{"id":1264,"date":"2024-11-08T15:21:55","date_gmt":"2024-11-08T14:21:55","guid":{"rendered":"https:\/\/ayrilys.com\/?p=1264"},"modified":"2024-11-08T15:21:59","modified_gmt":"2024-11-08T14:21:59","slug":"lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/","title":{"rendered":"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong>L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day<\/strong><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>R\u00e9sum\u00e9 de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p>Les failles zero-day sont des vuln\u00e9rabilit\u00e9s non d\u00e9couvertes par les \u00e9diteurs de logiciels, offrant aux attaquants une opportunit\u00e9 avant que des correctifs ne soient d\u00e9ploy\u00e9s. L\u2019IA, notamment via les grands mod\u00e8les de langage (LLM), pourrait aider \u00e0 les d\u00e9tecter avant les cyberattaquants.<\/p>\n\n\n\n<p>L\u2019\u00e9quipe Big Sleep de Google, en collaboration avec Google DeepMind, a d\u00e9montr\u00e9 le potentiel de l\u2019IA en d\u00e9couvrant une vuln\u00e9rabilit\u00e9 in\u00e9dite dans SQLite. Leur agent IA, issu du projet Naptime, a identifi\u00e9 une faille de s\u00e9curit\u00e9 avant la sortie officielle du code affect\u00e9, \u00e9vitant ainsi tout impact sur les utilisateurs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-methodologie-et-approche-de-l-ia\">M\u00e9thodologie et approche de l\u2019IA<\/h3>\n\n\n\n<p>L\u2019agent Big Sleep utilise des LLM pour analyser le code source et identifier des patterns de vuln\u00e9rabilit\u00e9s, se concentrant sur l\u2019analyse de variantes de vuln\u00e9rabilit\u00e9s connues. Cette m\u00e9thode est plus efficace que le fuzzing traditionnel, qui injecte des donn\u00e9es al\u00e9atoires pour provoquer des erreurs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-impact-et-perspectives\">Impact et perspectives<\/h3>\n\n\n\n<p>L\u2019IA pourrait r\u00e9volutionner la lutte contre les failles zero-day en les identifiant avant la sortie du code, donnant ainsi une longueur d\u2019avance aux d\u00e9fenseurs. Cependant, il est crucial que cette IA soit utilis\u00e9e par des \u201cgood guys\u201d pour \u00e9viter qu\u2019elle ne soit exploit\u00e9e par des cyberattaquants.<\/p>\n\n\n\n<p>Bien que Big Sleep soit encore exp\u00e9rimental, il ouvre la voie \u00e0 une utilisation accrue de l\u2019IA pour renforcer la s\u00e9curit\u00e9 logicielle, un besoin croissant face \u00e0 la multiplication des failles logicielles.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>D\u00e9tail de l&rsquo;article :<\/strong><\/p>\n\n\n\n<p><strong><em>Les failles zero-day repr\u00e9sentent l\u2019un des d\u00e9fis les plus redoutables en mati\u00e8re de cybers\u00e9curit\u00e9. Ces vuln\u00e9rabilit\u00e9s inconnues des \u00e9diteurs et donc sans correctifs, offrent aux attaquants une opportunit\u00e9 pour infiltrer des syst\u00e8mes avant que des patchs et mesures d\u00e9fensives ne soient d\u00e9ploy\u00e9s. Et si l\u2019IA pouvait aider les d\u00e9veloppeurs \u00e0 les rep\u00e9rer avant que les cyberattaquants ne s\u2019en emparent&nbsp;?<\/em><\/strong><\/p>\n\n\n\n<p>On le sait, l\u2019IA, via les mod\u00e8les LLM, se r\u00e9v\u00e8le de plus en plus utile pour coder et pour assister les d\u00e9veloppeurs non seulement dans l\u2019\u00e9criture des lignes de code, mais aussi pour d\u00e9busquer des bugs potentiels.<\/p>\n\n\n\n<p>Et si l\u2019IA pouvait aussi \u00eatre entra\u00een\u00e9e et utilis\u00e9e pour d\u00e9tecter automatiquement des failles \u00ab Zero Day \u00bb dans les codes existants ? C\u2019est \u00e0 cette question que l\u2019\u00e9quipe Big Sleep de Google, en collaboration avec Google DeepMind, a voulu r\u00e9pondre. Elle vient,&nbsp;<a href=\"https:\/\/googleprojectzero.blogspot.com\/2024\/10\/from-naptime-to-big-sleep.html\" target=\"_blank\" rel=\"noreferrer noopener\">dans un rapport scientifique<\/a>, de d\u00e9montrer tout le potentiel de l\u2019IA en la mati\u00e8re en d\u00e9couvrant une vuln\u00e9rabilit\u00e9 in\u00e9dite dans SQLite, une base de donn\u00e9es open source largement utilis\u00e9e.