\"><\/div><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">mathys<\/p><p class=\"wp-block-post-author__bio\">IT Student in Dunkirk<\/p><\/div><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les enseignements des grandes cyberattaques fran\u00e7aises pour les entreprises. Outils M\u00e9thode Push, c&rsquo;est tout la partie de la veille informationnelle, li\u00e9s \u00e0 la r\u00e9cup\u00e9rations des informations part des moyen dit passif comme les flux rss, ou encore chaine de courielle. Flux RSS (Really Simple Syndication), est un flux qui permet de transmettre des informations souvent [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-162","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Veille - Mathys Martignoni - Portfolio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mathysviewer.fr\/index.php\/veille\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Veille - Mathys Martignoni - Portfolio\" \/>\n<meta property=\"og:description\" content=\"Les enseignements des grandes cyberattaques fran\u00e7aises pour les entreprises. Outils M\u00e9thode Push, c&rsquo;est tout la partie de la veille informationnelle, li\u00e9s \u00e0 la r\u00e9cup\u00e9rations des informations part des moyen dit passif comme les flux rss, ou encore chaine de courielle. Flux RSS (Really Simple Syndication), est un flux qui permet de transmettre des informations souvent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mathysviewer.fr\/index.php\/veille\/\" \/>\n<meta property=\"og:site_name\" content=\"Mathys Martignoni -- Portfolio\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T07:36:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/7684243736.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"296\" \/>\n\t<meta property=\"og:image:height\" content=\"248\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/\",\"url\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/\",\"name\":\"Veille - Mathys Martignoni - Portfolio\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/https:\\\/\\\/mathysviewer.fr\\\/\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/7684243736.jpg\",\"datePublished\":\"2025-02-26T11:46:58+00:00\",\"dateModified\":\"2025-03-27T07:36:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/#primaryimage\",\"url\":\"http:\\\/\\\/https:\\\/\\\/mathysviewer.fr\\\/\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/7684243736.jpg\",\"contentUrl\":\"http:\\\/\\\/https:\\\/\\\/mathysviewer.fr\\\/\\\/wordpress\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/7684243736.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/index.php\\\/veille\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/mathysviewer.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Veille\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mathysviewer.fr\\\/#website\",\"url\":\"https:\\\/\\\/mathysviewer.fr\\\/\",\"name\":\"Mathys Martignoni -- Portfolio\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mathysviewer.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Veille - Mathys Martignoni - Portfolio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mathysviewer.fr\/index.php\/veille\/","og_locale":"fr_FR","og_type":"article","og_title":"Veille - Mathys Martignoni - Portfolio","og_description":"Les enseignements des grandes cyberattaques fran\u00e7aises pour les entreprises. Outils M\u00e9thode Push, c&rsquo;est tout la partie de la veille informationnelle, li\u00e9s \u00e0 la r\u00e9cup\u00e9rations des informations part des moyen dit passif comme les flux rss, ou encore chaine de courielle. Flux RSS (Really Simple Syndication), est un flux qui permet de transmettre des informations souvent [&hellip;]","og_url":"https:\/\/mathysviewer.fr\/index.php\/veille\/","og_site_name":"Mathys Martignoni -- Portfolio","article_modified_time":"2025-03-27T07:36:03+00:00","og_image":[{"width":296,"height":248,"url":"https:\/\/mathysviewer.fr\/wp-content\/uploads\/2025\/03\/7684243736.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mathysviewer.fr\/index.php\/veille\/","url":"https:\/\/mathysviewer.fr\/index.php\/veille\/","name":"Veille - Mathys Martignoni - Portfolio","isPartOf":{"@id":"https:\/\/mathysviewer.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mathysviewer.fr\/index.php\/veille\/#primaryimage"},"image":{"@id":"https:\/\/mathysviewer.fr\/index.php\/veille\/#primaryimage"},"thumbnailUrl":"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/7684243736.jpg","datePublished":"2025-02-26T11:46:58+00:00","dateModified":"2025-03-27T07:36:03+00:00","breadcrumb":{"@id":"https:\/\/mathysviewer.fr\/index.php\/veille\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mathysviewer.fr\/index.php\/veille\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/mathysviewer.fr\/index.php\/veille\/#primaryimage","url":"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/7684243736.jpg","contentUrl":"http:\/\/https:\/\/mathysviewer.fr\/\/wordpress\/wp-content\/uploads\/2025\/03\/7684243736.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/mathysviewer.fr\/index.php\/veille\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/mathysviewer.fr\/"},{"@type":"ListItem","position":2,"name":"Veille"}]},{"@type":"WebSite","@id":"https:\/\/mathysviewer.fr\/#website","url":"https:\/\/mathysviewer.fr\/","name":"Mathys Martignoni -- Portfolio","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mathysviewer.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"mathys","author_link":"https:\/\/mathysviewer.fr\/index.php\/author\/mathys\/"},"uagb_comment_info":0,"uagb_excerpt":"Les enseignements des grandes cyberattaques fran\u00e7aises pour les entreprises. Outils M\u00e9thode Push, c&rsquo;est tout la partie de la veille informationnelle, li\u00e9s \u00e0 la r\u00e9cup\u00e9rations des informations part des moyen dit passif comme les flux rss, ou encore chaine de courielle. Flux RSS (Really Simple Syndication), est un flux qui permet de transmettre des informations souvent\u2026","_links":{"self":[{"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/pages\/162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/comments?post=162"}],"version-history":[{"count":46,"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/pages\/162\/revisions"}],"predecessor-version":[{"id":856,"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/pages\/162\/revisions\/856"}],"wp:attachment":[{"href":"https:\/\/mathysviewer.fr\/index.php\/wp-json\/wp\/v2\/media?parent=162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}