{"id":151869,"date":"2019-09-02T07:15:14","date_gmt":"2019-09-02T06:15:14","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=151869"},"modified":"2023-06-22T10:43:00","modified_gmt":"2023-06-22T09:43:00","slug":"top-points-entree-cyberattaque-les-plus-inattendus","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/","title":{"rendered":"Top 6 des points d\u2019entr\u00e9e de cyberattaques les plus inattendus"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-151867 size-full\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg\" alt=\"6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield\" width=\"800\" height=\"534\" \/><\/p>\n<p><strong>Que ce soit au domicile ou sur le lieu de travail, les hackers redoublent d\u2019ing\u00e9niosit\u00e9 pour infiltrer les r\u00e9seaux informatiques. Exploitant les failles d\u2019objets connect\u00e9s souvent vuln\u00e9rables, ils imaginent des cyberattaques aux points d\u2019entr\u00e9e pour le moins originaux. Tour d\u2019horizon des plus inattendus.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Un chauffe-eau \u00e9lectrique<\/h2>\n<p>Des chercheurs de l\u2019Universit\u00e9 de Princeton ont test\u00e9 <a href=\"https:\/\/www.wired.com\/story\/water-heaters-power-grid-hack-blackout\/\" target=\"_blank\" rel=\"noopener noreferrer\">un sc\u00e9nario<\/a> qui pourrait bien se d\u00e9rouler dans l\u2019intimit\u00e9 de nos propres maisons\u2026 Durant cette attaque, les hackers prennent le contr\u00f4le d\u2019appareils \u00e9nergivores afin de d\u00e9stabiliser le r\u00e9seau \u00e9lectrique. D\u2019apr\u00e8s cette \u00e9tude, seuls 42 000 chauffe-eaux \u00e9lectriques suffiraient \u00e0 couper 86 % du r\u00e9seau \u00e9lectrique polonais. De quoi en refroidir plus d\u2019un.<\/p>\n<p>&nbsp;<\/p>\n<h2>Un babyphone<\/h2>\n<p>Toujours au c\u0153ur de nos habitations, c\u2019est en partie en piratant des babyphones que des hackers ont dirig\u00e9 <a href=\"https:\/\/www.huffpost.com\/entry\/did-baby-monitors-really-cause-the-internet-to-go-down_b_580d6f5ee4b0b1bd89fdb4e1\" target=\"_blank\" rel=\"noopener noreferrer\">une attaque par d\u00e9ni de service distribu\u00e9 (DDoS)<\/a> contre la soci\u00e9t\u00e9 Dyn en 2016.<\/p>\n<p>En saturant les serveurs de ce prestataire de service, les attaquants ont r\u00e9ussi \u00e0 rendre certains sites inaccessibles dont les tr\u00e8s populaires Twitter, Amazon ou encore Airbnb, et ce, pendant pr\u00e8s de 12 heures.<\/p>\n<p>&nbsp;<\/p>\n<h2>Une souris d\u2019ordinateur<\/h2>\n<p>Qu\u2019elle tr\u00f4ne sur votre bureau au travail ou \u00e0 la maison, la souris para\u00eet inoffensive. C\u2019est pourquoi la soci\u00e9t\u00e9 Netragard, sp\u00e9cialis\u00e9e dans l\u2019audit de s\u00e9curit\u00e9 informatique, a eu l\u2019id\u00e9e d\u2019en <a href=\"https:\/\/www.netragard.com\/netragards-hacker-interface-device-hid\" target=\"_blank\" rel=\"noopener noreferrer\">pirater une pour y int\u00e9grer un logiciel espion<\/a>. Envoy\u00e9e sous forme de colis publicitaire \u00e0 un employ\u00e9, elle s\u2019est connect\u00e9e \u00e0 un serveur tiers apr\u00e8s branchement. Mission accomplie pour Netragard, missionn\u00e9 par l\u2019entreprise en question pour rechercher d\u2019\u00e9ventuelles failles de s\u00e9curit\u00e9\u2026<\/p>\n<p>&nbsp;<\/p>\n<h2>Un c\u00e2ble USB<\/h2>\n<p>On se m\u00e9fie souvent des cl\u00e9s USB que l\u2019on connecte \u00e0 son ordinateur mais saviez-vous que des c\u00e2bles USB peuvent \u00eatre corrompus ? Redoublez donc d\u2019attention la prochaine fois que vous utiliserez un objet USB re\u00e7u en cadeau sur un \u00e9v\u00e9nement ou pr\u00eat\u00e9 par quelqu\u2019un.<\/p>\n<p>&nbsp;<\/p>\n<h2>Un thermom\u00e8tre d\u2019aquarium<\/h2>\n<p>Des hackers ont utilis\u00e9 <a href=\"https:\/\/money.cnn.com\/2017\/07\/19\/technology\/fish-tank-hack-darktrace\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">le thermom\u00e8tre connect\u00e9 de l\u2019aquarium d\u2019un casino nord-am\u00e9ricain<\/a> pour acc\u00e9der \u00e0 ses donn\u00e9es. La preuve encore une fois que la vuln\u00e9rabilit\u00e9 r\u00e9side souvent dans des \u00ab gadgets \u00bb non couverts par la politique de s\u00e9curit\u00e9 globale.