{"id":14793,"date":"2020-12-16T09:00:58","date_gmt":"2020-12-16T08:00:58","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=14793"},"modified":"2021-07-12T09:53:41","modified_gmt":"2021-07-12T08:53:41","slug":"cert-w-newsletter-novembre-2020","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/12\/cert-w-newsletter-novembre-2020\/","title":{"rendered":"CERT-W Newsletter Novembre 2020"},"content":{"rendered":"<figure id=\"post-14795 media-14795\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14795\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/12\/novembre.png\" alt=\"\" width=\"1278\" height=\"402\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/12\/novembre.png 1278w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/12\/novembre-437x137.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/12\/novembre-71x22.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/12\/novembre-768x242.png 768w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><\/figure>\n<table style=\"width: 0%; height: 294px;\">\n<tbody>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;\" colspan=\"2\">\n<h1><strong>Indicateurs du mois<\/strong><\/h1>\n<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;\"><strong>TOP ATTACK<\/strong><\/td>\n<td style=\"width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/www.zdnet.com\/article\/brazilian-government-recovers-from-worst-ever-cyberattack\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>LE GOUVERNEMENT BRESILIEN SE REMET DE LEUR &#8220;PIRE&#8221; ATTAQUE<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 100%; height: 10px; border-color: #ffffff; text-align: left;\" colspan=\"2\">Apr\u00e8s avoir \u00e9t\u00e9 touch\u00e9, le 3 novembre, par la plus s\u00e9v\u00e8re de toutes les attaques orchestr\u00e9es contre une institution publique br\u00e9silienne, le Tribunal Supreme de Justice (STJ en portugais) a enfin r\u00e9ussi \u00e0 remettre ses syst\u00e8mes en \u00e9tat de marche. La Cour avait d\u00fb suspendre toutes ces sessions pendant quelques jours et ensuite fonctionner de mani\u00e8re limit\u00e9e jusqu\u2019au 20 novembre. Le logiciel de ran\u00e7on aurait repos\u00e9 sur une vuln\u00e9rabilit\u00e9 d\u00e9couverte lors d&#8217;un <a style=\"font-family: inherit; font-size: inherit;\" href=\"https:\/\/www.theregister.com\/2020\/11\/09\/tianfu_cup\/\">comp\u00e9tition cybers\u00e9curit\u00e9 chinois<\/a><span style=\"font-family: inherit; font-size: inherit;\">e r\u00e9alis\u00e9 avec le concours d\u2019\u00e9diteurs logiciels.<\/span><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;\"><strong>TOP RANSOM<\/strong><\/td>\n<td style=\"width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/www.lemagit.fr\/actualites\/252492731\/Ransomware-le-groupe-Egregor-revendique-la-cyberattaque-sur-Ouest-France\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #21a6a6; text-decoration: underline;\">EGREGOR REVENDIQUE LE RANSOMWARE SUR OUEST-FRANCE<\/span><\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"height: 10px; width: 100%; border-color: #ffffff; text-align: left;\" colspan=\"2\">Le groupe SIPA-Ouest France, avec sa filiale Publihebdos, a \u00e9t\u00e9 frapp\u00e9 par un <a style=\"font-family: inherit; font-size: inherit;\" href=\"https:\/\/whatis.techtarget.com\/fr\/definition\/Rancongiciel\">ransomware<\/a><span style=\"font-family: inherit; font-size: inherit;\">, dans la nuit du 20 au 21\u00a0novembre. Le groupe aux commandes du ransomware Egregor vient de revendiquer l\u2019op\u00e9ration, diffusant au passage une premi\u00e8re archive de 90\u00a0Mo.<\/span><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;\"><span style=\"color: #333333;\"><strong>TOP EXPLOIT<\/strong><\/span><\/td>\n<td style=\"width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;\"><a href=\"https:\/\/threatpost.com\/gitpaste-12-worm-linux-servers-iot-devices\/161016\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>LE VER GITPASTE-12 VISE LES SERVEURS LINUX ET DISPOSITIF IOT<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"width: 100%; border-color: #ffffff; height: 37px; text-align: left;\" colspan=\"2\">Des chercheurs en s\u00e9curit\u00e9 ont d\u00e9couvert un nouveau ver et botnet appel\u00e9 Gitpaste-12, nomm\u00e9 ainsi en raison de son utilisation de GitHub et Pastebin pour h\u00e9berger ses scripts malveillants et des 12 vuln\u00e9rabilit\u00e9s connues qu&#8217;il exploite pour compromettre les syst\u00e8mes.