{"id":34911,"date":"2025-01-03T06:45:15","date_gmt":"2025-01-03T05:45:15","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=20777"},"modified":"2025-01-03T06:56:07","modified_gmt":"2025-01-03T05:56:07","slug":"cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/fr\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","title":{"rendered":"Tendances cybern\u00e9tiques 2025 : fumig\u00e8nes criminels et cyberattaques d\u00e9mocratis\u00e9es"},"content":{"rendered":"<figure id=\"attachment_20778\" class=\"wp-caption alignnone\" style=\"width: 680px;\" aria-describedby=\"caption-attachment-20778\"><img class=\"size-full wp-image-20778\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg\" sizes=\"(max-width: 680px) 100vw, 680px\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg 680w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps-18x12.jpg 18w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps-375x250.jpg 375w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps-524x350.jpg 524w\" alt=\"\" width=\"680\" height=\"454\" \/>\r\n<figcaption id=\"caption-attachment-20778\" class=\"wp-caption-text\">R\u00e9trospective de 2024 et perspectives de 2025 : les attaques du cloud, l'IA g\u00e9n\u00e9rative et les attaques de la cha\u00eene d'approvisionnement marquent la cybers\u00e9curit\u00e9. (Image : www.depositphotos.com)<\/figcaption>\r\n<\/figure>\r\n<p>Que pouvons-nous donc attendre de 2025 en mati\u00e8re de cybers\u00e9curit\u00e9 ?<\/p>\r\n<h3><strong>1. les attaquants se concentrent de plus en plus sur le cloud<\/strong><\/h3>\r\n<p>Comme de plus en plus d'entreprises prot\u00e8gent leurs appareils avec Endpoint Detection and Response (EDR) et que la diffusion de l'authentification multi-facteurs (MFA) augmente, les attaquants de ransomware se tournent de plus en plus vers les ressources cloud qui ne disposent normalement pas de MFA. Le \"prix\" \u00e0 payer pour les criminels n'est plus les mots de passe, mais les jetons d'authentification et les cookies du navigateur.<\/p>\r\n<h3><strong>2. l'IA g\u00e9n\u00e9rative \"d\u00e9mocratise\" les activit\u00e9s cybercriminelles<\/strong><\/h3>\r\n<p>Les outils et proc\u00e9dures utilis\u00e9s par les cybercriminels professionnels sont utilis\u00e9s comme donn\u00e9es d'entra\u00eenement par de nombreuses plateformes GenKI. Cela signifie que certaines activit\u00e9s cybercriminelles se sont \"d\u00e9mocratis\u00e9es\" et que des attaquants peu qualifi\u00e9s et opportunistes peuvent d\u00e9sormais cr\u00e9er sans grand effort, par exemple, un app\u00e2t de phishing ou un code de ransomware. En raison du manque de professionnalisme, ces attaques ont certes un faible taux de r\u00e9ussite, mais elles contribuent, en raison de leur masse, \u00e0 mobiliser les ressources des d\u00e9fenseurs et \u00e0 laisser ainsi la voie libre aux attaquants professionnels.<\/p>\r\n<h3><strong>3. les cybercriminels allument de plus en plus d'\u00e9crans de fum\u00e9e <\/strong><\/h3>\r\n<p>Les cybercriminels ont de plus en plus recours \u00e0 des man\u0153uvres de diversion pour dissimuler leurs v\u00e9ritables activit\u00e9s principales et cr\u00e9er des perturbations et de la confusion dans les d\u00e9fenses. Les petites op\u00e9rations d'attaque mobilisent les ressources de r\u00e9action et entra\u00eenent une diminution de l'efficacit\u00e9 globale des syst\u00e8mes de d\u00e9fense. Cela conduit \u00e0 un d\u00e9s\u00e9quilibre entre les bons et les m\u00e9chants, m\u00eame avec une cybers\u00e9curit\u00e9 bien \u00e9tablie.<\/p>\r\n<h3><strong>4. les attaques contre la cha\u00eene d'approvisionnement ont un impact plus important<\/strong><\/h3>\r\n<p>Les attaques contre la cha\u00eene d'approvisionnement en logiciels, dont les cons\u00e9quences d\u00e9passent largement les activit\u00e9s des entreprises individuelles, constituent un \u00e9l\u00e9ment de plus en plus important dans les strat\u00e9gies d'attaque des cybercriminels. Ils cherchent \u00e0 exercer une pression maximale afin de donner encore plus de poids \u00e0 leurs demandes de ran\u00e7on et d'augmenter les sommes extorqu\u00e9es.