{"id":51,"date":"2024-07-08T19:01:08","date_gmt":"2024-07-08T17:01:08","guid":{"rendered":"http:\/\/192.168.7.45:8000\/index.php\/newsletter\/"},"modified":"2024-12-04T12:26:10","modified_gmt":"2024-12-04T11:26:10","slug":"newsletter","status":"publish","type":"page","link":"https:\/\/ayrilys.com\/index.php\/newsletter\/","title":{"rendered":"Newsletter"},"content":{"rendered":"<div class=\"tnp tnp-subscription \">\n<form method=\"post\" action=\"https:\/\/ayrilys.com\/?na=s\">\n<input type=\"hidden\" name=\"nlang\" value=\"\">\n<div class=\"tnp-field tnp-field-email\"><label for=\"tnp-1\">E-mail<\/label>\n<input class=\"tnp-email\" type=\"email\" name=\"ne\" id=\"tnp-1\" value=\"\" placeholder=\"\" required><\/div>\n<div class=\"tnp-field tnp-privacy-field\"><label><input type=\"checkbox\" name=\"ny\" required class=\"tnp-privacy\"> <a target=\"_blank\" href=\"https:\/\/ayrilys.com\/index.php\/mentions-legales-protection-des-donnees-personnelles-rgpd\/\">J&#039;accepte la politique de confidentialit\u00e9<\/a><\/label><\/div><div class=\"tnp-field tnp-field-button\" style=\"text-align: left\"><input class=\"tnp-submit\" type=\"submit\" value=\"S&#039;abonner\" style=\"\">\n<\/div>\n<\/form>\n<\/div>\n\n<p>\u00a0<\/p>\n\n<style>.kb-posts-id-51_d28d88-f8 .kb-post-list-item{display:grid;}<\/style><ul class=\"wp-block-kadence-posts kb-posts kadence-posts-list kb-posts-id-51_d28d88-f8 content-wrap grid-cols kb-posts-style-boxed grid-sm-col-2 grid-lg-col-3 item-image-style-above\"><li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1430 post type-post status-publish format-standard hentry category-securite-informatique\">\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/cat\/securite-informatique\/\" class=\"category-link-securite-informatique\" rel=\"tag\">S\u00e9curit\u00e9 informatique<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/ayrilys.com\/index.php\/update-windows-tuesday-avril-2025-124-failles-corrigees-dont-une-zero-day\/\" rel=\"bookmark\">Update Windows tuesday avril 2025 : 124 failles corrig\u00e9es dont une zero day<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t<span class=\"posted-by\"><span class=\"meta-label\">Par<\/span><span class=\"author vcard\"><span class=\"fn n\">admin<\/span><\/span><\/span>\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-04-10T11:21:25+02:00\">10 avril 2025<\/time><time class=\"updated\" datetime=\"2025-04-10T11:25:39+02:00\">10 avril 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Update WIndows tuesday avril 2025 : 124 failles corrig\u00e9es dont une zero day Ce mois-ci, Microsoft a combl\u00e9 124 vuln\u00e9rabilit\u00e9s dont 11 class\u00e9es critiques. Une faille zero day corrig\u00e9e est particuli\u00e8rement exploit\u00e9e par des groupes de cybercriminels. . La livraison de la mise \u00e0 jour mensuelle de s\u00e9curit\u00e9 de&nbsp;Microsoft&nbsp;est particuli\u00e8rement charg\u00e9e pour ce mois d&rsquo;avril&#8230;.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/update-windows-tuesday-avril-2025-124-failles-corrigees-dont-une-zero-day\/\" class=\"post-more-link\">\n\t\t\t\t\tLire la suite<span class=\"screen-reader-text\"> Update Windows tuesday avril 2025 : 124 failles corrig\u00e9es dont une zero day<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continuer<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1415 post type-post status-publish format-standard hentry category-securite-informatique\">\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/cat\/securite-informatique\/\" class=\"category-link-securite-informatique\" rel=\"tag\">S\u00e9curit\u00e9 informatique<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/ayrilys.com\/index.php\/pour-debuter-2025-microsoft-livre-un-patch-tuesday-record\/\" rel=\"bookmark\">Pour d\u00e9buter 2025, Microsoft livre un Patch Tuesday record<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t<span class=\"posted-by\"><span class=\"meta-label\">Par<\/span><span class=\"author vcard\"><span class=\"fn n\">admin<\/span><\/span><\/span>\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-01-16T08:24:32+01:00\">16 janvier 2025<\/time><time class=\"updated\" datetime=\"2025-08-27T11:22:48+02:00\">27 ao\u00fbt 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Pour d\u00e9buter 2025, Microsoft livre un Patch Tuesday record Microsoft a publi\u00e9 une premi\u00e8re salve impressionnante de patchs de s\u00e9curit\u00e9 pour ce d\u00e9but d&rsquo;ann\u00e9e 2025, corrigeant notamment trois zero day actuellement exploit\u00e9s affectant un composant du noyau NT de Windows Hyper-V . La premi\u00e8re livraison de correctifs de l&rsquo;ann\u00e9e est cons\u00e9quente pour Microsoft. Excellente m\u00eame&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/pour-debuter-2025-microsoft-livre-un-patch-tuesday-record\/\" class=\"post-more-link\">\n\t\t\t\t\tLire la suite<span class=\"screen-reader-text\"> Pour d\u00e9buter 2025, Microsoft livre un Patch Tuesday