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;\"><strong>TOP LEAK<\/strong><\/td>\n<td style=\"width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;\"><a href=\"https:\/\/threatpost.com\/millions-hotel-guests-worldwide-data-leak\/161044\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>IMPORTANTE FUITE DE DONNEES DANS LE MILIEU DE L&#8217;HOTELERIE<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"width: 100%; border-color: #ffffff; height: 35px; text-align: left;\" colspan=\"2\">Plusieurs plateformes de r\u00e9servation d&#8217;h\u00f4tel largement utilis\u00e9e (dont Booking.com et Expedia) ont expos\u00e9 10 millions de fichiers relatifs aux clients de divers h\u00f4tels dans le monde. Pour cause : un bucket S3 d&#8217;Amazon Web Services mal configur\u00e9. L&#8217;incident a affect\u00e9 24,4 Go de donn\u00e9es, exposant les voyageurs au vol d&#8217;identit\u00e9, \u00e0 l\u2019escroquerie et \u00e0 la fraude \u00e0 la carte de cr\u00e9dit, selon l&#8217;\u00e9quipe de s\u00e9curit\u00e9 de Website Planet, qui a d\u00e9couvert le bucket.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%; height: 212px;\">\n<tbody>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 1.41643%; height: 89px; text-align: left; border: 0px solid #21a6a6;\" colspan=\"2\">\n<h1><strong>Veille sur la cybercriminalit\u00e9<\/strong><\/h1>\n<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 1.41643%; height: 23px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/krebsonsecurity.com\/2020\/11\/two-charged-in-sim-swapping-vishing-scams\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>DEUX AMERICAINS ACCUSES DE SIM SWAPPING ET VISHING SCAMS<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 1.41643%; height: 23px; border-color: #ffffff; text-align: left;\" colspan=\"2\">Deux jeunes am\u00e9ricains ont \u00e9t\u00e9 accus\u00e9s d&#8217;usurpation d&#8217;identit\u00e9 et de complot pour avoir pr\u00e9tendument vol\u00e9 des comptes de bitcoin et de r\u00e9seaux sociaux en incitant par la ruse des employ\u00e9s de soci\u00e9t\u00e9s de t\u00e9l\u00e9phonie mobile \u00e0 donner les justificatifs d&#8217;identit\u00e9 n\u00e9cessaires pour acc\u00e9der \u00e0 distance aux informations sur les comptes des clients et les modifier.<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 1.41643%; height: 23px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-le-ransomware-newregret-chiffre-les-machines-virtuelles-windows-80938.html\"><span style=\"text-decoration: underline;\"><strong><span style=\"color: #21a6a6; text-decoration: underline;\">LE RANCONGICIEL NEWREGRET S&#8217;ATTAQUE AUX MACHINES VIRTUELLES WINDOWS<\/span><\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"height: 23px; width: 1.41643%; border-color: #ffffff; text-align: left;\" colspan=\"2\">Ce nouveau malware permet le chiffrement des disques virtuels qui ne sont habituellement pas chiffr\u00e9s par les ran\u00e7ongiciels car trop volumineux. Pour ce faire, le malware utilise 3 fonctions de l\u2019API Windows Virtual Storage afin de monter le disque et lancer le chiffrement des fichiers qu\u2019il contient.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 1.41643%; height: 21px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/threatpost.com\/ragnar-locker-ransomware-facebook-ads\/161133\/\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>NOUVELLE TECHNIQUE DU RANSOMWARE RAGNAR LOCKER : PRESSION PAR CAMPAGNE DE PUBLICITE FACEBOOK<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"border-color: #ffffff; height: 10px; text-align: left; width: 1.41643%;\" colspan=\"2\">Le groupe Ragnar Locker a d\u00e9cid\u00e9 d\u2019intensifier la pression sur sa derni\u00e8re victime en date, le conglom\u00e9rat italien Campari, en publiant sur Facebook des publicit\u00e9s mena\u00e7ant de rendre publiques les 2 To de donn\u00e9es sensibles vol\u00e9es lors de l\u2019attaque du 3 novembre, \u00e0 moins qu&#8217;une ran\u00e7on de 15 millions de dollars ne soit vers\u00e9e en Bitcoin.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 1.41643%; height: 21px; border: 4px solid #21a6a6; text-align: left;\" colspan=\"2\"><a href=\"https:\/\/www.zdnet.fr\/actualites\/microsoft-les-fabricants-de-vaccins-sont-vises-par-des-pirates-informatiques-39912965.htm\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>UNE VAGUE D&#8217;ATTAQUE DE TYPE RANSOMWARE CIBLANT L&#8217;INDUSTRIE PHARMACEUTIQUE ET HOPITAUX<\/strong><\/span><\/a><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"border-color: #ffffff; height: 10px; text-align: left; width: 1.41643%;\" colspan=\"2\">Microsoft affirme avoir d\u00e9tect\u00e9 trois op\u00e9rations de piratage informatique soutenues par des Etats (\u00e9galement d\u00e9sign\u00e9es par le terme d&#8217;APT