{"id":493,"date":"2023-11-29T15:26:45","date_gmt":"2023-11-29T14:26:45","guid":{"rendered":"https:\/\/www.cybi.fr\/?p=493"},"modified":"2023-11-29T16:07:34","modified_gmt":"2023-11-29T15:07:34","slug":"les-chemins-dattaques-a-partir-de-vulnerabilites","status":"publish","type":"post","link":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/","title":{"rendered":"Les chemins d&rsquo;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"\n<p>Les RSSI et administrateurs syst\u00e8mes doivent composer avec une v\u00e9ritable explosion des cybermenaces en 2023. Au c\u0153ur de ces attaques se trouvent les vuln\u00e9rabilit\u00e9s, qui constituent des portes d\u2019entr\u00e9e et des \u00ab\u00a0opportunit\u00e9s\u00a0\u00bb pour les pirates informatiques.<\/p>\n\n\n\n<p>Selon le dernier rapport de la NSA, le nombre de failles de s\u00e9curit\u00e9 exploit\u00e9es a bondi de 33% au cours des 18 derniers mois. Pire encore, pr\u00e8s de 55% de ces br\u00e8ches concernent des vuln\u00e9rabilit\u00e9s connues mais non corrig\u00e9es !<\/p>\n\n\n\n<p>Dans ce contexte, il est indispensable de comprendre et d&rsquo;anticiper les chemins d\u2019attaques emprunt\u00e9s par les hackers \u00e0 partir des vuln\u00e9rabilit\u00e9s d\u00e9tect\u00e9es au sein des syst\u00e8mes d&rsquo;information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mod\u00e9lisation des cyberattaques avec MITRE ATT&amp;CK<\/h2>\n\n\n\n<p>Pour mod\u00e9liser les tactiques, techniques et proc\u00e9dures (TTP) des hackers, le framework MITRE ATT&amp;CK constitue une r\u00e9f\u00e9rence internationale.<\/p>\n\n\n\n<p>Cette matrice r\u00e9pertorie l\u2019ensemble des \u00e9tapes g\u00e9n\u00e9ralement suivies par un attaquant pour compromettre un SI, voler des donn\u00e9es et se maintenir dans le r\u00e9seau.<\/p>\n\n\n\n<p>On distingue classiquement 3 grandes phases :<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>L&rsquo;acc\u00e8s initial<\/strong> : exploitation d&rsquo;une vuln\u00e9rabilit\u00e9 applicative, d&rsquo;un mauvais param\u00e9trage firewall, spearphishing etc.<\/li><li><strong>L&rsquo;\u00e9l\u00e9vation de privil\u00e8ges<\/strong> : utilisation de malware, d&rsquo;exploits, de techniques de passwords spraying etc.<\/li><li><strong>L&rsquo;action sur objectifs<\/strong> : destruction de donn\u00e9es, ransomwares, exfiltration de bases de donn\u00e9es, surveillance de postes etc.<\/li><\/ol>\n\n\n\n<p>Le logiciel SCUBA permet justement de cartographier finement tous les chemins d\u2019attaques envisageables \u00e0 partir des vuln\u00e9rabilit\u00e9s d\u00e9tect\u00e9es au sein du SI. Gr\u00e2ce \u00e0 son analyse MITRE ATT&amp;CK, le RSSI identifie rapidement les sc\u00e9narios de compromission les plus probables et les plus critiques pour l&rsquo;entreprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quelques exemples de chemins d&rsquo;attaques redoutables<\/h2>\n\n\n\n<p>La NSA, le FBI et la CISA alertent r\u00e9guli\u00e8rement les entreprises sur les tactiques privil\u00e9gi\u00e9es par certaines campagnes de cyberattaques. Voici 3 chemins d&rsquo;attaques particuli\u00e8rement redoutables et observ\u00e9s en 2023 :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attaques par ransomwares<\/h3>\n\n\n\n<p>Ces derniers mois, de nombreuses collectivit\u00e9s et PME ont \u00e9t\u00e9 victimes de Conti, Black Basta ou Hive :<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Infection depuis un mail de spearphishing (T1566)<\/li><li>Ex\u00e9cution de code PowerShell pour d\u00e9sactiver les protections anti-virus (T1089)<\/li><li>D\u00e9ploiement lat\u00e9ral via SMB pour infecter un maximum de postes et serveurs (T1105)<\/li><li>Vol de donn\u00e9es, chiffrement et ran\u00e7on (T1486)<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Intrusion via des appliances VPN<\/h3>\n\n\n\n<p>De r\u00e9centes campagnes VICEROY TIGER ont vis\u00e9 des appliances VPN de Fortinet, Palo Alto Networks et Pulse Secure :<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Exploitation d&rsquo;une vuln\u00e9rabilit\u00e9 de type buffer overflow (T1133)<\/li><li>Collecte des identifiants VPN en m\u00e9moire vive (T1003)<\/li><li>Connexions VPN avec les comptes vol\u00e9s (T1078)<\/li><li>Acc\u00e8s au r\u00e9seau interne et d\u00e9ploiement de backdoors (T1543)<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Attaques sur les serveurs Microsoft Exchange<\/h3>\n\n\n\n<p>Le proxylogon en 2021 et ses variantes ont affect\u00e9 des milliers d&rsquo;entreprises dans le monde :<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Exploitation de vuln\u00e9rabilit\u00e9s zero-day sur Exchange (T1190)<\/li><li>Ajout de comptes d&rsquo;administrateurs (T1136)<\/li><li>Acc\u00e8s aux emails via le protocole SMTP (T1114)<\/li><li>Exfiltration massive de donn\u00e9es confidentielles (T1530)<\/li><\/ol>\n\n\n\n<p>L&rsquo;analyse pr\u00e9cise des sc\u00e9narios d&rsquo;attaques, guid\u00e9e par l&rsquo;expertise des \u00e9diteurs de solutions comme SCUBA, doit absolument constituer une priorit\u00e9 pour mieux prot\u00e9ger le c\u0153ur du SI de l&rsquo;entreprise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vers une gestion offensive des vuln\u00e9rabilit\u00e9s<\/h2>\n\n\n\n<p>La r\u00e9duction drastique des vuln\u00e9rabilit\u00e9s accessibles aux hackers constitue d\u00e9sormais l&rsquo;un des enjeux majeurs de cybers\u00e9curit\u00e9 pour les RSSI. Au del\u00e0 de la surveillance, il s&rsquo;agit d&rsquo;adopter une posture offensive :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Cartographier en continu sa surface d&rsquo;attaque<\/li><li>Prioriser les vuln\u00e9rabilit\u00e9s sur lesquelles agir via la criticit\u00e9 m\u00e9tier<\/li><li>Corr\u00e9ler chaque faille \u00e0 des sc\u00e9narios d&rsquo;attaque r\u00e9alistes (chemins ATT&amp;CK)<\/li><li>R\u00e9duire l&rsquo;exposition gr\u00e2ce \u00e0 des plans d&rsquo;action mesurables<\/li><\/ul>\n\n\n\n<p>Une telle d\u00e9marche, port\u00e9e \u00e0 la fois par le management des risques et des solutions d\u00e9di\u00e9es, permet d&rsquo;anticiper plus efficacement les mouvements des cybercriminels.<\/p>\n\n\n\n<p>Face \u00e0 une menace polymorphe en constante \u00e9volution, attendez-vous \u00e0 l&rsquo;inattendu et v\u00e9rifiez votre niveau de pr\u00e9paration !<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les RSSI et administrateurs syst\u00e8mes doivent composer avec une v\u00e9ritable explosion des cybermenaces en 2023. Au c\u0153ur de ces attaques se trouvent les vuln\u00e9rabilit\u00e9s, qui constituent des portes d\u2019entr\u00e9e et des \u00ab\u00a0opportunit\u00e9s\u00a0\u00bb pour les pirates informatiques. Selon le dernier rapport de la NSA, le nombre de failles de s\u00e9curit\u00e9 exploit\u00e9es a bondi de 33% au [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":["post-493","post","type-post","status-publish","format-standard","hentry","category-technologies-et-cybersecurite"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les chemins d&#039;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique<\/title>\n<meta name=\"description\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les chemins d&#039;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\" \/>\n<meta property=\"og:description\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T14:26:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-29T15:07:34+00:00\" \/>\n<meta name=\"author\" content=\"Fabian OSMOND\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CYBI_CYBER\" \/>\n<meta name=\"twitter:site\" content=\"@CYBI_CYBER\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabian OSMOND\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/\"},\"author\":{\"name\":\"Fabian OSMOND\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/person\\\/3060713e028a83bbb248dba4763b3947\"},\"headline\":\"Les chemins d&rsquo;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s\",\"datePublished\":\"2023-11-29T14:26:45+00:00\",\"dateModified\":\"2023-11-29T15:07:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/\"},\"wordCount\":674,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\"},\"articleSection\":[\"Technologies et Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/\",\"name\":\"Les chemins d'attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#website\"},\"datePublished\":\"2023-11-29T14:26:45+00:00\",\"dateModified\":\"2023-11-29T15:07:34+00:00\",\"description\":\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/2023\\\/11\\\/29\\\/les-chemins-dattaques-a-partir-de-vulnerabilites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.cybi.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les chemins d&rsquo;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/\",\"name\":\"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique\",\"description\":\"Cybi - Cybersecurity Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybi.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#organization\",\"name\":\"Cybi\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cybi.fr\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Standard-2.png\",\"contentUrl\":\"https:\\\/\\\/www.cybi.fr\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Standard-2.png\",\"width\":2852,\"height\":1075,\"caption\":\"Cybi\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CYBI_CYBER\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybi\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cybi.fr\\\/#\\\/schema\\\/person\\\/3060713e028a83bbb248dba4763b3947\",\"name\":\"Fabian OSMOND\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g\",\"caption\":\"Fabian