<\/p>\n<p>&nbsp;<\/p>\n<h2>Un t\u00e9l\u00e9copieur<\/h2>\n<p>Vous pensiez que le t\u00e9l\u00e9copieur \u00e9tait d\u00e9pass\u00e9 ? D\u00e9trompez-vous, pr\u00e8s de <a href=\"https:\/\/www.undernews.fr\/hacking-hacktivisme\/check-point-revele-que-les-criminels-peuvent-cibler-les-telecopieurs-pour-prendre-le-controle-des-reseaux.html\" target=\"_blank\" rel=\"noopener noreferrer\">17 milliards de fax sont encore envoy\u00e9s chaque ann\u00e9e<\/a>, notamment dans le secteur de la sant\u00e9 qui traite une grande quantit\u00e9 de donn\u00e9es sensibles. Cette information n\u2019a pas \u00e9chapp\u00e9 aux hackers qui ciblent les vuln\u00e9rabilit\u00e9s de ces appareils pour infiltrer les r\u00e9seaux des entreprises. Vous vous pensez prot\u00e9g\u00e9s car vous \u00eates pass\u00e9s au tout imprimante ? V\u00e9rifiez que votre machine n\u2019int\u00e8gre pas une fonction t\u00e9l\u00e9copie\u2026<\/p>\n<p>&nbsp;<\/p>\n<p>Tous les objets connect\u00e9s pr\u00e9sents dans votre vie personnelle ou professionnelle repr\u00e9sentent donc une menace potentielle tant que leurs constructeurs n\u2019int\u00e9greront pas la s\u00e9curit\u00e9 d\u00e8s la phase de conception. Mais en plus de cette <a href=\"https:\/\/www.journaldunet.fr\/web-tech\/dictionnaire-de-l-iot\/1440698-security-by-design-une-approche-recommandee-pour-les-objets-connectes\/\" target=\"_blank\" rel=\"noopener noreferrer\">approche \u00ab <em>Security by design<\/em> \u00bb<\/a>, il est fondamental de maintenir ces objets dans des conditions op\u00e9rationnelles de s\u00e9curit\u00e9 tout au long de leur cycle de vie. Et <strong>donc d\u2019\u00e9duquer les utilisateurs \u00e0 une certaine hygi\u00e8ne num\u00e9rique<\/strong>. Mais \u00e7a, c\u2019est une autre histoire\u2026<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Que ce soit au domicile ou sur le lieu de travail, les hackers redoublent d\u2019ing\u00e9niosit\u00e9 pour infiltrer les r\u00e9seaux informatiques. Exploitant les failles d\u2019objets connect\u00e9s souvent vuln\u00e9rables, ils imaginent des cyberattaques aux points d\u2019entr\u00e9e pour le moins originaux. Tour d\u2019horizon des plus inattendus. &nbsp; Un&#8230;<\/p>\n","protected":false},"author":31,"featured_media":151867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4363],"business_size":[682,683,681],"industry":[],"help_mefind":[],"features":[],"type_security":[756,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1565,1530],"class_list":["post-151869","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-premiers-pas","business_size-eti","business_size-grande-entreprise","business_size-pme","type_security-postes-et-serveurs","type_security-reseaux","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield<\/title>\n<meta name=\"description\" content=\"Baby phone, c\u00e2ble USB\u2026 Les vuln\u00e9rabilit\u00e9s sont nombreuses, mais les hackers font souvent preuve de simplicit\u00e9 pour s\u2019introduire dans votre r\u00e9seau informatique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield\" \/>\n<meta property=\"og:description\" content=\"Baby phone, c\u00e2ble USB\u2026 Les vuln\u00e9rabilit\u00e9s sont nombreuses, mais les hackers font souvent preuve de simplicit\u00e9 pour s\u2019introduire dans votre r\u00e9seau informatique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-02T06:15:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-22T09:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"Top 6 des points d\u2019entr\u00e9e de cyberattaques les plus inattendus\",\"datePublished\":\"2019-09-02T06:15:14+00:00\",\"dateModified\":\"2023-06-22T09:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/\"},\"wordCount\":595,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1104531338-e1618484023567.