<\/p>\n\n\n\n<p>Issue de l\u2019\u00e9volution du projet Naptime, l\u2019\u00e9quipe Big Sleep a en effet d\u00e9velopp\u00e9 un agent IA capable d\u2019assister les chercheurs en s\u00e9curit\u00e9 dans la d\u00e9tection de vuln\u00e9rabilit\u00e9s. En octobre dernier, cet agent a identifi\u00e9 une faille de s\u00e9curit\u00e9 exploitable dans SQLite, concernant un sous-d\u00e9passement de tampon sur la pile. Cette d\u00e9couverte est d\u2019autant plus remarquable qu\u2019elle a \u00e9t\u00e9 faite avant la sortie officielle du code affect\u00e9, \u00e9vitant ainsi tout impact sur les utilisateurs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>M\u00e9thodologie et approche de l\u2019IA<\/strong><\/h2>\n\n\n\n<p>La r\u00e9ussite de l\u2019agent Big Sleep repose sur l\u2019utilisation de grands mod\u00e8les de langage (LLM) pour analyser le code source et identifier des patterns susceptibles de contenir des vuln\u00e9rabilit\u00e9s. Plut\u00f4t que de chercher des failles de mani\u00e8re al\u00e9atoire, l\u2019agent se concentre sur l\u2019analyse de variantes de vuln\u00e9rabilit\u00e9s d\u00e9j\u00e0 connues, une m\u00e9thode appel\u00e9e \u00ab&nbsp;analyse de variantes&nbsp;\u00bb. En fournissant des informations sur des correctifs r\u00e9cents ou des changements dans le code, l\u2019agent peut cibler des zones susceptibles de contenir des failles similaires non encore corrig\u00e9es.<\/p>\n\n\n\n<p>Cette approche se r\u00e9v\u00e8le tr\u00e8s efficace pour d\u00e9tecter des vuln\u00e9rabilit\u00e9s que les techniques traditionnelles, comme le fuzzing, ne parviennent pas toujours \u00e0 identifier. Pour rappel, le fuzzing consiste \u00e0 injecter des donn\u00e9es al\u00e9atoires pour provoquer des erreurs. Le probl\u00e8me de cette approche, c\u2019est qu\u2019elle manque de subtilit\u00e9 et laisse ainsi passer bien des vuln\u00e9rabilit\u00e9s. L\u2019IA, en revanche, peut analyser le code avec une compr\u00e9hension contextuelle approfondie, rep\u00e9rant ainsi des vuln\u00e9rabilit\u00e9s difficiles \u00e0 d\u00e9tecter par des moyens conventionnels.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Impact et perspectives<\/strong><\/h2>\n\n\n\n<p>Dit autrement, l\u2019IA est en passe de changer la donne dans la lutte contre les vuln\u00e9rabilit\u00e9s des logiciels et les failles zero-day. En les identifiant avant m\u00eame la sortie du code, les d\u00e9fenseurs prennent une longueur d\u2019avance sur les attaquants, inversant ainsi la dynamique habituelle. En admettant, bien \u00e9videmment, que cette IA soit utilis\u00e9e en amont de tout d\u00e9ploiement et par des \u00ab good guys \u00bb, car elle pourrait aussi permettre aux cyberattaquants d\u2019analyser tous les codes open source actuels pour y d\u00e9nicher des failles Zero Day. Peu de chance, d\u00e8s lors, que Big Sleep soit mis \u00e0 la port\u00e9e de tous dans un proche avenir.<\/p>\n\n\n\n<p>Bien s\u00fbr, Big Sleep n\u2019est pour l\u2019instant qu\u2019un projet exp\u00e9rimental. Mais il ouvre la voie \u00e0 une utilisation accrue de l\u2019IA pour renforcer la s\u00e9curit\u00e9 logicielle \u00e0 l\u2019heure o\u00f9 les RSSI et DSI affichent un ras-le-bol face \u00e0 la croissance exponentielle des failles logicielles qui rend la gestion des patchs de plus en plus ing\u00e9rable au quotidien et multiplie les voies d\u2019entr\u00e9e dans les SI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day R\u00e9sum\u00e9 de l&rsquo;article : Les failles zero-day sont des vuln\u00e9rabilit\u00e9s non d\u00e9couvertes par les \u00e9diteurs de logiciels, offrant aux attaquants une opportunit\u00e9 avant que des correctifs ne soient d\u00e9ploy\u00e9s. L\u2019IA, notamment via les grands mod\u00e8les de langage (LLM), pourrait aider \u00e0 les d\u00e9tecter avant les&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1265,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJpbWciOiJodHRwczpcL1wvYXlyaWx5cy5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjRcLzExXC9JQS1aZXJvLWRheS5qcGciLCJ0eHQiOiJMXHUyMDE5SUEgZGUgR29vZ2xlIEJpZyBTbGVlcCBkXHUwMGU5Y291dnJlIHNldWxlIHVuZSBmYWlsbGUgWmVyby1EYXkiLCJ0ZW1wbGF0ZSI6ImhpZ2h3YXkiLCJibG9nX2lkIjoyMzUzMzUwMjN9.lVu3PZ8IRysuaILuQQYM8C7Cx6bvkxtfGbOgFIb7mSQMQ"},"version":2,"attached_media":[{"id":1265,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","type":"image\/jpeg"}]}},"categories":[22],"tags":[],"class_list":["post-1264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Cybers\u00e9curit\u00e9 Z\u00e9ro day : l&#039;IA de Google Big Sleep d\u00e9couvre une vuln\u00e9rabilit\u00e9 in\u00e9dite Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez comment l&#039;IA de Google Big Sleep d\u00e9tecte une faille de s\u00e9curit\u00e9 Zero-Day avant les attaquants. La cybers\u00e9curit\u00e9 \u00e9volue gr\u00e2ce aux grandes mod\u00e8les de langage.