{"id":131,"date":"2017-11-15T15:45:57","date_gmt":"2017-11-15T14:45:57","guid":{"rendered":"http:\/\/www.aptitude-informatique.fr\/?p=131"},"modified":"2023-01-19T14:44:31","modified_gmt":"2023-01-19T13:44:31","slug":"cyberattaques","status":"publish","type":"post","link":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/","title":{"rendered":"Cyberattaques"},"content":{"rendered":"<p>CCleaner infect\u00e9 par un logiciel malveillant<\/p>\n<p>CCleaner a \u00e9t\u00e9 compromis par un logiciel malveillant. 2,27 millions de personnes ont t\u00e9l\u00e9charg\u00e9 les versions infect\u00e9es. Bien que cette cyberattaque ait atteint des milliers de machines, il semblerait que le groupe de cybercriminels ciblait majoritairement des entreprises technologiques. Parmi elles figurent Sony, Epson, Samsung ou encore Google.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCleaner infect\u00e9 par un logiciel malveillant CCleaner a \u00e9t\u00e9 compromis par un logiciel malveillant. 2,27 millions de personnes ont t\u00e9l\u00e9charg\u00e9 les versions infect\u00e9es. Bien que cette cyberattaque ait atteint des milliers de machines, il semblerait que le groupe de cybercriminels ciblait majoritairement des entreprises technologiques. Parmi elles figurent Sony, Epson, Samsung ou encore Google.<\/p>\n","protected":false},"author":2,"featured_media":132,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-131","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classe"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberattaques - APTITUDE INFORMATIQUE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques - APTITUDE INFORMATIQUE\" \/>\n<meta property=\"og:description\" content=\"CCleaner infect\u00e9 par un logiciel malveillant CCleaner a \u00e9t\u00e9 compromis par un logiciel malveillant. 2,27 millions de personnes ont t\u00e9l\u00e9charg\u00e9 les versions infect\u00e9es. Bien que cette cyberattaque ait atteint des milliers de machines, il semblerait que le groupe de cybercriminels ciblait majoritairement des entreprises technologiques. Parmi elles figurent Sony, Epson, Samsung ou encore Google.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/\" \/>\n<meta property=\"og:site_name\" content=\"APTITUDE INFORMATIQUE\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-15T14:45:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-19T13:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"120\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"yann Le Goc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"yann Le Goc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/\",\"url\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/\",\"name\":\"Cyberattaques - APTITUDE INFORMATIQUE\",\"isPartOf\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1\",\"datePublished\":\"2017-11-15T14:45:57+00:00\",\"dateModified\":\"2023-01-19T13:44:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/#\/schema\/person\/f3800a6ffab396f687abb15b08e23729\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1\",\"width\":120,\"height\":120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.aptitude-informatique.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/#website\",\"url\":\"https:\/\/www.aptitude-informatique.fr\/\",\"name\":\"APTITUDE INFORMATIQUE\",\"description\":\"Conseil - Formation - Cr\u00e9ation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aptitude-informatique.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aptitude-informatique.fr\/#\/schema\/person\/f3800a6ffab396f687abb15b08e23729\",\"name\":\"yann Le Goc\",\"url\":\"https:\/\/www.aptitude-informatique.fr\/index.php\/author\/yann\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques - APTITUDE INFORMATIQUE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques - APTITUDE INFORMATIQUE","og_description":"CCleaner infect\u00e9 par un logiciel malveillant CCleaner a \u00e9t\u00e9 compromis par un logiciel malveillant. 2,27 millions de personnes ont t\u00e9l\u00e9charg\u00e9 les versions infect\u00e9es. Bien que cette cyberattaque ait atteint des milliers de machines, il semblerait que le groupe de cybercriminels ciblait majoritairement des entreprises technologiques. Parmi elles figurent Sony, Epson, Samsung ou encore Google.","og_url":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/","og_site_name":"APTITUDE INFORMATIQUE","article_published_time":"2017-11-15T14:45:57+00:00","article_modified_time":"2023-01-19T13:44:31+00:00","og_image":[{"width":120,"height":120,"url":"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1","type":"image\/png"}],"author":"yann Le Goc","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"yann Le Goc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/","url":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/","name":"Cyberattaques - APTITUDE INFORMATIQUE","isPartOf":{"@id":"https:\/\/www.aptitude-informatique.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#primaryimage"},"image":{"@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1","datePublished":"2017-11-15T14:45:57+00:00","dateModified":"2023-01-19T13:44:31+00:00","author":{"@id":"https:\/\/www.aptitude-informatique.fr\/#\/schema\/person\/f3800a6ffab396f687abb15b08e23729"},"breadcrumb":{"@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#primaryimage","url":"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1","width":120,"height":120},{"@type":"BreadcrumbList","@id":"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.aptitude-informatique.fr\/"},{"@type":"ListItem","position":2,"name":"Cyberattaques"}]},{"@type":"WebSite","@id":"https:\/\/www.aptitude-informatique.fr\/#website","url":"https:\/\/www.aptitude-informatique.fr\/","name":"APTITUDE INFORMATIQUE","description":"Conseil - Formation - Cr\u00e9ation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aptitude-informatique.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.aptitude-informatique.fr\/#\/schema\/person\/f3800a6ffab396f687abb15b08e23729","name":"yann Le Goc","url":"https:\/\/www.aptitude-informatique.fr\/index.php\/author\/yann\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ibsz-27","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/posts\/131"}],"collection":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":1,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":133,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/posts\/131\/revisions\/133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/media\/132"}],"wp:attachment":[{"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aptitude-informatique.fr\/index.php\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}