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - premiers pas\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/\",\"name\":\"6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1104531338-e1618484023567.jpg\",\"datePublished\":\"2019-09-02T06:15:14+00:00\",\"dateModified\":\"2023-06-22T09:43:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"Baby phone, c\u00e2ble USB\u2026 Les vuln\u00e9rabilit\u00e9s sont nombreuses, mais les hackers font souvent preuve de simplicit\u00e9 pour s\u2019introduire dans votre r\u00e9seau informatique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1104531338-e1618484023567.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1104531338-e1618484023567.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/top-points-entree-cyberattaque-les-plus-inattendus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 6 des points d\u2019entr\u00e9e de cyberattaques les plus inattendus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield","description":"Baby phone, c\u00e2ble USB\u2026 Les vuln\u00e9rabilit\u00e9s sont nombreuses, mais les hackers font souvent preuve de simplicit\u00e9 pour s\u2019introduire dans votre r\u00e9seau informatique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/","og_locale":"fr_FR","og_type":"article","og_title":"6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield","og_description":"Baby phone, c\u00e2ble USB\u2026 Les vuln\u00e9rabilit\u00e9s sont nombreuses, mais les hackers font souvent preuve de simplicit\u00e9 pour s\u2019introduire dans votre r\u00e9seau informatique.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/","og_site_name":"Stormshield","article_published_time":"2019-09-02T06:15:14+00:00","article_modified_time":"2023-06-22T09:43:00+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"Top 6 des points d\u2019entr\u00e9e de cyberattaques les plus inattendus","datePublished":"2019-09-02T06:15:14+00:00","dateModified":"2023-06-22T09:43:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/"},"wordCount":595,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg","keywords":["La cybers\u00e9curit\u00e9 - premiers pas"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/","name":"6 points d\u2019entr\u00e9e inattendus pour des cyberattaques I Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg","datePublished":"2019-09-02T06:15:14+00:00","dateModified":"2023-06-22T09:43:00+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"Baby phone, c\u00e2ble USB\u2026 Les vuln\u00e9rabilit\u00e9s sont nombreuses, mais les hackers font souvent preuve de simplicit\u00e9 pour s\u2019introduire dans votre r\u00e9seau informatique.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1104531338-e1618484023567.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/top-points-entree-cyberattaque-les-plus-inattendus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Top 6 des points d\u2019entr\u00e9e de cyberattaques les plus inattendus"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/151869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=151869"}],"version-history":[{"count":7,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/151869\/revisions"}],"predecessor-version":[{"id":437952,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/151869\/revisions\/437952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/151867"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=151869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=151869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=151869"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=151869"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=151869"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=151869"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=151869"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=151869"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=151869"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=151869"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=151869"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=151869"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=151869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}