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day\" \/>\r\n<meta property=\"og:description\" content=\"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-11-08T14:21:55+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-11-08T14:21:59+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\r\n\t<meta property=\"og:image:height\" content=\"408\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day\",\"datePublished\":\"2024-11-08T14:21:55+00:00\",\"dateModified\":\"2024-11-08T14:21:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\"},\"wordCount\":973,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\",\"name\":\"Cybers\u00e9curit\u00e9 Z\u00e9ro day : l'IA de Google Big Sleep d\u00e9couvre une vuln\u00e9rabilit\u00e9 in\u00e9dite Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg\",\"datePublished\":\"2024-11-08T14:21:55+00:00\",\"dateModified\":\"2024-11-08T14:21:59+00:00\",\"description\":\"D\u00e9couvrez comment l'IA de Google Big Sleep d\u00e9tecte une faille de s\u00e9curit\u00e9 Zero-Day avant les attaquants. La cybers\u00e9curit\u00e9 \u00e9volue gr\u00e2ce aux grandes mod\u00e8les de langage.\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg\",\"width\":1024,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 Z\u00e9ro day : l'IA de Google Big Sleep d\u00e9couvre une vuln\u00e9rabilit\u00e9 in\u00e9dite Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"D\u00e9couvrez comment l'IA de Google Big Sleep d\u00e9tecte une faille de s\u00e9curit\u00e9 Zero-Day avant les attaquants. La cybers\u00e9curit\u00e9 \u00e9volue gr\u00e2ce aux grandes mod\u00e8les de langage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/","og_locale":"fr_FR","og_type":"article","og_title":"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day","og_description":"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-11-08T14:21:55+00:00","article_modified_time":"2024-11-08T14:21:59+00:00","og_image":[{"width":1024,"height":408,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day","datePublished":"2024-11-08T14:21:55+00:00","dateModified":"2024-11-08T14:21:59+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/"},"wordCount":973,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","articleSection":["S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/","url":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/","name":"Cybers\u00e9curit\u00e9 Z\u00e9ro day : l'IA de Google Big Sleep d\u00e9couvre une vuln\u00e9rabilit\u00e9 in\u00e9dite Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","datePublished":"2024-11-08T14:21:55+00:00","dateModified":"2024-11-08T14:21:59+00:00","description":"D\u00e9couvrez comment l'IA de Google Big Sleep d\u00e9tecte une faille de s\u00e9curit\u00e9 Zero-Day avant les attaquants. La cybers\u00e9curit\u00e9 \u00e9volue gr\u00e2ce aux grandes mod\u00e8les de langage.","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#primaryimage","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","width":1024,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/lia-de-google-big-sleep-decouvre-seule-une-faille-zero-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"L\u2019IA de Google Big Sleep d\u00e9couvre seule une faille Zero-Day"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/11\/IA-Zero-day.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=1264"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1264\/revisions"}],"predecessor-version":[{"id":1266,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1264\/revisions\/1266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media\/1265"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=1264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=1264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=1264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}