record<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continuer<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1413 post type-post status-publish format-standard has-post-thumbnail hentry category-securite-informatique\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/ayrilys.com\/index.php\/un-piratage-a-lessec-entraine-le-vol-de-donnees-de-120-000-personnes\/\" aria-label=\"Un piratage \u00e0 l&rsquo;Essec entra\u00eene le vol de donn\u00e9es de 120 000 personnes\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"460\" src=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Un piratage \u00e0 l&rsquo;Essec entra\u00eene le vol de donn\u00e9es de 120 000 personnes\" srcset=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094.jpg 626w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/PC-Lent-caucasian-man-glasses-using-laptop-computer_488220-40094-300x220.jpg 300w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/cat\/securite-informatique\/\" class=\"category-link-securite-informatique\" rel=\"tag\">S\u00e9curit\u00e9 informatique<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/ayrilys.com\/index.php\/un-piratage-a-lessec-entraine-le-vol-de-donnees-de-120-000-personnes\/\" rel=\"bookmark\">Un piratage \u00e0 l&rsquo;Essec entra\u00eene le vol de donn\u00e9es de 120 000 personnes<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t<span class=\"posted-by\"><span class=\"meta-label\">Par<\/span><span class=\"author vcard\"><span class=\"fn n\">admin<\/span><\/span><\/span>\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-01-16T08:18:01+01:00\">16 janvier 2025<\/time><time class=\"updated\" datetime=\"2025-01-16T08:18:07+01:00\">16 janvier 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Un piratage \u00e0 l&rsquo;Essec entra\u00eene le vol de donn\u00e9es de 120 000 personnes L&rsquo;\u00e9cole de commerce, Essec School Business, a lanc\u00e9 une alerte sur un incident de cybers\u00e9curit\u00e9 entra\u00eenant une fuite de donn\u00e9es. 120 000 personnes sont concern\u00e9es selon l&rsquo;\u00e9tablissement. Apr\u00e8s les h\u00f4pitaux et les collectivit\u00e9s territoriales, l\u2019\u00e9ducation est aussi un terrain de jeu des&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/un-piratage-a-lessec-entraine-le-vol-de-donnees-de-120-000-personnes\/\" class=\"post-more-link\">\n\t\t\t\t\tLire la suite<span class=\"screen-reader-text\"> Un piratage \u00e0 l&rsquo;Essec entra\u00eene le vol de donn\u00e9es de 120 000 personnes<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continuer<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1410 post type-post status-publish format-standard has-post-thumbnail hentry category-accueil\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/ayrilys.com\/index.php\/elon-musk-contre-lunion-europeenne-qui-va-doit-gagner-selon-le-digital-services-act\/\" aria-label=\"Elon Musk contre l&rsquo;Union europ\u00e9enne : qui va (doit) gagner selon le Digital Services Act ?\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"431\" src=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/lumen-orbit-revolutionner-les-data-centers-spatiaux-768x431.jpeg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Elon Musk contre l&rsquo;Union europ\u00e9enne : qui va (doit) gagner selon le Digital Services Act ?\" srcset=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/lumen-orbit-revolutionner-les-data-centers-spatiaux-768x431.jpeg 768w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/lumen-orbit-revolutionner-les-data-centers-spatiaux-300x168.jpeg 300w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/lumen-orbit-revolutionner-les-data-centers-spatiaux-1024x574.jpeg 1024w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/lumen-orbit-revolutionner-les-data-centers-spatiaux.jpeg 1312w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/cat\/accueil\/\" class=\"category-link-accueil\" rel=\"tag\">Accueil<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/ayrilys.com\/index.php\/elon-musk-contre-lunion-europeenne-qui-va-doit-gagner-selon-le-digital-services-act\/\" rel=\"bookmark\">Elon Musk contre l&rsquo;Union europ\u00e9enne : qui va (doit) gagner selon le Digital Services Act ?<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t<span class=\"posted-by\"><span class=\"meta-label\">Par<\/span><span class=\"author vcard\"><span class=\"fn n\">admin<\/span><\/span><\/span>\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-01-10T19:33:42+01:00\">10 janvier 2025<\/time><time class=\"updated\" datetime=\"2025-01-10T19:40:33+01:00\">10 janvier 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Elon Musk contre l&rsquo;Union europ\u00e9enne : qui va (doit) gagner selon le Digital Services Act ? R\u00e9sum\u00e9 de l&rsquo;article : L&rsquo;article souligne que les institutions europ\u00e9ennes n&rsquo;avaient pas anticip\u00e9 que les attaques contre le DSA (Digital Services Act) viendraient d&rsquo;Elon Musk, r\u00e9cemment nomm\u00e9 \u00e0 un poste officiel au sein du gouvernement am\u00e9ricain. Ursula von der&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/elon-musk-contre-lunion-europeenne-qui-va-doit-gagner-selon-le-digital-services-act\/\" class=\"post-more-link\">\n\t\t\t\t\tLire la suite<span class=\"screen-reader-text\"> Elon Musk contre l&rsquo;Union europ\u00e9enne : qui va (doit) gagner selon le Digital Services Act ?