{"id":85,"date":"2026-01-03T11:43:33","date_gmt":"2026-01-03T10:43:33","guid":{"rendered":"https:\/\/kevinlavaka.csd-it.fr\/?page_id=85"},"modified":"2026-02-27T01:08:52","modified_gmt":"2026-02-27T00:08:52","slug":"veille-technologique","status":"publish","type":"page","link":"https:\/\/kevinlavaka.csd-it.fr\/?page_id=85","title":{"rendered":"Veille Technologique"},"content":{"rendered":"\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-light\" style=\"padding-top:2%;min-height:30rem;aspect-ratio:unset;\"><img decoding=\"async\" class=\"wp-block-cover__image-background wp-image-3037\" alt=\"\" src=\"https:\/\/tyler.com\/wp-content\/uploads\/2023\/11\/island-services-banner.jpg\" style=\"object-position:50% 80%\" data-object-fit=\"cover\" data-object-position=\"50% 80%\"\/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-ee51f2d2 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-group alignwide is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-5e763914 wp-block-group-is-layout-flex\" style=\"min-height:8rem\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-bea02a06 wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#07277c;margin-top:0rem;margin-bottom:1.01rem;font-size:clamp(2.071rem, 2.071rem + ((1vw - 0.2rem) * 2.98), 3.71rem);font-style:normal;font-weight:400;line-height:1;text-transform:capitalize\">Veille technologiques<\/h2>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#07277c;margin-top:0.5rem;margin-bottom:1.01rem;font-size:clamp(1.556rem, 1.556rem + ((1vw - 0.2rem) * 1.916), 2.61rem);font-style:normal;font-weight:500;letter-spacing:0px;line-height:1.3;text-transform:capitalize\"><br>Cyberattaque<\/h3>\n\n\n\n<p><br>Une cyberattaque se d\u00e9finit comme une intrusion ou une action malveillante r\u00e9alis\u00e9e \u00e0 travers un syst\u00e8me informatique afin de perturber, voler ou endommager des donn\u00e9es ou des services num\u00e9riques.<\/p>\n\n\n\n<section class=\"wp-block-group alignfull has-text-color has-global-padding is-layout-constrained wp-container-core-group-is-layout-4252d6ba wp-block-group-is-layout-constrained\" style=\"color:#03081e;margin-top:0px;padding-top:6.51rem;padding-right:1rem;padding-bottom:5.5rem;padding-left:1rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.464), 1.13rem);font-style:normal;font-weight:400;line-height:1.4\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-db2df21c wp-block-columns-is-layout-flex\" style=\"margin-bottom:0px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-b15c80d6 wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#07277c;margin-top:0.5rem;margin-bottom:1.01rem;font-size:clamp(1.556rem, 1.556rem + ((1vw - 0.2rem) * 1.916), 2.61rem);font-style:normal;font-weight:500;letter-spacing:0px;line-height:1.3;text-transform:capitalize\">Actualit\u00e9 1<\/h3>\n\n\n\n<p class=\"has-text-color\" style=\"color:#03081e;margin-top:0rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.609), 1.21rem);font-style:normal;font-weight:400;line-height:1.6\">Le 20 septembre 2025, une cyberattaque a perturb\u00e9 plusieurs grands a\u00e9roports europ\u00e9ens, notamment \u00e0 Bruxelles, Londres et Berlin, provoquant  des files d&rsquo;attente interminables et de nombreuses annulations de vols.<\/p>\n\n\n\n<p>L&rsquo;attaque vis\u00e9 le logiciel nomm\u00e9 Muse, un syst\u00e8me d&rsquo;enregistrement des passagers et des bagages g\u00e9r\u00e9 par une soci\u00e9t\u00e9 prestataire Collins Aerospace. La panne a forc\u00e9 les agents \u00e0 effectuer les proc\u00e9dures manuellement, ralentissant les op\u00e9rations.<\/p>\n\n\n\n<p>Cet incident illustre la fragilit\u00e9 des prestataires ext\u00e9rieurs dans le secteur a\u00e9ronautique.<\/p>\n\n\n\n<p>L&rsquo;origine de l&rsquo;attaque reste inconnue, les experts ont \u00e9nonc\u00e9 deux hypoth\u00e8ses : une tentative d&rsquo;extorsion financi\u00e8re par ran\u00e7ongiciel ou une man\u0153uvre de d\u00e9stabilisation strat\u00e9gique (potentiellement li\u00e9e \u00e0 la **Russie**) visant \u00e0 cr\u00e9er un sentiment de chaos au sein des opinions publiques occidentales .