{"id":989602,"date":"2024-10-17T18:27:00","date_gmt":"2024-10-17T18:27:00","guid":{"rendered":"https:\/\/digital.neptween.com\/?p=989602"},"modified":"2024-10-21T06:30:47","modified_gmt":"2024-10-21T06:30:47","slug":"nouvelles-revelations-sur-la-montee-des-cyberattaques-financees-par-des-etats","status":"publish","type":"post","link":"https:\/\/digital.neptween.com\/?p=989602","title":{"rendered":"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"989602\" class=\"elementor elementor-989602\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b695261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b695261\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57835e0b\" data-id=\"57835e0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a940bd0 elementor-widget elementor-widget-text-editor\" data-id=\"5a940bd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Les r\u00e9centes analyses men\u00e9es par le Threat Labs de Netskope d\u00e9voilent une tendance inqui\u00e9tante\u00a0:<\/strong>\u00a0les cyberattaques financ\u00e9es par des gouvernements \u00e9trangers sont en hausse. Selon ce rapport, 66 % des malwares attribuables ayant cibl\u00e9 leurs clients au cours des douze derniers mois proviennent de groupes soutenus par des \u00c9tats. Cette\u00a0<strong>augmentation significative r\u00e9v\u00e8le non seulement la diversit\u00e9 des m\u00e9thodes employ\u00e9es mais aussi les motivations h\u00e9t\u00e9rog\u00e8nes de ces nations.<\/strong><\/p>\n<h2>Pr\u00e9pond\u00e9rance des attaques nord-cor\u00e9ennes<\/h2>\n<p>D\u2019apr\u00e8s les donn\u00e9es fournies par Netskope,\u00a0<strong>la Cor\u00e9e du Nord appara\u00eet comme le principal acteur dans le domaine des cyberattaques.<\/strong>\u00a0Contrairement \u00e0 la Russie et \u00e0 la Chine, les op\u00e9rations nord-cor\u00e9ennes sont principalement orient\u00e9es vers des gains financiers. Pyongyang utilise massivement la cybercriminalit\u00e9 et le vol de cryptomonnaies pour financer ses programmes militaires. Cette strat\u00e9gie lui permet non seulement de contourner les sanctions \u00e9conomiques, mais \u00e9galement de renforcer sa capacit\u00e9 militaire sans recourir \u00e0 des moyens traditionnels.<\/p>\n<p>Les experts soulignent que cette approche rend les attaques nord-cor\u00e9ennes largement prolifiques. Tandis que d\u2019autres nations comme la Chine ou la Russie pourraient pr\u00e9f\u00e9rer des actions plus cibl\u00e9es,\u00a0<strong>Pyongyang multiplie les tentatives dans le but de maximiser les revenus g\u00e9n\u00e9r\u00e9s par chaque op\u00e9ration.<\/strong>\u00a0L\u2019ampleur des cyberattaques provenant de la Cor\u00e9e du Nord ne cesse donc de cro\u00eetre, faisant d\u2019elle le leader mondial en termes de nombre d\u2019attaques enregistr\u00e9es.<\/p>\n<h2>Les approches diff\u00e9rentes de la Chine et de la Russie<\/h2>\n<p>Toutefois, si la Cor\u00e9e du Nord domine en quantit\u00e9 d\u2019attaques, les\u00a0<strong>m\u00e9thodes chinoises et russes n\u2019en restent pas moins sophistiqu\u00e9es et potentiellement d\u00e9vastatrices<\/strong>\u00a0sur un plan strat\u00e9gique. Les activit\u00e9s malveillantes de ces deux pays sont souvent motiv\u00e9es par des int\u00e9r\u00eats g\u00e9opolitiques et visent essentiellement \u00e0 espionner, sonder les infrastructures critiques ou encore influencer des \u00e9v\u00e9nements internationaux.<\/p>\n<p>Contrairement aux campagnes massives de la Cor\u00e9e du Nord, les op\u00e9rations russes et chinoises se distinguent par leur pr\u00e9cision et leur discr\u00e9tion. Selon l\u2019\u00e9tude, la Russie favorise particuli\u00e8rement les \u00ab\u00a0frappes chirurgicales\u00a0\u00bb, visant pr\u00e9cis\u00e9ment des cibles hautement strat\u00e9giques avec des cons\u00e9quences parfois n\u00e9fastes pour la s\u00e9curit\u00e9 nationale des pays vis\u00e9s. Par exemple,\u00a0<strong>les acteurs russes infiltrent les syst\u00e8mes informatiques gouvernementaux et industriels dans le but de subtiliser des informations sensibles<\/strong>\u00a0ou de perturber des services vitaux.<\/p>\n<h2>L\u2019utilisation croissante des applications cloud<\/h2>\n<p>Un autre aspect r\u00e9v\u00e9lateur de cette \u00e9tude est la popularit\u00e9 croissante des\u00a0<strong>applications cloud comme vecteurs d\u2019infections.<\/strong>\u00a0Il a \u00e9t\u00e9 observ\u00e9 que pr\u00e8s de 50 % des malwares t\u00e9l\u00e9charg\u00e9s \u00e0 travers le monde proviennent d\u00e9sormais de plateformes cloud parmi les plus utilis\u00e9es. Ces applications \u00e9tant omnipr\u00e9sentes dans les environnements professionnels et personnels, elles constituent une cible de choix pour les cybercriminels cherchant \u00e0 diffuser leurs logiciels malveillants rapidement et \u00e0 grande \u00e9chelle.