{"id":24091,"date":"2025-03-19T08:26:40","date_gmt":"2025-03-19T07:26:40","guid":{"rendered":"https:\/\/news.save.ch\/?p=24091"},"modified":"2025-03-19T08:26:40","modified_gmt":"2025-03-19T07:26:40","slug":"die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/","title":{"rendered":"La cha\u00eene d'approvisionnement, premi\u00e8re cible des cyber-attaquants"},"content":{"rendered":"<figure id=\"attachment_24092\" aria-describedby=\"caption-attachment-24092\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.save.ch\/fr\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/depositphotos_397070266_s\/\" rel=\"attachment wp-att-24092\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24092\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg\" alt=\"\" width=\"1000\" height=\"674\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S-680x458.jpg 680w, https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S-768x518.jpg 768w, https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S-18x12.jpg 18w, https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S-375x253.jpg 375w, https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S-519x350.jpg 519w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption id=\"caption-attachment-24092\" class=\"wp-caption-text\">Photo : Depositphotos\/NewAfrica<\/figcaption><\/figure>\n<p class=\"x_MsoPlainText\"><span data-olk-copy-source=\"MessageBody\">Souvent, les attaquants ciblent le maillon le plus faible de la cha\u00eene d'approvisionnement pour acc\u00e9der \u00e0 l'ensemble du syst\u00e8me.<\/span><\/p>\n<p class=\"x_MsoPlainText\">Un exemple : En novembre 2024, le fournisseur de logiciels am\u00e9ricain Blue Yonder a \u00e9t\u00e9 victime d'une attaque de ransomware qui a affect\u00e9 les activit\u00e9s de 3 000 entreprises dans 76 pays. Cela nous am\u00e8ne \u00e0 la question suivante : comment pouvons-nous prot\u00e9ger l'ensemble de la cha\u00eene d'approvisionnement contre des cybermenaces de plus en plus fr\u00e9quentes et sophistiqu\u00e9es ?<\/p>\n<h3 class=\"x_MsoPlainText\"><b>Opportunit\u00e9s et risques de l'open source et de l'IA<\/b><\/h3>\n<p class=\"x_MsoPlainText\">Compte tenu de la nature interconnect\u00e9e des syst\u00e8mes des entreprises, des fournisseurs et des partenaires, les cybercriminels choisissent de plus en plus des tiers comme cibles pour lancer leurs attaques et compromettre les donn\u00e9es et les syst\u00e8mes des entreprises. Les PME et les sous-traitants sont particuli\u00e8rement vuln\u00e9rables en raison de leurs ressources limit\u00e9es en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n<p class=\"x_MsoPlainText\">Les composants logiciels open source offrent justement une surface d'attaque. Comme le code est public, les pirates peuvent l'explorer \u00e0 la recherche de d\u00e9fauts et, en m\u00eame temps, exploiter de nombreuses applications logicielles en d\u00e9couvrant des erreurs critiques. Mais l'approche ouverte pr\u00e9sente \u00e9galement des avantages. Les biblioth\u00e8ques open source populaires sont continuellement test\u00e9es et am\u00e9lior\u00e9es par des centaines de contributeurs, ce qui permet de d\u00e9tecter plus rapidement les probl\u00e8mes et d'acc\u00e9l\u00e9rer les mises \u00e0 jour.<\/p>\n<h3 class=\"x_MsoPlainText\"><b>Travail \u00e0 distance, IA, e-mails professionnels sur le t\u00e9l\u00e9phone portable personnel : autant de surfaces d'attaque<\/b><\/h3>\n<p class=\"x_MsoPlainText\">Les cybercriminels utilisent en outre de plus en plus l'ing\u00e9nierie sociale pour cibler les employ\u00e9s disposant d'un acc\u00e8s strat\u00e9gique ou d'un statut hautement privil\u00e9gi\u00e9 au sein de l'infrastructure informatique. Cela leur permet de contourner les d\u00e9fenses techniques \u00e0 l'aide de tactiques de manipulation humaines. Le d\u00e9veloppement rapide de l'intelligence artificielle a encore affin\u00e9 ces techniques en permettant des campagnes de phishing ultra-cibl\u00e9es, des deepfakes et des attaques mobiles convaincantes. Enfin, l'augmentation du travail \u00e0 distance et l'utilisation d'appareils personnels tels que les t\u00e9l\u00e9phones portables \u00e0 des fins professionnelles ont augment\u00e9 la surface d'attaque pour les cybercriminels.<\/p>\n<h3 class=\"x_MsoPlainText\"><b>Les strat\u00e9gies de d\u00e9fense s'appuient sur la confiance z\u00e9ro et l'AMF<\/b><\/h3>\n<p class=\"x_MsoPlainText\">Pour r\u00e9duire ces risques, les entreprises doivent mettre en \u0153uvre des strat\u00e9gies de d\u00e9fense globales. Il s'agit de lutter contre les attaques potentielles en appliquant les concepts, les outils et les partenaires appropri\u00e9s. L'approche \"zero trust\" est la pierre angulaire d'une strat\u00e9gie de cybers\u00e9curit\u00e9 solide. Elle repose sur le principe \"ne jamais faire confiance, toujours v\u00e9rifier\".