<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continuer<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1408 post type-post status-publish format-standard has-post-thumbnail hentry category-securite-informatique\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-touchant-les-vpn-ivanti-deja-exploitee\/\" aria-label=\"Une faille critique touchant les VPN Ivanti d\u00e9j\u00e0 exploit\u00e9e\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"1316\" src=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/vpn-secure-connection-concept_1313853-63401.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Une faille critique touchant les VPN Ivanti d\u00e9j\u00e0 exploit\u00e9e\" srcset=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/vpn-secure-connection-concept_1313853-63401.jpg 740w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/vpn-secure-connection-concept_1313853-63401-169x300.jpg 169w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/09\/vpn-secure-connection-concept_1313853-63401-576x1024.jpg 576w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/cat\/securite-informatique\/\" class=\"category-link-securite-informatique\" rel=\"tag\">S\u00e9curit\u00e9 informatique<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-touchant-les-vpn-ivanti-deja-exploitee\/\" rel=\"bookmark\">Une faille critique touchant les VPN Ivanti d\u00e9j\u00e0 exploit\u00e9e<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t<span class=\"posted-by\"><span class=\"meta-label\">Par<\/span><span class=\"author vcard\"><span class=\"fn n\">admin<\/span><\/span><\/span>\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-01-10T19:08:52+01:00\">10 janvier 2025<\/time><time class=\"updated\" datetime=\"2025-01-10T19:12:14+01:00\">10 janvier 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Lucian Constantin, IDG NS (adapt\u00e9 par Jean Elyan)&nbsp;,&nbsp;publi\u00e9 le 09 Janvier 2025 Une faille critique touchant les VPN Ivanti d\u00e9j\u00e0 exploit\u00e9e Lucian Constantin, IDG NS (adapt\u00e9 par Jean Elyan)&nbsp;,&nbsp;publi\u00e9 le 09 Janvier 2025 R\u00e9sum\u00e9 de l&rsquo;article : Ivanti a r\u00e9cemment mis en garde contre l&rsquo;exploitation d&rsquo;une faille critique dans son appliance VPN SSL, Connect Secure&#8230;.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/une-faille-critique-touchant-les-vpn-ivanti-deja-exploitee\/\" class=\"post-more-link\">\n\t\t\t\t\tLire la suite<span class=\"screen-reader-text\"> Une faille critique touchant les VPN Ivanti d\u00e9j\u00e0 exploit\u00e9e<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continuer<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-1371 post type-post status-publish format-standard has-post-thumbnail hentry category-securite-informatique\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/ayrilys.com\/index.php\/des-extensions-chrome-compromises\/\" aria-label=\"Des extensions Chrome compromises\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Chrome-macbook-5032167_1280-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Des extensions Chrome compromises\" srcset=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Chrome-macbook-5032167_1280-768x512.jpg 768w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Chrome-macbook-5032167_1280-300x200.jpg 300w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Chrome-macbook-5032167_1280-1024x682.jpg 1024w, https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/Chrome-macbook-5032167_1280.jpg 1280w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/cat\/securite-informatique\/\" class=\"category-link-securite-informatique\" rel=\"tag\">S\u00e9curit\u00e9 informatique<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/ayrilys.com\/index.php\/des-extensions-chrome-compromises\/\" rel=\"bookmark\">Des extensions Chrome compromises<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t<span class=\"posted-by\"><span class=\"meta-label\">Par<\/span><span class=\"author vcard\"><span class=\"fn n\">admin<\/span><\/span><\/span>\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-01-02T13:10:13+01:00\">2 janvier 2025<\/time><time class=\"updated\" datetime=\"2025-01-02T13:10:19+01:00\">2 janvier 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Des extensions Chrome compromises Plus d\u2019une quinzaine d\u2019extensions notamment sur des services d\u2019IA (ChatGPT et Gemini pour Chrome, WayIn AI, TinaMind,\u2026) pour le navigateur de Google ont \u00e9t\u00e9 attaqu\u00e9es. Les \u00e9diteurs ont subi une campagne de phishing pour obtenir des acc\u00e8s. Les cybercriminels ont ensuite inject\u00e9 un code malveillant dans les extensions