{"id":38523,"date":"2023-12-26T16:32:15","date_gmt":"2023-12-26T15:32:15","guid":{"rendered":"https:\/\/www.wallix.com\/?p=38523"},"modified":"2026-02-10T13:53:52","modified_gmt":"2026-02-10T12:53:52","slug":"piratage-quand-la-securite-compte-pour-duber","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/","title":{"rendered":"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lqmi8yd4-0cafe80d611e1e9e04939c21835cb03e avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 66.666666666667%;'><li  class='avia-slideshow-slide av-lqmi8yd4-0cafe80d611e1e9e04939c21835cb03e__0  slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-7117 avia-img-lazy-loading-not-7117\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2020\/08\/uber-hack-pam-e1726043547802.jpg\" width=\"600\" height=\"400\" title='uber-hack-pam' alt='\u201cGraphic illustrating the Uber hack, where attackers accessed hard\u2011coded AWS credentials in Uber\u2019s GitHub repository \u2014 underscoring Wallix\u2019s message that Privileged Access Management (PAM) could have prevented the breach by securely vaulting and rotating credentials.'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><li  class='avia-slideshow-slide av-lqmi8yd4-0cafe80d611e1e9e04939c21835cb03e__1  slide-2 slide-even'><div data-rel='slideshow-1' class='avia-slide-wrap '  title='Logo\/banner for NHI, reflecting Wallix\u2019s partnership with this organization to strengthen privileged access management and identity security. The image underscores Wallix\u2019s network of trusted partners committed to secure IAM solutions.' ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-73320 avia-img-lazy-loading-not-73320\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-1210x423.jpeg\" width=\"1210\" height=\"423\" title='City of London at sunset. Illustration with communication and bu' alt='Non human identities'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Pr\u00e9c\u00e9dent\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-1' aria-describedby='av-svg-desc-1' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-1'>Pr\u00e9c\u00e9dent<\/title>\n<desc id='av-svg-desc-1'>Pr\u00e9c\u00e9dent<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Pr\u00e9c\u00e9dent<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Suivant\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-2' aria-describedby='av-svg-desc-2' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-2'>Suivant<\/title>\n<desc id='av-svg-desc-2'>Suivant<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Suivant<\/span><\/a><\/div><div class='avia-slideshow-dots avia-slideshow-controls'><a href='#1' class='goto-slide active' >1<\/a><a href='#2' class='goto-slide ' >2<\/a><\/div><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-38523'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_two_third-00fc3ec3c423f92e1ff89ac858d00da1 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lqmi8l75-68dbb0a7e78bb816efaefedb17639641\">\n#top .av-special-heading.av-lqmi8l75-68dbb0a7e78bb816efaefedb17639641{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lqmi8l75-68dbb0a7e78bb816efaefedb17639641 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lqmi8l75-68dbb0a7e78bb816efaefedb17639641 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lqmi8l75-68dbb0a7e78bb816efaefedb17639641 av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Piratage : Quand la s\u00e9curit\u00e9 compte pour Uber<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >10 F\u00e9vrier 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/fr\/category\/blogpost\/gestion-des-acces-a-privileges-fr\/\" >GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lqmi9sxk-9f2c709c7edf395a208864c775e4d762 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>Les donn\u00e9es de 57 millions d\u2019utilisateurs ont \u00e9t\u00e9 vol\u00e9es \u00e0 Uber.<\/li>\n<li>Des individus malveillants ont r\u00e9ussi \u00e0 se connecter au site priv\u00e9 GitHub des d\u00e9veloppeurs de l\u2019application, ont trouv\u00e9 des identifiants de connexion AWS et les ont utilis\u00e9s pour d\u00e9rober des donn\u00e9es priv\u00e9es.<\/li>\n<\/ul>\n<p>Si le nombre d\u2019identifiants vol\u00e9s est tr\u00e8s \u00e9lev\u00e9, beaucoup se demandent comment cela a pu se produire, pourquoi leurs donn\u00e9es sont sur Amazon et ce qu\u2019est GitHub exactement. Penchons-nous sur ce qui a pu se passer&#8230;<\/p>\n<p>Les comptes GitHub de d\u00e9veloppeurs de l\u2019application Uber ont \u00e9t\u00e9 pirat\u00e9s. Leurs mots de passe ont-ils \u00e9t\u00e9 vol\u00e9s ? S\u2019agit-il d\u2019une attaque de type hame\u00e7onnage ? Nous avons peu d\u2019information sur ce sujet qui reste inexpliqu\u00e9 pour l\u2019instant.