{"id":108041,"date":"2021-11-08T10:05:00","date_gmt":"2021-11-08T09:05:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=108041"},"modified":"2021-10-06T12:10:22","modified_gmt":"2021-10-06T10:10:22","slug":"linux-est-egalement-attaque","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/auch-linux-wird-angegriffen\/","title":{"rendered":"Linux est \u00e9galement attaqu\u00e9"},"content":{"rendered":"<p>De nombreux appareils IoT modernes, des applications cloud et des technologies fonctionnent sur une variante de Linux, qui doit \u00eatre prot\u00e9g\u00e9e en tant qu'\u00e9l\u00e9ment important des infrastructures modernes. Comme le montre l'\u00e9tude, la plupart des vuln\u00e9rabilit\u00e9s provenaient de syst\u00e8mes utilisant des versions obsol\u00e8tes de distributions Linux, dont 44 % des versions 7.4 \u00e0 7.9 de CentOS. En outre, 200 vuln\u00e9rabilit\u00e9s diff\u00e9rentes ont \u00e9t\u00e9 exploit\u00e9es en seulement six mois dans des environnements Linux, par exemple via le port 22 pour les applications IoT.<\/p>","protected":false},"excerpt":{"rendered":"<p>Une \u00e9tude de Trend Micro donne un aper\u00e7u de la mani\u00e8re dont les syst\u00e8mes d'exploitation Linux sont de plus en plus cibl\u00e9s par les attaquants en raison de la transformation progressive du cloud.<\/p>","protected":false},"author":38,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,39822],"tags":[20346,67,1516,117,10343],"coauthors":[19920],"class_list":["post-108041","post","type-post","status-publish","format-standard","hentry","category-sap-nachrichten","category-mag-21-10","tag-cybersecurity","tag-linux","tag-security","tag-sicherheit","tag-trend-micro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","image-100":"","image-480":"","image-640":"","image-720":"","image-960":"","image-1168":"","image-1440":"","image-1920":"","1536x1536":"","2048x2048":"","trp-custom-language-flag":"","bricks_large_16x9":"","bricks_large":"","bricks_large_square":"","bricks_medium":"","bricks_medium_square":"","profile_24":"","profile_48":"","profile_96":"","profile_150":"","profile_300":""},"post_excerpt_stackable_v2":"<p>Eine Studie von Trend Micro gew\u00e4hrt Einblick, wie Linux-Betriebssysteme aufgrund der fortschreitenden Cloud-Transformation verst\u00e4rkt ins Visier von Angreifern geraten.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/category\/mag-21-10\/\" rel=\"category tag\">MAG 21-10<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/108041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=108041"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/108041\/revisions"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=108041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=108041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=108041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=108041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}