{"id":126,"date":"2024-11-28T09:23:01","date_gmt":"2024-11-28T09:23:01","guid":{"rendered":"https:\/\/yanis-ezzamouri.fr\/?page_id=126"},"modified":"2026-04-08T19:04:22","modified_gmt":"2026-04-08T19:04:22","slug":"veille-technologique","status":"publish","type":"page","link":"https:\/\/yanis-ezzamouri.fr\/?page_id=126","title":{"rendered":"Veille Technologique"},"content":{"rendered":"\n<p><strong>Sujet :<\/strong> L&rsquo;impact de l&rsquo;intelligence artificielle sur la cybers\u00e9curit\u00e9<\/p>\n\n\n\n<p><strong>Modes de mise en veille : <\/strong>Push<\/p>\n\n\n\n<p>La veille consiste \u00e0 rechercher, surveiller et analyser r\u00e9guli\u00e8rement des informations utiles sur un sujet pr\u00e9cis, comme les \u00e9volutions du march\u00e9, la concurrence, les attentes des clients ou encore les nouvelles tendances. Elle permet de rester inform\u00e9 et d\u2019adapter ses actions en fonction des changements observ\u00e9s. Pour effectuer cette veille, j\u2019ai utilis\u00e9 Google Alerts, afin de recevoir automatiquement des informations sur mon sujet, ainsi que Netvibes, qui m\u2019a permis de regrouper et suivre facilement les actualit\u00e9s et articles de plusieurs sites sp\u00e9cialis\u00e9s dans un seul espace.<\/p>\n\n\n\n<p><strong>R\u00e9sultat de la veille : <\/strong><\/p>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\"><\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\"><\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\"><\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-1&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-1-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-1\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Avril 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-1\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-1-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Cybers\u00e9curit\u00e9 \u00e0 l&rsquo;\u00e8re de l&rsquo;IA&nbsp;: \u00e9voluez plus vite que les menaces ou vous serez distanc\u00e9s.<\/p>\n\n\n\n<p>L\u2019article explique que l\u2019IA devient un facteur de transformation rapide de la cybers\u00e9curit\u00e9, aussi bien pour l\u2019attaque que pour la d\u00e9fense.<\/p>\n\n\n\n<p>Impact : les entreprises doivent d\u00e9sormais \u00e9voluer plus vite que la menace, car l\u2019IA r\u00e9duit le temps entre d\u00e9couverte, exploitation et industrialisation d\u2019une attaque.<\/p>\n\n\n\n<p>Source : The Hacker News<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-2&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-2-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-2\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Mai 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-2\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-2-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Aper\u00e7u de l&rsquo;\u00e9v\u00e9nement&nbsp;: Sommet 2025 sur la d\u00e9tection des menaces et la r\u00e9ponse aux incidents<\/p>\n\n\n\n<p>Le sommet met en avant le besoin croissant de r\u00e9ponse \u00e0 incident et de d\u00e9tection dans un contexte o\u00f9 les attaques deviennent plus complexes, notamment sous l\u2019effet de l\u2019automatisation et de l\u2019IA.<\/p>\n\n\n\n<p>Impact : l\u2019IA pousse les entreprises \u00e0 moderniser leur d\u00e9tection et leur r\u00e9ponse \u00e0 incident.<\/p>\n\n\n\n<p>Source : SecurityWeek<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-3&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-3-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-3\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Juin 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-3\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-3-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>L&rsquo;IA est une bombe \u00e0 retardement en mati\u00e8re de fuites de donn\u00e9es, r\u00e9v\u00e8le un nouveau rapport<\/p>\n\n\n\n<p>L\u2019article alerte sur le fait que les outils IA d\u2019entreprise peuvent exposer massivement les donn\u00e9es si les acc\u00e8s sont mal g\u00e9r\u00e9s.<\/p>\n\n\n\n<p>Impact : la cybers\u00e9curit\u00e9 ne doit plus seulement prot\u00e9ger le r\u00e9seau, elle doit aussi gouverner les usages IA et les droits d\u2019acc\u00e8s aux donn\u00e9es.