ayant lanc\u00e9 des cyberattaques contre au moins sept soci\u00e9t\u00e9s impliqu\u00e9es dans la recherche et l\u2019\u00e9laboration des vaccins COVID-19. Ces attaques s&#8217;inscrivent dans une longue s\u00e9rie d&#8217;incidents qui ont vis\u00e9 des organismes de sant\u00e9 au cours de ces derniers mois. Pendant la crise sanitaire, les groupes de cybercriminels ont profit\u00e9 de la crise mondiale pour accro\u00eetre leur activit\u00e9, ciblant parfois les organisations qui \u00e9taient cens\u00e9es contribuer \u00e0 la lutte contre cette pand\u00e9mie comme le d\u00e9nonce ce bulletin d\u2019alerte publi\u00e9 conjointement par le FBI, le CISA et le HHS. Pour le consulter cliquer <a style=\"font-family: inherit; font-size: inherit;\" href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/AA20-302A_Ransomware%20_Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf\">ici<\/a><span style=\"font-family: inherit; font-size: inherit;\">.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 100%;\">\n<tbody>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;\" colspan=\"2\">\n<h1><strong>Veille sur les vuln\u00e9rabilit\u00e9s<\/strong><\/h1>\n<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17051\"><strong>CVE-2020-17051<\/strong><\/a><\/td>\n<td style=\"width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>VULN\u00c9RABILIT\u00c9 D&#8217;EXECUTION DE CODE A DISTANCE DANS LE SYSTEME DE GESTION DE FICHIERS EN RESEAU DE WINDOWS<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff;\">\n<td style=\"width: 100%; height: 23px; border-color: #ffffff; text-align: left;\" colspan=\"2\"><strong>CVSS score : 9.8 CRITICAL<\/strong><\/p>\n<p>Une vuln\u00e9rabilit\u00e9 critique dans le serveur Windows NFSv3 (Network File System). Elle peut \u00eatre reproduite pour provoquer un BSOD (Blue Screen of Death) imm\u00e9diat dans le nfssvr.sys driver.<\/td>\n<\/tr>\n<tr style=\"border-color: #ffffff; height: 48px;\">\n<td style=\"width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17087\"><strong>CVE-2020-17087<\/strong><\/a><\/td>\n<td style=\"width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;\"><span style=\"color: #21a6a6;\"><b><u>VULN\u00c9RABILIT\u00c9 D&#8217;ELEVATION DE PRIVILEGES AU NIVEAU LOCAL DU NOYAU WINDOWS<\/u><\/b><\/span><\/td>\n<\/tr>\n<tr style=\"height: 60px;\">\n<td style=\"height: 23px; width: 100%; border-color: #ffffff; text-align: left;\" colspan=\"2\"><strong>CVSS score : 7.8 HIGH<\/strong><\/p>\n<p>Cette \u00e9l\u00e9vation de privil\u00e8ges permet a un attaquant ayant d\u00e9j\u00e0 compromis un premier compte non privil\u00e9gi\u00e9, d\u2019obtenir les privil\u00e8ges administrateur.<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-3556\"><strong>CVE-2020-3556<\/strong><\/a><\/td>\n<td style=\"width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;\"><span style=\"text-decoration: underline; color: #21a6a6;\"><strong>CISCO ANYCONNECT VPN ZERO-DAY<\/strong><\/span><\/td>\n<\/tr>\n<tr style=\"height: 40px;\">\n<td style=\"width: 100%; border-color: #ffffff; height: 119px; text-align: left;\" colspan=\"2\"><strong>CVSS score : 7.3 HIGH<\/strong><\/p>\n<p>Une vuln\u00e9rabilit\u00e9 dans l\u2019interprocess communication canal (IPC) du Cisco AnyConnect Secure Mobility Client Software pourrait permettre \u00e0 un attaquant local authentifi\u00e9 d&#8217;amener un utilisateur AnyConnect cibl\u00e9 \u00e0 ex\u00e9cuter un script malveillant.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Indicateurs du mois TOP ATTACK LE GOUVERNEMENT BRESILIEN SE REMET DE LEUR &#8220;PIRE&#8221; ATTAQUE Apr\u00e8s avoir \u00e9t\u00e9 touch\u00e9, le 3 novembre, par la plus s\u00e9v\u00e8re de toutes les attaques orchestr\u00e9es contre une institution publique br\u00e9silienne, le Tribunal Supreme de Justice&#8230;<\/p>\n","protected":false},"author":1364,"featured_media":14577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3225],"tags":[3481,183,3320,506,3484,1203],"coauthors":[3488],"class_list":["post-14793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response","tag-cert-w","tag-cybercriminalite","tag-incident-response-cert-w","tag-indicateurs","tag-newsletter-2","tag-vulnerabilites"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CERT-W Newsletter Novembre 2020 - RiskInsight<\/title>\n<meta name=\"description\" content=\"La newsletter de novembre 2020 du CERT-W a \u00e9t\u00e9 publi\u00e9e pour vous permettre de trouver les derniers indicateurs et nouvelles de la cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CERT-W Newsletter Novembre 2020 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La