OSMOND\"},\"url\":\"https:\\\/\\\/www.cybi.fr\\\/index.php\\\/author\\\/fosmond\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les chemins d'attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/","og_locale":"fr_FR","og_type":"article","og_title":"Les chemins d'attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","og_description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","og_url":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/","og_site_name":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","article_published_time":"2023-11-29T14:26:45+00:00","article_modified_time":"2023-11-29T15:07:34+00:00","author":"Fabian OSMOND","twitter_card":"summary_large_image","twitter_creator":"@CYBI_CYBER","twitter_site":"@CYBI_CYBER","twitter_misc":{"\u00c9crit par":"Fabian OSMOND","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/#article","isPartOf":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/"},"author":{"name":"Fabian OSMOND","@id":"https:\/\/www.cybi.fr\/#\/schema\/person\/3060713e028a83bbb248dba4763b3947"},"headline":"Les chemins d&rsquo;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s","datePublished":"2023-11-29T14:26:45+00:00","dateModified":"2023-11-29T15:07:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/"},"wordCount":674,"publisher":{"@id":"https:\/\/www.cybi.fr\/#organization"},"articleSection":["Technologies et Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/","url":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/","name":"Les chemins d'attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s - Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","isPartOf":{"@id":"https:\/\/www.cybi.fr\/#website"},"datePublished":"2023-11-29T14:26:45+00:00","dateModified":"2023-11-29T15:07:34+00:00","description":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique Technologies et Cybers\u00e9curit\u00e9 - cybersecurite cybersecurity scuba chemin attaque Attack Path Management intrusion","breadcrumb":{"@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybi.fr\/index.php\/2023\/11\/29\/les-chemins-dattaques-a-partir-de-vulnerabilites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.cybi.fr\/"},{"@type":"ListItem","position":2,"name":"Les chemins d&rsquo;attaques \u00e0 partir de vuln\u00e9rabilit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/www.cybi.fr\/#website","url":"https:\/\/www.cybi.fr\/","name":"Cybi - Solutions innovantes de Cybers\u00e9curit\u00e9 bas\u00e9es sur de l&#039;intelligence artificielle et de l&#039;apprentissage automatique","description":"Cybi - Cybersecurity Intelligence","publisher":{"@id":"https:\/\/www.cybi.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybi.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cybi.fr\/#organization","name":"Cybi","url":"https:\/\/www.cybi.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cybi.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cybi.fr\/wp-content\/uploads\/2022\/05\/Standard-2.png","contentUrl":"https:\/\/www.cybi.fr\/wp-content\/uploads\/2022\/05\/Standard-2.png","width":2852,"height":1075,"caption":"Cybi"},"image":{"@id":"https:\/\/www.cybi.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CYBI_CYBER","https:\/\/www.linkedin.com\/company\/cybi\/"]},{"@type":"Person","@id":"https:\/\/www.cybi.fr\/#\/schema\/person\/3060713e028a83bbb248dba4763b3947","name":"Fabian OSMOND","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/baa57700c10599330d27935edd14942cc7b498f6b563987f42915bb50101cad7?s=96&d=mm&r=g","caption":"Fabian OSMOND"},"url":"https:\/\/www.cybi.fr\/index.php\/author\/fosmond\/"}]}},"jetpack_featured_media_url":"","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Fabian OSMOND","author_link":"https:\/\/www.cybi.fr\/index.php\/author\/fosmond\/"},"uagb_comment_info":0,"uagb_excerpt":"Les RSSI et administrateurs syst\u00e8mes doivent composer avec une v\u00e9ritable explosion des cybermenaces en 2023. Au c\u0153ur de ces attaques se trouvent les vuln\u00e9rabilit\u00e9s, qui constituent des portes d\u2019entr\u00e9e et des \u00ab\u00a0opportunit\u00e9s\u00a0\u00bb pour les pirates informatiques. Selon le dernier rapport de la NSA, le nombre de failles de s\u00e9curit\u00e9 exploit\u00e9es a bondi de 33% au\u2026","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/comments?post=493"}],"version-history":[{"count":1,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/493\/revisions"}],"predecessor-version":[{"id":494,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/posts\/493\/revisions\/494"}],"wp:attachment":[{"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/media?parent=493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/categories?post=493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybi.fr\/index.php\/wp-json\/wp\/v2\/tags?post=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}