<\/p>\n<p class=\"x_MsoPlainText\">Cela implique \u00e9galement de mettre en \u0153uvre des m\u00e9thodes d'authentification fortes, telles que les technologies multifactorielles, combin\u00e9es \u00e0 des contr\u00f4les stricts et \u00e0 une gestion segment\u00e9e des acc\u00e8s. Il est essentiel de s'assurer que seuls les bons collaborateurs disposent du niveau de privil\u00e8ge appropri\u00e9. En outre, les acc\u00e8s doivent \u00eatre r\u00e9guli\u00e8rement contr\u00f4l\u00e9s et, le cas \u00e9ch\u00e9ant, adapt\u00e9s, en particulier pour les fournisseurs ou partenaires externes.<\/p>\n<h3 class=\"x_MsoPlainText\"><b>La r\u00e9glementation contribue \u00e0 freiner les attaques de la cha\u00eene d'approvisionnement<\/b><\/h3>\n<p class=\"x_MsoPlainText\">Il est \u00e9galement important de s'assurer que tous les membres de l'\u00e9cosyst\u00e8me disposent d'une protection de s\u00e9curit\u00e9 ad\u00e9quate, tant pour des raisons de cybers\u00e9curit\u00e9 que pour respecter les obligations l\u00e9gales. Par exemple, la r\u00e9glementation DORA (Digital Operational Resilience Act) impose aux prestataires de services financiers de garantir que tous leurs fournisseurs et partenaires respectent les normes de s\u00e9curit\u00e9 \u00e9tablies.<\/p>\n<p class=\"x_MsoPlainText\">Les cybercriminels s'attaquent de plus en plus volontiers aux cha\u00eenes d'approvisionnement pour infiltrer les syst\u00e8mes s\u00e9curis\u00e9s - en exploitant les fournisseurs et partenaires plus petits et moins bien \u00e9quip\u00e9s. Pour assurer la continuit\u00e9 de l'activit\u00e9 et prot\u00e9ger des infrastructures informatiques de plus en plus complexes et interconnect\u00e9es, les entreprises doivent \u00e9laborer et mettre en \u0153uvre des strat\u00e9gies de cybers\u00e9curit\u00e9 efficaces et des bonnes pratiques. Cela implique une collaboration non seulement avec des tiers, mais aussi avec des experts en cybers\u00e9curit\u00e9 qui fournissent des solutions sur mesure, des conseils et une assistance afin de cr\u00e9er le cadre technique n\u00e9cessaire pour prot\u00e9ger l'ensemble de l'\u00e9cosyst\u00e8me tout en respectant les r\u00e9glementations l\u00e9gales.<\/p>\n<p><em>Source : Michael Veit, expert en cybers\u00e9curit\u00e9 chez Sophos<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Oft haben es Angreifer auf das schw\u00e4chste Glied in der Lieferkette abgesehen, um Zugang zum Gesamtsystem zu bekommen. Ein Beispiel: Im November 2024 wurde der US-amerikanische Software-Provider Blue Yonder Opfer einer Ransomware-Attacke, die sich auf den Betrieb von 3.000 Firmen in 76 L\u00e4ndern auswirkte. Das f\u00fchrt zu der Frage: Wie k\u00f6nnen wir die gesamte Lieferkette [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[1321,670,613],"class_list":["post-24091","post","type-post","status-publish","format-standard","hentry","category-digitalisierung","tag-cybercrime","tag-cybersicherheit","tag-lieferkette"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":null,"_at_widget":null,"_yoast_wpseo_primary_category":"3313","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer - Save<\/title>\n<meta name=\"description\" content=\"Mit dem stetigen Voranschreiten der digitalen Transformation hat sich die Angriffsfl\u00e4che vergr\u00f6ssert, die Cyberkriminelle ausnutzen k\u00f6nnen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer - Save\" \/>\n<meta property=\"og:description\" content=\"Mit dem stetigen Voranschreiten der digitalen Transformation hat sich die Angriffsfl\u00e4che vergr\u00f6ssert, die Cyberkriminelle ausnutzen k\u00f6nnen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T07:26:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"674\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"stefanie Zeng\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"stefanie Zeng\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/\"},\"author\":{\"name\":\"stefanie Zeng\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/10917387362b3961e882740f6cf6f2a2\"},\"headline\":\"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer\",\"datePublished\":\"2025-03-19T07:26:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/\"},\"wordCount\":555,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Depositphotos_397070266_S.jpg\",\"keywords\":[\"Cybercrime\",\"Cybersicherheit\",\"Lieferkette\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/\",\"name\":\"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Depositphotos_397070266_S.jpg\",\"datePublished\":\"2025-03-19T07:26:40+00:00\",\"description\":\"Mit dem stetigen Voranschreiten der digitalen Transformation hat sich die Angriffsfl\u00e4che vergr\u00f6ssert, die Cyberkriminelle ausnutzen k\u00f6nnen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Depositphotos_397070266_S.