<\/p>\r\n<h3><strong>5) Les cyberattaques complexes utilisent des syst\u00e8mes multi-agents LLM<\/strong><\/h3>\r\n<p>Les cybercriminels profitent \u00e9galement de l'\u00e9volution actuelle de l'utilisation des LLM, qui consiste \u00e0 encha\u00eener des mod\u00e8les pour cr\u00e9er des t\u00e2ches plus complexes. Par exemple, au lieu d'utiliser uniquement ChatGPT pour \u00e9crire une ligne de code, les cybercriminels peuvent d\u00e9sormais combiner plusieurs LLM pour cr\u00e9er des projets plus vastes tels que des sites web g\u00e9n\u00e9r\u00e9s par l'IA, des vid\u00e9os ou des deepfakes.<\/p>\r\n<h3><strong>6. les cybercriminels cherchent \u00e0 obtenir un meilleur retour sur investissement<\/strong><\/h3>\r\n<p>L'exploitation apr\u00e8s l'infiltration r\u00e9ussie d'une entreprise n'est plus un processus \u00e0 une seule voie. Les pirates ont de plus en plus recours \u00e0 une approche \"double-dip\". Par exemple, lorsqu'ils volent des cryptomonnaies, ils d\u00e9robent \u00e9galement des cookies ou des documents d'identit\u00e9 afin de les utiliser pour d'autres d\u00e9lits.<\/p>\r\n<p><em>Source : <a href=\"https:\/\/www.sophos.com\/de-de\">news.sophos.com<\/a><\/em><\/p>\n<p class=\"syndicated-attribution\">Cet article est paru initialement sur m-q.ch - <a href=\"https:\/\/www.m-q.ch\/de\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\" target=\"_blank\">https:\/\/www.m-q.ch\/de\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>En mati\u00e8re de cybers\u00e9curit\u00e9, les derni\u00e8res ann\u00e9es ont montr\u00e9 qu'il faut s'attendre \u00e0 tout. Comme personne ne peut pr\u00e9dire l'avenir, il vaut toutefois la peine de se pencher sur 2024 pour \u00e9valuer les \u00e9volutions, anticiper les sc\u00e9narios possibles pour l'avenir et s'adapter afin d'aborder une nouvelle ann\u00e9e avec confiance. La s\u00e9curit\u00e9 est bien en place, mais la vigilance reste le ma\u00eetre-mot. Car les criminels sont de plus en plus opportunistes en ce qui concerne leurs proies, leurs commanditaires et leurs soutiens.<\/p>","protected":false},"author":80,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Cybersicherheit 2025","_yoast_wpseo_metadesc":"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.","articlekey":"","footnotes":""},"categories":[582],"tags":[922,4705,3762,4186,418,440],"class_list":["post-34911","post","type-post","status-publish","format-standard","hentry","category-operational-excellence","tag-cloud","tag-cyberattacke","tag-cyberkriminalitaet","tag-generative-ki","tag-risikomanagement","tag-software"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken - Organisator<\/title>\n<meta name=\"description\" content=\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken - Organisator\" \/>\n<meta property=\"og:description\" content=\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T05:45:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T05:56:07+00:00\" \/>\n<meta name=\"author\" content=\"Dzana Muminovic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/\"},\"author\":{\"name\":\"Dzana Muminovic\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/afccda3a71c06d4be2ed9100dd163db7\"},\"headline\":\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken\",\"datePublished\":\"2025-01-03T05:45:15+00:00\",\"dateModified\":\"2025-01-03T05:56:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Cybertrends_Bild1_ps.jpg\",\"keywords\":[\"Cloud\",\"Cyberattacke\",\"Cyberkriminalit\u00e4t\",\"Generative KI\",\"Risikomanagement\",\"Software\"],\"articleSection\":[\"OPERATIONAL EXCELLENCE\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/\",\"name\":\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Cybertrends_Bild1_ps.jpg\",\"datePublished\":\"2025-01-03T05:45:15+00:00\",\"dateModified\":\"2025-01-03T05:56:07+00:00\",\"description\":\"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Cybertrends_Bild1_ps.jpg\",\"contentUrl\":\"https:\\\/\\\/www.m-q.ch\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Cybertrends_Bild1_ps.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/operational-excellence\\\/2025-01-03\\\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/afccda3a71c06d4be2ed9100dd163db7\",\"name\":\"Dzana Muminovic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/909c5c71aff4b38e88686f2ab2f1ba152571f394f41ed8bae431ea56ced93050?