{"id":1908,"date":"2016-03-03T10:11:54","date_gmt":"2016-03-03T09:11:54","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=1908"},"modified":"2016-03-04T10:13:05","modified_gmt":"2016-03-04T09:13:05","slug":"cyberattaque-la-securite-a-coute-des-millions-deuros-a-tv5-monde","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2016\/03\/03\/cyberattaque-la-securite-a-coute-des-millions-deuros-a-tv5-monde\/","title":{"rendered":"Cyberattaque &#8211; La s\u00e9curit\u00e9 a co\u00fbt\u00e9 des millions d&#8217;euros \u00e0 TV5 Monde"},"content":{"rendered":"<p>Apr\u00e8s l&#8217;importante cyberattaque dont il a \u00e9t\u00e9 la cible en 2015, le groupe TV5 Monde a d\u00fb r\u00e9parer les d\u00e9g\u00e2ts, mettre en place une politique de&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/cyberattaque-la-securite-a-coute-des-millions-d-euros-a-tv5-monde-39833578.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/cyberattaque-la-securite-a-coute-des-millions-d-euros-a-tv5-monde-39833578.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s l&#8217;importante cyberattaque dont il a \u00e9t\u00e9 la cible en 2015, le groupe TV5 Monde a d\u00fb r\u00e9parer les d\u00e9g\u00e2ts, mettre en place une politique de&#8230; http:\/\/www.zdnet.fr\/actualites\/cyberattaque-la-securite-a-coute-des-millions-d-euros-a-tv5-monde-39833578.htm<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-1908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1667%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-uM","jetpack-related-posts":[{"id":68,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/06\/11\/tv5-monde-la-piste-russe-finalement-privilegiee\/","url_meta":{"origin":1908,"position":0},"title":"TV5 Monde : la piste russe finalement privil\u00e9gi\u00e9e ?","author":"Fred","date":"11 juin 2015","format":false,"excerpt":"Les enqu\u00eateurs qui \u00e9tudient l\u2019attaque subie par TV5 Monde en janvier sont de moins en moins convaincus par la th\u00e8se d\u2019une attaque orchestr\u00e9e par... http:\/\/www.zdnet.fr\/actualites\/tv5-monde-la-piste-russe-finalement-privilegiee-39820622.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/Cybersecurity_Strategy_5_Layer_CS5L.png?fit=585%2C601&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/Cybersecurity_Strategy_5_Layer_CS5L.png?fit=585%2C601&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/Cybersecurity_Strategy_5_Layer_CS5L.png?fit=585%2C601&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":42,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/06\/09\/qui-se-cache-derriere-apt28-le-groupe-de-hackers-qui-aurait-pirate-tv5-monde\/","url_meta":{"origin":1908,"position":1},"title":"Qui se cache derri\u00e8re APT28, le groupe de hackers qui aurait pirat\u00e9 TV5 Monde ?","author":"Fred","date":"9 juin 2015","format":false,"excerpt":"D'apr\u00e8s les informations de l'Express, la piste Russe serait d\u00e9sormais privil\u00e9gi\u00e9e dans l'enqu\u00eate sur le piratage de TV5 Monde, qui avait d\u00e9fray\u00e9 la chronique il y a quelques semaines. Mais qui sont ces fameux pirates ? http:\/\/www.01net.com\/editorial\/629549\/comment-les-hackers-du-gouvernement-russe-espionnent-l-europe\/ http:\/\/www.fireeye.com\/resources\/pdfs\/apt28.pdf apt28 \u00a0","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/640.913521.jpg?fit=640%2C460&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/640.913521.jpg?fit=640%2C460&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/640.913521.jpg?fit=640%2C460&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":5594,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/07\/04\/typologie-et-cout-des-cyberattaques-en-france\/","url_meta":{"origin":1908,"position":2},"title":"Typologie et co\u00fbt des cyberattaques en France","author":"Fred","date":"4 juillet 2023","format":false,"excerpt":"Le cabinet Aster\u00e8s \u00e9value le co\u00fbt des cyberattaques r\u00e9ussies contre les organismes publics et priv\u00e9s fran\u00e7ais \u00e0 2 Mds\u20ac en 2022. Ont \u00e9t\u00e9 analys\u00e9s les principaux impacts \u00e9conomiques des trois types d\u2019attaques r\u00e9ussies couvertes par l\u2019\u00e9tude : intrusion dans le syst\u00e8me d\u2019information, attaque par ran\u00e7ongiciel et par d\u00e9ni-de-service. Le co\u00fbt\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2023\/07\/2023-06-Cyberattaques-Cout.jpg?fit=1200%2C855&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":1908,"position":3},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6075,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/14\/le-centre-integre-pour-la-cyberdefense-de-lotan\/","url_meta":{"origin":1908,"position":4},"title":"Le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense de l&#8217;Otan","author":"Fred","date":"14 juillet 2024","format":false,"excerpt":"Face \u00e0 la recrudescence des cyberattaques russes et chinoises, l'Otan cr\u00e9\u00e9 le Centre int\u00e9gr\u00e9 pour la cyberd\u00e9fense afin d'am\u00e9liorer la protection des r\u00e9seaux de l\u2019Otan et de ses 32 \u00c9tats membres, d'informer les commandements militaires des cybermenaces et vuln\u00e9rabilit\u00e9s, y compris celles pesant sur les infrastructures critiques priv\u00e9es d\u00e8s lors\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/07\/NICC.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":5328,"url":"https:\/\/mouillere.com\/universconvergents\/2022\/11\/15\/comment-lutter-contre-les-cyberattaques\/","url_meta":{"origin":1908,"position":5},"title":"Comment lutter contre les cyberattaques ?","author":"Fred","date":"15 novembre 2022","format":false,"excerpt":"","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2022\/11\/ACC-Cyber-Attack-Cheat-Sheet.jpg?fit=1200%2C831&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=1908"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1908\/revisions"}],"predecessor-version":[{"id":1909,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1908\/revisions\/1909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=1908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=1908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=1908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}