pour d\u00e9rober des&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/ayrilys.com\/index.php\/des-extensions-chrome-compromises\/\" class=\"post-more-link\">\n\t\t\t\t\tLire la suite<span class=\"screen-reader-text\"> Des extensions Chrome compromises<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continuer<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<\/ul>\n\n<div class=\"tnp tnp-subscription \">\n<form method=\"post\" action=\"https:\/\/ayrilys.com\/?na=s\">\n<input type=\"hidden\" name=\"nlang\" value=\"\">\n<div class=\"tnp-field tnp-field-email\"><label for=\"tnp-3\">E-mail<\/label>\n<input class=\"tnp-email\" type=\"email\" name=\"ne\" id=\"tnp-3\" value=\"\" placeholder=\"\" required><\/div>\n<div class=\"tnp-field tnp-privacy-field\"><label><input type=\"checkbox\" name=\"ny\" required class=\"tnp-privacy\"> <a target=\"_blank\" href=\"https:\/\/ayrilys.com\/index.php\/mentions-legales-protection-des-donnees-personnelles-rgpd\/\">J&#039;accepte la politique de confidentialit\u00e9<\/a><\/label><\/div><div class=\"tnp-field tnp-field-button\" style=\"text-align: left\"><input class=\"tnp-submit\" type=\"submit\" value=\"S&#039;abonner\" style=\"\">\n<\/div>\n<\/form>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-51","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Infog\u00e9rance PME : Les derni\u00e8res tendances en mati\u00e8re de newsletter<\/title>\r\n<meta name=\"description\" content=\"Restez inform\u00e9 des derni\u00e8res actualit\u00e9s de l&#039;infog\u00e9rance pour les PME gr\u00e2ce \u00e0 notre newsletter.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/newsletter\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Newsletter\" \/>\r\n<meta property=\"og:description\" content=\"Restez inform\u00e9 des derni\u00e8res actualit\u00e9s de l&#039;infog\u00e9rance pour les PME gr\u00e2ce \u00e0 notre newsletter.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/newsletter\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-12-04T11:26:10+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilysentete.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"988\" \/>\r\n\t<meta property=\"og:image:height\" content=\"222\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/newsletter\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/newsletter\/\",\"name\":\"Infog\u00e9rance PME : Les derni\u00e8res tendances en mati\u00e8re de newsletter\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"datePublished\":\"2024-07-08T17:01:08+00:00\",\"dateModified\":\"2024-12-04T11:26:10+00:00\",\"description\":\"Restez inform\u00e9 des derni\u00e8res actualit\u00e9s de l'infog\u00e9rance pour les PME gr\u00e2ce \u00e0 notre newsletter.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/newsletter\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/newsletter\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/newsletter\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Newsletter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infog\u00e9rance PME : Les derni\u00e8res tendances en mati\u00e8re de newsletter","description":"Restez inform\u00e9 des derni\u00e8res actualit\u00e9s de l'infog\u00e9rance pour les PME gr\u00e2ce \u00e0 notre newsletter.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/newsletter\/","og_locale":"fr_FR","og_type":"article","og_title":"Newsletter","og_description":"Restez inform\u00e9 des derni\u00e8res actualit\u00e9s de l'infog\u00e9rance pour les PME gr\u00e2ce \u00e0 notre newsletter.","og_url":"https:\/\/ayrilys.com\/index.php\/newsletter\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_modified_time":"2024-12-04T11:26:10+00:00","og_image":[{"width":988,"height":222,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilysentete.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Ayrilys165097","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/newsletter\/","url":"https:\/\/ayrilys.com\/index.php\/newsletter\/","name":"Infog\u00e9rance PME : Les derni\u00e8res tendances en mati\u00e8re de newsletter","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"datePublished":"2024-07-08T17:01:08+00:00","dateModified":"2024-12-04T11:26:10+00:00","description":"Restez inform\u00e9 des derni\u00e8res actualit\u00e9s de l'infog\u00e9rance pour les PME gr\u00e2ce \u00e0 notre newsletter.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/newsletter\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/newsletter\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/newsletter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Newsletter"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}}]}},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/pages\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":5,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/pages\/51\/revisions"}],"predecessor-version":[{"id":999,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/pages\/51\/revisions\/999"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}