<\/p>\n<p>Les m\u00e9canismes de diffusion via le cloud permettent aux malwares de se propager rapidement en contournant parfois les mesures de s\u00e9curit\u00e9 traditionnelles. Cela complique consid\u00e9rablement le travail des experts en cybers\u00e9curit\u00e9 qui doivent adapter continuellement leurs strat\u00e9gies de d\u00e9fense face \u00e0 ces menaces en constante \u00e9volution. De nombreux incidents ont montr\u00e9 que m\u00eame des entreprises bien prot\u00e9g\u00e9es peuvent devenir vuln\u00e9rables d\u00e8s lors qu\u2019elles utilisent des services cloud non s\u00e9curis\u00e9s ou mal configur\u00e9s.<\/p>\n<h2>Cons\u00e9quences mondiales des cyberattaques \u00e9tatiques<\/h2>\n<p>De mani\u00e8re g\u00e9n\u00e9rale,\u00a0<strong>l\u2019escalade des cyberattaques \u00e9tatiques illustre une nouvelle forme de conflit international, souvent qualifi\u00e9e de \u00ab\u00a0guerre silencieuse\u00a0\u00bb.<\/strong>\u00a0Sanjay Beri, CEO et cofondateur de Netskope, indique effectivement que nous assistons mondialement \u00e0 une intensification des affrontements num\u00e9riques entre \u00e9tats en paix officielle. Ce ph\u00e9nom\u00e8ne redessine les fronti\u00e8res de la guerre moderne, o\u00f9 la cybers\u00e9curit\u00e9 devient un enjeu majeur pour la protection des infrastructures nationales.<\/p>\n<p>Les menaces continuent de s\u2019accentuer et aucun secteur n\u2019est \u00e0 l\u2019abri des offensives num\u00e9riques. De nombreuses industries, allant des banques aux h\u00f4pitaux en passant par les cha\u00eenes d\u2019approvisionnement, voient leur s\u00e9curit\u00e9 menac\u00e9e par des intrusions malicieuses orchestr\u00e9es depuis l\u2019\u00e9tranger. Ceci impose aux gouvernements et aux entreprises une vigilance accrue ainsi qu\u2019une mise \u00e0 jour continue de leurs politiques de cybers\u00e9curit\u00e9.<\/p>\n<h2>R\u00e9ponses internationales face au d\u00e9fi de la cybercriminalit\u00e9<\/h2>\n<p>En r\u00e9ponse \u00e0 cette recrudescence des cyber-menaces, plusieurs initiatives internationales sont en cours pour renforcer la coop\u00e9ration et am\u00e9liorer la r\u00e9silience collective contre les attaques. Diverses conventions et accords ont \u00e9t\u00e9 sign\u00e9s entre nations pour partager des informations cruciales et coordonner les efforts de d\u00e9fense. Les organismes mondiaux et r\u00e9gionaux mettent \u00e9galement en place des normes et standards pour aider les pays \u00e0 mieux se pr\u00e9parer et \u00e0 r\u00e9pondre efficacement aux cyberattaques.<\/p>\n<p>Des exercices conjoints de simulation d\u2019incidents de cybers\u00e9curit\u00e9 permettent \u00e9galement de tester et d\u2019am\u00e9liorer les capacit\u00e9s de r\u00e9action rapide des \u00e9quipes techniques et strat\u00e9giques. \u00c0 cet \u00e9gard, il est essentiel pour chaque nation de d\u00e9velopper et maintenir des comp\u00e9tences techniques avanc\u00e9es dans le domaine de la cybers\u00e9curit\u00e9, afin de garantir leur souverainet\u00e9 num\u00e9rique et prot\u00e9ger leurs citoyens contre ces nouvelles formes de menaces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14df692 elementor-widget elementor-widget-text-editor\" data-id=\"14df692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/siecledigital.fr\/2024\/10\/17\/nouvelles-revelations-sur-la-montee-des-cyberattaques-financees-par-des-etats\/\"><strong>Source :<\/strong><strong>SiecleDigital<\/strong><strong>\u00a0:: Lire plus\u2026<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Les r\u00e9centes analyses men\u00e9es par le Threat Labs de Netskope d\u00e9voilent une tendance inqui\u00e9tante : les cyberattaques financ\u00e9es par des gouvernements \u00e9trangers sont en hausse. Selon ce rapport, 66 % des malwares attribuables ayant cibl\u00e9 leurs clients au cours des douze derniers mois proviennent de groupes soutenus par des \u00c9tats. Cette augmentation significative r\u00e9v\u00e8le non seulement la diversit\u00e9 des m\u00e9thodes employ\u00e9es mais aussi les motivations h\u00e9t\u00e9rog\u00e8nes de ces nations.