<br><\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#03081e;margin-top:0rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.609), 1.21rem);font-style:normal;font-weight:400;line-height:1.6\">Article : <a href=\"https:\/\/www.franceinfo.fr\/internet\/securite-sur-internet\/cyberattaques\/bruxelles-londres-berlin-une-cyberattaque-seme-la-pagaille-dans-plusieurs-aeroports-europeens_7503874.html\">France Info<\/a>, <a href=\"https:\/\/www.lemagit.fr\/actualites\/366631465\/Europe-comment-une-cyberattaque-a-perturbe-le-trafic-aerien-tout-le-week-end\" data-type=\"link\" data-id=\"https:\/\/www.lemagit.fr\/actualites\/366631465\/Europe-comment-une-cyberattaque-a-perturbe-le-trafic-aerien-tout-le-week-end\">LeMagIT<\/a><br>Reportage : <a href=\"https:\/\/youtu.be\/6m80gDjNNcA?si=1osFmyDecvpFtC93https:\/\/youtu.be\/6m80gDjNNcA?si=1osFmyDecvpFtC93\" data-type=\"link\" data-id=\"https:\/\/youtu.be\/6m80gDjNNcA?si=1osFmyDecvpFtC93https:\/\/youtu.be\/6m80gDjNNcA?si=1osFmyDecvpFtC93\">France24<\/a><br>R\u00e9seau social : <a href=\"https:\/\/www.linkedin.com\/posts\/orc4-cyber-security_cybercrime-cybersecurity-orc4-activity-7375209218116612097-U_8u?utm_source=chatgpt.com\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/posts\/orc4-cyber-security_cybercrime-cybersecurity-orc4-activity-7375209218116612097-U_8u?utm_source=chatgpt.com\">LinkedIn<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group alignfull has-text-color has-global-padding is-layout-constrained wp-container-core-group-is-layout-4252d6ba wp-block-group-is-layout-constrained\" style=\"color:#03081e;margin-top:0px;padding-top:6.51rem;padding-right:1rem;padding-bottom:5.5rem;padding-left:1rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.464), 1.13rem);font-style:normal;font-weight:400;line-height:1.4\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-db2df21c wp-block-columns-is-layout-flex\" style=\"margin-bottom:0px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-b15c80d6 wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#07277c;margin-top:0.5rem;margin-bottom:1.01rem;font-size:clamp(1.556rem, 1.556rem + ((1vw - 0.2rem) * 1.916), 2.61rem);font-style:normal;font-weight:500;letter-spacing:0px;line-height:1.3;text-transform:capitalize\">Actualit\u00e9 2<\/h3>\n\n\n\n<p class=\"has-text-color\" style=\"color:#03081e;margin-top:0rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.609), 1.21rem);font-style:normal;font-weight:400;line-height:1.6\">Le vendredi 10 octobre 2025, une cyberattaque a vis\u00e9 le syst\u00e8me d\u2019information impactant 296 \u00e9tablissements scolaire de la r\u00e9gion Haut de France.<\/p>\n\n\n\n<p>Selon le journal de presse et les autorit\u00e9s de la r\u00e9gion, il s&rsquo;agirait d&rsquo;une attaque par ran\u00e7ongiciel, revendiquer par un groupe cybercriminelle \u00ab\u00a0Qilin\u00a0\u00bb. <br>En cons\u00e9quence l\u2019acc\u00e8s aux r\u00e9seaux et \u00e0 Internet des \u00e9tablissement ont temporairement \u00e9tait suspendu cr\u00e9ant un ralentissement du travail des \u00e9l\u00e8ves et des professeurs.<\/p>\n\n\n\n<p>Une cellule de crise a \u00e9t\u00e9 mise en place par les autorit\u00e9 de la R\u00e9gion, les Rectorats et la DRAAF, afin de garantir un suivi sur la situation.<\/p>\n\n\n\n<p>Reportage : <a href=\"https:\/\/www.youtube.com\/watch?v=h63uH5al1OI\" data-type=\"link\" data-id=\"https:\/\/www.youtube.com\/watch?v=h63uH5al1OI\">France 3 Hauts-de-France<\/a><br><br>Rapport d&rsquo;incident : <a href=\"https:\/\/draaf.hauts-de-france.agriculture.gouv.fr\/incident-de-cybersecurite-dans-plusieurs-lycees-de-la-region-hauts-de-france-a5030.html?utm_source=chatgpt.com\" data-type=\"link\" data-id=\"https:\/\/draaf.hauts-de-france.agriculture.gouv.fr\/incident-de-cybersecurite-dans-plusieurs-lycees-de-la-region-hauts-de-france-a5030.html?utm_source=chatgpt.com\">Incident de cybers\u00e9curit\u00e9 (DRAAF Hauts-de-France)<\/a><br><br>Communiqu\u00e9 de presse  : <a href=\"https:\/\/www1.ac-lille.fr\/cyberattaque-contre-le-systeme-d-information-des-lycees-en-hauts-de-france-point-de-situation-125986?utm_source=chatgpt.com\" data-type=\"link\" data-id=\"https:\/\/www1.ac-lille.fr\/cyberattaque-contre-le-systeme-d-information-des-lycees-en-hauts-de-france-point-de-situation-125986?utm_source=chatgpt.com\">R\u00e9gion