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/909c5c71aff4b38e88686f2ab2f1ba152571f394f41ed8bae431ea56ced93050?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/909c5c71aff4b38e88686f2ab2f1ba152571f394f41ed8bae431ea56ced93050?s=96&d=mm&r=g\",\"caption\":\"Dzana Muminovic\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/fr\\\/author\\\/dzana-muminovic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybertrends 2025 : fumig\u00e8nes criminels et cyberattaques d\u00e9mocratis\u00e9es - Organisateur","description":"R\u00e9trospective 2024 et perspectives 2025 : les attaques du cloud, l'IA g\u00e9n\u00e9rative et les attaques de la cha\u00eene d'approvisionnement marquent la cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken - Organisator","og_description":"R\u00fcckblick auf 2024 und Ausblick auf 2025: Cloud-Angriffe, generative KI und Lieferketten-Angriffe pr\u00e4gen die Cybersicherheit.","og_url":"https:\/\/www.organisator.ch\/fr\/excellence-operationnelle\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2025-01-03T05:45:15+00:00","article_modified_time":"2025-01-03T05:56:07+00:00","author":"Dzana Muminovic","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/"},"author":{"name":"Dzana Muminovic","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/afccda3a71c06d4be2ed9100dd163db7"},"headline":"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken","datePublished":"2025-01-03T05:45:15+00:00","dateModified":"2025-01-03T05:56:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/"},"wordCount":408,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","keywords":["Cloud","Cyberattacke","Cyberkriminalit\u00e4t","Generative KI","Risikomanagement","Software"],"articleSection":["OPERATIONAL EXCELLENCE"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","url":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/","name":"Cybertrends 2025 : fumig\u00e8nes criminels et cyberattaques d\u00e9mocratis\u00e9es - Organisateur","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","datePublished":"2025-01-03T05:45:15+00:00","dateModified":"2025-01-03T05:56:07+00:00","description":"R\u00e9trospective 2024 et perspectives 2025 : les attaques du cloud, l'IA g\u00e9n\u00e9rative et les attaques de la cha\u00eene d'approvisionnement marquent la cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/12\/Cybertrends_Bild1_ps.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/operational-excellence\/2025-01-03\/cybertrends-2025-kriminelle-nebelkerzen-und-demokratisierte-cyberattacken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Cybertrends 2025: Kriminelle Nebelkerzen und demokratisierte Cyberattacken"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organisateur","description":"Comp\u00e9tence et comp\u00e9tence. Proches de la pratique. L'ORGANISATEUR pr\u00e9pare 10 num\u00e9ros par an sur les th\u00e8mes essentiels pour les dirigeants de PME.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organisateur","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/afccda3a71c06d4be2ed9100dd163db7","name":"Dzana Muminovic","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/909c5c71aff4b38e88686f2ab2f1ba152571f394f41ed8bae431ea56ced93050?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/909c5c71aff4b38e88686f2ab2f1ba152571f394f41ed8bae431ea56ced93050?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/909c5c71aff4b38e88686f2ab2f1ba152571f394f41ed8bae431ea56ced93050?s=96&d=mm&r=g","caption":"Dzana Muminovic"},"url":"https:\/\/www.organisator.ch\/fr\/author\/dzana-muminovic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/34911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/comments?post=34911"}],"version-history":[{"count":5,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/34911\/revisions"}],"predecessor-version":[{"id":34917,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/posts\/34911\/revisions\/34917"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/media?parent=34911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/categories?post=34911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/fr\/wp-json\/wp\/v2\/tags?post=34911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}