newsletter de novembre 2020 du CERT-W a \u00e9t\u00e9 publi\u00e9e pour vous permettre de trouver les derniers indicateurs et nouvelles de la cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-16T08:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T08:53:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1641\" \/>\n\t<meta property=\"og:image:height\" content=\"1158\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CERT-W\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT-W\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\"},\"author\":{\"name\":\"CERT-W\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\"},\"headline\":\"CERT-W Newsletter Novembre 2020\",\"datePublished\":\"2020-12-16T08:00:58+00:00\",\"dateModified\":\"2021-07-12T08:53:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\"},\"wordCount\":817,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"keywords\":[\"CERT-W\",\"Cybercriminalit\u00e9\",\"incident response CERT-W\",\"indicateurs\",\"Newsletter\",\"vuln\u00e9rabilit\u00e9s\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\",\"name\":\"CERT-W Newsletter Novembre 2020 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-12-16T08:00:58+00:00\",\"dateModified\":\"2021-07-12T08:53:41+00:00\",\"description\":\"La newsletter de novembre 2020 du CERT-W a \u00e9t\u00e9 publi\u00e9e pour vous permettre de trouver les derniers indicateurs et nouvelles de la cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg\",\"width\":1641,\"height\":1158},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CERT-W Newsletter Novembre 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca\",\"name\":\"CERT-W\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CERT-W Newsletter Novembre 2020 - RiskInsight","description":"La newsletter de novembre 2020 du CERT-W a \u00e9t\u00e9 publi\u00e9e pour vous permettre de trouver les derniers indicateurs et nouvelles de la cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/","og_locale":"en_US","og_type":"article","og_title":"CERT-W Newsletter Novembre 2020 - RiskInsight","og_description":"La newsletter de novembre 2020 du CERT-W a \u00e9t\u00e9 publi\u00e9e pour vous permettre de trouver les derniers indicateurs et nouvelles de la cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/","og_site_name":"RiskInsight","article_published_time":"2020-12-16T08:00:58+00:00","article_modified_time":"2021-07-12T08:53:41+00:00","og_image":[{"width":1641,"height":1158,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"CERT-W","twitter_misc":{"Written by":"CERT-W","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/"},"author":{"name":"CERT-W","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca"},"headline":"CERT-W Newsletter Novembre 2020","datePublished":"2020-12-16T08:00:58+00:00","dateModified":"2021-07-12T08:53:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/"},"wordCount":817,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","keywords":["CERT-W","Cybercriminalit\u00e9","incident response CERT-W","indicateurs","Newsletter","vuln\u00e9rabilit\u00e9s"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/","url":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/","name":"CERT-W Newsletter Novembre 2020 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","datePublished":"2020-12-16T08:00:58+00:00","dateModified":"2021-07-12T08:53:41+00:00","description":"La newsletter de novembre 2020 du CERT-W a \u00e9t\u00e9 publi\u00e9e pour vous permettre de trouver les derniers indicateurs et nouvelles de la cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/11\/Fotolia_76258822_Subscription_Monthly_M.jpg","width":1641,"height":1158},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2020\/12\/cert-w-newsletter-novembre-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"CERT-W Newsletter Novembre 2020"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/b3138a95b8559cf24bf256c8e9994eca","name":"CERT-W","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/cert-w\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=14793"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14793\/revisions"}],"predecessor-version":[{"id":14801,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14793\/revisions\/14801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/14577"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=14793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=14793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=14793"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=14793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}