<\/p>\n","protected":false},"author":1,"featured_media":989605,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,67],"tags":[86,77,85],"class_list":["post-989602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","category-cybersecurite","tag-fonds-dinvestissement","tag-international","tag-service-public"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats - NEPTWEEN DIGITAL<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats - NEPTWEEN DIGITAL\" \/>\n<meta property=\"og:description\" content=\"Les r\u00e9centes analyses men\u00e9es par le Threat Labs de Netskope d\u00e9voilent une tendance inqui\u00e9tante : les cyberattaques financ\u00e9es par des gouvernements \u00e9trangers sont en hausse. Selon ce rapport, 66 % des malwares attribuables ayant cibl\u00e9 leurs clients au cours des douze derniers mois proviennent de groupes soutenus par des \u00c9tats. Cette augmentation significative r\u00e9v\u00e8le non seulement la diversit\u00e9 des m\u00e9thodes employ\u00e9es mais aussi les motivations h\u00e9t\u00e9rog\u00e8nes de ces nations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital.neptween.com\/?p=989602\" \/>\n<meta property=\"og:site_name\" content=\"NEPTWEEN DIGITAL\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-17T18:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-21T06:30:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"701\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"support@neptween.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"support@neptween.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#article\",\"isPartOf\":{\"@id\":\"https:\/\/digital.neptween.com\/?p=989602\"},\"author\":{\"name\":\"support@neptween.com\",\"@id\":\"https:\/\/digital.neptween.com\/#\/schema\/person\/f821a2072bb3fbcfddaef68e02be928f\"},\"headline\":\"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats\",\"datePublished\":\"2024-10-17T18:27:00+00:00\",\"dateModified\":\"2024-10-21T06:30:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/digital.neptween.com\/?p=989602\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\/\/digital.neptween.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg\",\"keywords\":[\"Fonds d\u2019investissement\",\"International\",\"Service public\"],\"articleSection\":[\"Actualit\u00e9s\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digital.neptween.com\/?p=989602\",\"url\":\"https:\/\/digital.neptween.com\/?p=989602\",\"name\":\"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats - NEPTWEEN DIGITAL\",\"isPartOf\":{\"@id\":\"https:\/\/digital.neptween.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#primaryimage\"},\"image\":{\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg\",\"datePublished\":\"2024-10-17T18:27:00+00:00\",\"dateModified\":\"2024-10-21T06:30:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digital.neptween.com\/?p=989602\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#primaryimage\",\"url\":\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg\",\"contentUrl\":\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg\",\"width\":1200,\"height\":701},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digital.neptween.com\/?p=989602#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digital.neptween.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digital.neptween.com\/#website\",\"url\":\"https:\/\/digital.neptween.com\/\",\"name\":\"NEPTWEEN DIGITAL\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/digital.neptween.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digital.neptween.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/digital.neptween.com\/#organization\",\"name\":\"NEPTWEEN DIGITAL\",\"url\":\"https:\/\/digital.neptween.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/digital.neptween.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2023\/11\/ND_LOGO_V2.png\",\"contentUrl\":\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2023\/11\/ND_LOGO_V2.png\",\"width\":832,\"height\":239,\"caption\":\"NEPTWEEN DIGITAL\"},\"image\":{\"@id\":\"https:\/\/digital.neptween.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/digital.neptween.com\/#\/schema\/person\/f821a2072bb3fbcfddaef68e02be928f\",\"name\":\"support@neptween.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g\",\"caption\":\"support@neptween.com\"},\"sameAs\":[\"https:\/\/digital.neptween.com\"],\"url\":\"https:\/\/digital.neptween.