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Depositphotos_397070266_S.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/10917387362b3961e882740f6cf6f2a2\",\"name\":\"stefanie Zeng\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/eac43faa6e40bb2c41068c95c9d78bbd94c476d5efdff7abaab80bb3ea681e06?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/eac43faa6e40bb2c41068c95c9d78bbd94c476d5efdff7abaab80bb3ea681e06?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/eac43faa6e40bb2c41068c95c9d78bbd94c476d5efdff7abaab80bb3ea681e06?s=96&d=mm&r=g\",\"caption\":\"stefanie Zeng\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/stefanie-zeng\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La cha\u00eene d'approvisionnement, premi\u00e8re cible des cyber-attaquants - Save","description":"Avec la progression constante de la transformation num\u00e9rique, la surface d'attaque que les cybercriminels peuvent exploiter s'est agrandie.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/","og_locale":"fr_FR","og_type":"article","og_title":"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer - Save","og_description":"Mit dem stetigen Voranschreiten der digitalen Transformation hat sich die Angriffsfl\u00e4che vergr\u00f6ssert, die Cyberkriminelle ausnutzen k\u00f6nnen.","og_url":"https:\/\/news.save.ch\/fr\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/","og_site_name":"Save","article_published_time":"2025-03-19T07:26:40+00:00","og_image":[{"width":1000,"height":674,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg","type":"image\/jpeg"}],"author":"stefanie Zeng","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"stefanie Zeng","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/"},"author":{"name":"stefanie Zeng","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/10917387362b3961e882740f6cf6f2a2"},"headline":"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer","datePublished":"2025-03-19T07:26:40+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/"},"wordCount":555,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg","keywords":["Cybercrime","Cybersicherheit","Lieferkette"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/","url":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/","name":"La cha\u00eene d'approvisionnement, premi\u00e8re cible des cyber-attaquants - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg","datePublished":"2025-03-19T07:26:40+00:00","description":"Avec la progression constante de la transformation num\u00e9rique, la surface d'attaque que les cybercriminels peuvent exploiter s'est agrandie.","breadcrumb":{"@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2025\/03\/Depositphotos_397070266_S.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/die-lieferkette-als-primaeres-ziel-fuer-cyberangreifer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Die Lieferkette als prim\u00e4res Ziel f\u00fcr Cyberangreifer"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/10917387362b3961e882740f6cf6f2a2","name":"stefanie Zeng","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/eac43faa6e40bb2c41068c95c9d78bbd94c476d5efdff7abaab80bb3ea681e06?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eac43faa6e40bb2c41068c95c9d78bbd94c476d5efdff7abaab80bb3ea681e06?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eac43faa6e40bb2c41068c95c9d78bbd94c476d5efdff7abaab80bb3ea681e06?s=96&d=mm&r=g","caption":"stefanie Zeng"},"url":"https:\/\/news.save.ch\/fr\/author\/stefanie-zeng\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/24091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=24091"}],"version-history":[{"count":3,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/24091\/revisions"}],"predecessor-version":[{"id":24095,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/24091\/revisions\/24095"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=24091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=24091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=24091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}