<\/p>\n\n\n\n<p>Source : BleepingComputer<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-4&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-4-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-4\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Juillet 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-4\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-4-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Une campagne d&#8217;empoisonnement SEO cible plus de 8&nbsp;500 PME avec un logiciel malveillant d\u00e9guis\u00e9 en outil d&rsquo;IA<\/p>\n\n\n\n<p>Des cybercriminels ont diffus\u00e9 des malwares via de faux outils ou pages associ\u00e9es \u00e0 des usages \u201ctech \/ outils recherch\u00e9s\u201d, dans un contexte o\u00f9 les outils IA deviennent un app\u00e2t cr\u00e9dible.<\/p>\n\n\n\n<p>Impact : plus l\u2019IA se d\u00e9mocratise, plus elle devient un levier de tromperie pour diffuser des malwares.<\/p>\n\n\n\n<p>Source : The Hacker News<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\"><\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-5&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-5-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-5\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Septembre 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-5\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-5-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Campagne d\u2019espionnage automatis\u00e9 attribu\u00e9e \u00e0 des acteurs chinois utilisant l\u2019IA d\u2019Anthropic.<\/p>\n\n\n\n<p>Des acteurs mena\u00e7ants ont utilis\u00e9 l\u2019IA non plus seulement comme aide r\u00e9dactionnelle, mais comme outil op\u00e9rationnel dans une campagne offensive.<\/p>\n\n\n\n<p>Impact : la cybers\u00e9curit\u00e9 entre dans l\u2019\u00e8re de l\u2019agentic AI offensive.<\/p>\n\n\n\n<p>Source : The Hacker News<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-6&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-6-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-6\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Octobre 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-6\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-6-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Tour d&rsquo;horizon des fusions-acquisitions en cybers\u00e9curit\u00e9&nbsp;: 45 op\u00e9rations annonc\u00e9es en octobre 2025<\/p>\n\n\n\n<p>L\u2019article montre une acc\u00e9l\u00e9ration des acquisitions autour de la gouvernance IA et de la s\u00e9curit\u00e9 des nouveaux usages num\u00e9riques.<\/p>\n\n\n\n<p>Impact : L\u2019IA n\u2019est plus seulement un sujet technique : elle devient un sujet de gouvernance, conformit\u00e9 et strat\u00e9gie.<\/p>\n\n\n\n<p>Source : SecurityWeek<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-7&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-7-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-7\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Novembre 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-7\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-7-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Des chercheurs d\u00e9couvrent de graves failles dans l&rsquo;IA, exposant les frameworks d&rsquo;inf\u00e9rence de Meta, Nvidia et Microsoft.<\/p>\n\n\n\n<p>Des chercheurs ont identifi\u00e9 de graves vuln\u00e9rabilit\u00e9s dans plusieurs frameworks d\u2019inf\u00e9rence IA, avec des risques de remote code execution (RCE) li\u00e9s \u00e0 des pratiques dangereuses comme la d\u00e9s\u00e9rialisation non s\u00fbre.<\/p>\n\n\n\n<p>Impact : Cet incident montre que les syst\u00e8mes IA sont d\u00e9sormais des cibles techniques de premier plan.<\/p>\n\n\n\n<p>Source : The Hacker News<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-8&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-8-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-8\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">D\u00e9cembre 2025<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-8\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-8-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Les cadres de s\u00e9curit\u00e9 traditionnels exposent les organisations \u00e0 des vecteurs d&rsquo;attaque sp\u00e9cifiques \u00e0 l&rsquo;IA.<\/p>\n\n\n\n<p>L\u2019article fait une synth\u00e8se des attaques sp\u00e9cifiques \u00e0 l\u2019IA observ\u00e9es en 2024\u20132025 :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>biblioth\u00e8ques compromises,<\/li>\n\n\n\n<li>secrets expos\u00e9s,<\/li>\n\n\n\n<li>risques propres aux syst\u00e8mes IA.<\/li>\n<\/ul>\n\n\n\n<p>Impact :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Apparition d\u2019une vraie cybers\u00e9curit\u00e9 de l\u2019IA.<\/li>\n\n\n\n<li>Besoin de s\u00e9curiser mod\u00e8les, agents, connecteurs, pipelines et jeux de donn\u00e9es.