Hauts-de-France<\/a><br><br><\/p>\n\n\n\n<p><br><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<section class=\"wp-block-group alignfull has-text-color has-global-padding is-layout-constrained wp-container-core-group-is-layout-4252d6ba wp-block-group-is-layout-constrained\" style=\"color:#03081e;margin-top:0px;padding-top:6.51rem;padding-right:1rem;padding-bottom:5.5rem;padding-left:1rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.464), 1.13rem);font-style:normal;font-weight:400;line-height:1.4\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-db2df21c wp-block-columns-is-layout-flex\" style=\"margin-bottom:0px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-b15c80d6 wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#07277c;margin-top:0.5rem;margin-bottom:1.01rem;font-size:clamp(1.556rem, 1.556rem + ((1vw - 0.2rem) * 1.916), 2.61rem);font-style:normal;font-weight:500;letter-spacing:0px;line-height:1.3;text-transform:capitalize\">Actualit\u00e9 3<\/h3>\n\n\n\n<p class=\"has-text-color\" style=\"color:#03081e;margin-top:0rem;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.609), 1.21rem);font-style:normal;font-weight:400;line-height:1.6\"><br>Dans la journ\u00e9e du 11 novembre 2025, un logiciel m\u00e9dical utilis\u00e9 par des millier de professionnel en France,  \u00e0 \u00e9tait une cible de cyberattaque.<br>En l&rsquo;occurrence \u00ab\u00a0Weda\u00a0\u00bb est un logiciel qui g\u00e8re les dossiers des patients, la facturation et les prescription. <br><br>Selon un communiqu\u00e9 de CNIL il s&rsquo;agirait d&rsquo;une <strong><a href=\"https:\/\/www.cnil.fr\/fr\/definition\/violation-de-donnees\" data-type=\"link\" data-id=\"https:\/\/www.cnil.fr\/fr\/definition\/violation-de-donnees\">violation de donn\u00e9e<\/a><\/strong> d&rsquo;apr\u00e8s le prestataire du logiciel.<br><br>En effet le secteur professionnelle de sant\u00e9 \u00e9t\u00e9 contraint de travailler manuellement sur papier pendants plusieurs jour, et des mesures de s\u00e9curit\u00e9 ont \u00e9t\u00e9 mise en place suite \u00e0 des proc\u00e9dure de s\u00e9curit\u00e9. <br><\/p>\n\n\n\n<p>Notification de l&rsquo;incident : <a href=\"https:\/\/www.cnil.fr\/fr\/cnil-direct\/question\/2652?utm_source=chatgpt.com\" data-type=\"link\" data-id=\"https:\/\/www.cnil.fr\/fr\/cnil-direct\/question\/2652?utm_source=chatgpt.com\">CNIL<\/a> <br>Pr\u00e9vention aux utilisateurs et professionnel de sant\u00e9 : <a href=\"https:\/\/www.youtube.com\/watch?v=KsqPnUr3z-Q\" data-type=\"link\" data-id=\"https:\/\/www.youtube.com\/watch?v=KsqPnUr3z-Q\">Youtube OCSMF<\/a><br>Communiqu\u00e9 : <a href=\"https:\/\/bonjourlafuite.eu.org\/img\/weda-1.jpg\" data-type=\"link\" data-id=\"https:\/\/bonjourlafuite.eu.org\/img\/weda-1.jpg\">Prestataire Weda<\/a><br><a href=\"https:\/\/x.com\/_SaxX_\/status\/1977773689178337507?utm_source=chatgpt.com\">Twitter\/X<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><br><br><\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattaque Une cyberattaque se d\u00e9finit comme une intrusion ou une action malveillante r\u00e9alis\u00e9e \u00e0 travers un syst\u00e8me informatique afin de perturber, voler ou endommager des donn\u00e9es ou des services num\u00e9riques. Actualit\u00e9 1 Le 20 septembre 2025, une cyberattaque a perturb\u00e9 plusieurs grands a\u00e9roports europ\u00e9ens, notamment \u00e0 Bruxelles, Londres et Berlin, provoquant des files d&rsquo;attente interminables [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-85","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=\/wp\/v2\/pages\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=85"}],"version-history":[{"count":113,"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=\/wp\/v2\/pages\/85\/revisions"}],"predecessor-version":[{"id":1444,"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=\/wp\/v2\/pages\/85\/revisions\/1444"}],"wp:attachment":[{"href":"https:\/\/kevinlavaka.csd-it.fr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}