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats - NEPTWEEN DIGITAL","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats - NEPTWEEN DIGITAL","og_description":"Les r\u00e9centes analyses men\u00e9es par le Threat Labs de Netskope d\u00e9voilent une tendance inqui\u00e9tante : les cyberattaques financ\u00e9es par des gouvernements \u00e9trangers sont en hausse. Selon ce rapport, 66 % des malwares attribuables ayant cibl\u00e9 leurs clients au cours des douze derniers mois proviennent de groupes soutenus par des \u00c9tats. Cette augmentation significative r\u00e9v\u00e8le non seulement la diversit\u00e9 des m\u00e9thodes employ\u00e9es mais aussi les motivations h\u00e9t\u00e9rog\u00e8nes de ces nations.","og_url":"https:\/\/digital.neptween.com\/?p=989602","og_site_name":"NEPTWEEN DIGITAL","article_published_time":"2024-10-17T18:27:00+00:00","article_modified_time":"2024-10-21T06:30:47+00:00","og_image":[{"width":1200,"height":701,"url":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg","type":"image\/jpeg"}],"author":"support@neptween.com","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"support@neptween.com","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digital.neptween.com\/?p=989602#article","isPartOf":{"@id":"https:\/\/digital.neptween.com\/?p=989602"},"author":{"name":"support@neptween.com","@id":"https:\/\/digital.neptween.com\/#\/schema\/person\/f821a2072bb3fbcfddaef68e02be928f"},"headline":"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats","datePublished":"2024-10-17T18:27:00+00:00","dateModified":"2024-10-21T06:30:47+00:00","mainEntityOfPage":{"@id":"https:\/\/digital.neptween.com\/?p=989602"},"wordCount":921,"publisher":{"@id":"https:\/\/digital.neptween.com\/#organization"},"image":{"@id":"https:\/\/digital.neptween.com\/?p=989602#primaryimage"},"thumbnailUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg","keywords":["Fonds d\u2019investissement","International","Service public"],"articleSection":["Actualit\u00e9s","Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/digital.neptween.com\/?p=989602","url":"https:\/\/digital.neptween.com\/?p=989602","name":"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats - NEPTWEEN DIGITAL","isPartOf":{"@id":"https:\/\/digital.neptween.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital.neptween.com\/?p=989602#primaryimage"},"image":{"@id":"https:\/\/digital.neptween.com\/?p=989602#primaryimage"},"thumbnailUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg","datePublished":"2024-10-17T18:27:00+00:00","dateModified":"2024-10-21T06:30:47+00:00","breadcrumb":{"@id":"https:\/\/digital.neptween.com\/?p=989602#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital.neptween.com\/?p=989602"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/digital.neptween.com\/?p=989602#primaryimage","url":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg","contentUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0025.jpg","width":1200,"height":701},{"@type":"BreadcrumbList","@id":"https:\/\/digital.neptween.com\/?p=989602#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digital.neptween.com\/"},{"@type":"ListItem","position":2,"name":"Nouvelles r\u00e9v\u00e9lations sur la mont\u00e9e des cyberattaques financ\u00e9es par des \u00c9tats"}]},{"@type":"WebSite","@id":"https:\/\/digital.neptween.com\/#website","url":"https:\/\/digital.neptween.com\/","name":"NEPTWEEN DIGITAL","description":"","publisher":{"@id":"https:\/\/digital.neptween.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital.neptween.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/digital.neptween.com\/#organization","name":"NEPTWEEN DIGITAL","url":"https:\/\/digital.neptween.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/digital.neptween.com\/#\/schema\/logo\/image\/","url":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2023\/11\/ND_LOGO_V2.png","contentUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2023\/11\/ND_LOGO_V2.png","width":832,"height":239,"caption":"NEPTWEEN DIGITAL"},"image":{"@id":"https:\/\/digital.neptween.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/digital.neptween.com\/#\/schema\/person\/f821a2072bb3fbcfddaef68e02be928f","name":"support@neptween.com","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g","caption":"support@neptween.com"},"sameAs":["https:\/\/digital.neptween.com"],"url":"https:\/\/digital.neptween.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts\/989602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=989602"}],"version-history":[{"count":4,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts\/989602\/revisions"}],"predecessor-version":[{"id":989608,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts\/989602\/revisions\/989608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/media\/989605"}],"wp:attachment":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=989602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=989602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=989602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}