<\/li>\n<\/ul>\n\n\n\n<p>Source : The Hacker News<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-9&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-9-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-9\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Janvier 2026<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-9\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-9-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Perspectives cyber 2026&nbsp;: Ing\u00e9nierie sociale<\/p>\n\n\n\n<p>L\u2019article explique comment l\u2019IA renforce les attaques de social engineering : messages plus cr\u00e9dibles, usurpations plus fines, manipulation \u00e0 plus grande \u00e9chelle.<\/p>\n\n\n\n<p>Impact : la cybers\u00e9curit\u00e9 doit davantage prot\u00e9ger l\u2019humain, pas seulement la machine.<\/p>\n\n\n\n<p>Source : SecurityWeek<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-10&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-10-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-10\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">F\u00e9vrier 2026<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-10\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-10-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Un acteur malveillant utilisant l&rsquo;intelligence artificielle compromet plus de 600 dispositifs FortiGate dans 55 pays.<\/p>\n\n\n\n<p>Un acteur malveillant peu sophistiqu\u00e9 a utilis\u00e9 des services d\u2019IA g\u00e9n\u00e9rative pour aider \u00e0 compromettre plus de 600 \u00e9quipements FortiGate dans 55 pays.<\/p>\n\n\n\n<p>Impact : l\u2019IA a permis \u00e0 un attaquant \u201cmoyen\u201d de : planifier plus vite, g\u00e9n\u00e9rer des commandes, automatiser ses actions, frapper \u00e0 grande \u00e9chelle.<\/p>\n\n\n\n<p>Source : The Hacker News<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\"><\/div>\n\n\n\n<div data-wp-context=\"{ &quot;autoclose&quot;: false, &quot;accordionItems&quot;: [] }\" data-wp-interactive=\"core\/accordion\" role=\"group\" class=\"wp-block-accordion is-layout-flow wp-block-accordion-is-layout-flow\">\n<div data-wp-class--is-open=\"state.isOpen\" data-wp-context=\"{ &quot;id&quot;: &quot;accordion-item-11&quot;, &quot;openByDefault&quot;: false }\" data-wp-init=\"callbacks.initAccordionItems\" data-wp-on-window--hashchange=\"callbacks.hashChange\" class=\"wp-block-accordion-item is-layout-flow wp-block-accordion-item-is-layout-flow\">\n<h3 class=\"wp-block-accordion-heading\"><button aria-expanded=\"false\" aria-controls=\"accordion-item-11-panel\" data-wp-bind--aria-expanded=\"state.isOpen\" data-wp-on--click=\"actions.toggle\" data-wp-on--keydown=\"actions.handleKeyDown\" id=\"accordion-item-11\" type=\"button\" class=\"wp-block-accordion-heading__toggle\"><span class=\"wp-block-accordion-heading__toggle-title\">Conclusion<\/span><span class=\"wp-block-accordion-heading__toggle-icon\" aria-hidden=\"true\">+<\/span><\/button><\/h3>\n\n\n\n<div inert aria-labelledby=\"accordion-item-11\" data-wp-bind--inert=\"!state.isOpen\" id=\"accordion-item-11-panel\" role=\"region\" class=\"wp-block-accordion-panel is-layout-flow wp-block-accordion-panel-is-layout-flow\">\n<p>Cette veille montre que l\u2019intelligence artificielle a profond\u00e9ment transform\u00e9 la cybers\u00e9curit\u00e9. Son impact est double : elle sert \u00e0 la fois d\u2019outil de d\u00e9fense pour automatiser la d\u00e9tection et la r\u00e9ponse \u00e0 incident, mais aussi d\u2019acc\u00e9l\u00e9rateur pour les attaquants, notamment dans le phishing, l\u2019ing\u00e9nierie sociale, la compromission d\u2019infrastructures et les attaques \u00e0 grande \u00e9chelle.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/wakelet.com\/wake\/SOk5v1kDiVlATUJ9vzezX\">Wakelet<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sujet : L&rsquo;impact de l&rsquo;intelligence artificielle sur la cybers\u00e9curit\u00e9 Modes de mise en veille : Push La veille consiste \u00e0 rechercher, surveiller et analyser r\u00e9guli\u00e8rement des informations utiles sur un sujet pr\u00e9cis, comme les \u00e9volutions du march\u00e9, la concurrence, les attentes des clients ou encore les nouvelles tendances. Elle permet de rester inform\u00e9 et d\u2019adapter [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-126","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=\/wp\/v2\/pages\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=126"}],"version-history":[{"count":14,"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=\/wp\/v2\/pages\/126\/revisions"}],"predecessor-version":[{"id":651,"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=\/wp\/v2\/pages\/126\/revisions\/651"}],"wp:attachment":[{"href":"https:\/\/yanis-ezzamouri.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}