<\/p>\n<h3>Comprendre AWS et le r\u00f4le de GitHub<\/h3>\n<p>Amazon Web Services (AWS) est la plateforme cloud d\u2019Amazon. Elle permet aux soci\u00e9t\u00e9s d\u2019offrir des services en ligne (vente, promotion, emails etc.) ou de stocker des volumes importants de donn\u00e9es. AWS fourni des infrastructures virtuelles pour que ses entreprises clientes puissent d\u00e9ployer les logiciels qu\u2019elles souhaitent.<\/p>\n<p>C\u2019est \u00e0 ce moment-l\u00e0 que GitHub intervient. GitHub est \u00e9galement un service en ligne d\u00e9di\u00e9 au d\u00e9ploiement de logiciels. Cette plateforme est populaire aupr\u00e8s de la communaut\u00e9 des dev ops car elle offre des fonctionnalit\u00e9s de gestion centralis\u00e9e de code source ainsi que des versions du code.<\/p>\n<blockquote>\n<p style=\"text-align: right;\"><strong><span style=\"color: #f37300;\"><em>Plus simplement, GitHub permet \u00e0 plusieurs d\u00e9veloppeurs de travailler sur le m\u00eame code source en m\u00eame temps, sans interf\u00e9rence.<\/em><\/span><\/strong><\/p>\n<\/blockquote>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Une fois qu\u2019un segment de code est fonctionnel, il est transf\u00e9r\u00e9 sur AWS pour test ou exploitation.<\/span><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn2.hubspot.net\/hub\/514643\/hubfs\/piratage-uber-scenario.jpeg?width=698&amp;name=piratage-uber-scenario.jpeg\" alt=\"piratage-uber-scenario.jpeg\" width=\"698\" \/><\/p>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Le d\u00e9veloppement de logiciel peut n\u00e9cessiter la r\u00e9alisation de tests unitaires plusieurs centaines de fois par jour, et d\u00e9pendre de modules externes h\u00e9berg\u00e9s sur AWS par exemple. En cons\u00e9quence, ces tests reposent sur des connections\/authentifications entre le code pr\u00e9sent sur GitHub et l\u2019environnement d\u2019exploitation d\u2019AWS. Pour simplifier\/acc\u00e9l\u00e9rer\/automatiser la phase de tests, les ing\u00e9nieurs ont parfois tendance \u00e0 inclure les identifiants de connections en dur dans le code source, ouvrant un plein acc\u00e8s \u00e0 la plateforme d\u2019exploitation \u2026<\/span><\/p>\n<h2>Comment une solution PAM aurait-elle pu stopper le piratage d&rsquo;Uber ?<\/h2>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Il est facile de pointer du doigt les ing\u00e9nieurs en soulignant qu\u2019ils auraient d\u00fb respecter un minimum de proc\u00e9dures de s\u00e9curit\u00e9. Cependant, posez-vous cette question :<\/span><\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f37300;\"><strong><em>Fermez-vous votre porte d&rsquo;entr\u00e9e \u00e0 double tour \u00e0 chaque fois que vous allez chercher le courrier ?<\/em><\/strong><\/span><\/p>\n<\/blockquote>\n<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">Il en va de m\u00eame pour les phases de tests, effectu\u00e9s rapidement et \u00e0 r\u00e9p\u00e9tition. Encore une fois, le piratage des comptes GitHub reste obscur. Une chose est cependant certaine ; il existe des outils suffisamment puissants et flexibles pour renforcer la s\u00e9curit\u00e9 du stockage et de l\u2019utilisation des identifiants permettant les connections entre les plateformes de production (GitHub) et d\u2019exploitation (AWS). Ces outils garantissent la s\u00e9curit\u00e9 des mots de passe tout en fournissant aux d\u00e9veloppeurs la flexibilit\u00e9 dont ils ont besoin pour continuer leurs tests sereinement, sans \u00eatre tent\u00e9s de contourner la solution. Les solutions de <a href=\"https:\/\/www.wallix.com\/fr\/produits\/gestion-des-acces-a-privileges\/\" target=\"_blank\" rel=\"noopener\">gestion des acc\u00e8s \u00e0 privil\u00e8ges (PAM)<\/a> permettent de contr\u00f4ler les acc\u00e8s utilisateurs et leurs activit\u00e9s sur les syst\u00e8mes cibles. Elles r\u00e9duisent drastiquement les vuln\u00e9rabilit\u00e9s r\u00e9sultant d\u2019erreurs humaines ou de n\u00e9gligences et prot\u00e8gent les actifs strat\u00e9giques des soci\u00e9t\u00e9s.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: right;\"><span style=\"color: #f37300;\"><strong><em>Une solution PAM aurait permis de prot\u00e9ger les acc\u00e8s \u00e0 la plateforme AWS, m\u00eame en cas de d\u00e9tournement des comptes GitHub.<\/em><\/strong><\/span><\/p>\n<\/blockquote>\n<p><img decoding=\"async\" src=\"https:\/\/cdn2.hubspot.net\/hub\/514643\/hubfs\/piratage-uber-pam.jpeg?width=685&amp;name=piratage-uber-pam.jpeg\" alt=\"piratage-uber-pam.jpeg\" width=\"685\" \/><\/p>\n<p>La solution de PAM propos\u00e9e par WALLIX &#8211; le Bastion, offre un nombre important de fonctionnalit\u00e9s con\u00e7ues sp\u00e9cifiquement pour stopper les menaces internes comme les intrusions malveillantes. Dans le cas d\u2019Uber, certaines de ces fonctionnalit\u00e9s auraient pu aider \u00e0 contrer la cyber-attaque :<\/p>\n<ul>\n<li>Application-to-Application Password Management (AAPM), de sorte qu\u2019une application identifi\u00e9e &#8211; et seulement cette application, puisse acc\u00e9der aux identifiants de connexion de AWS, s\u00e9curis\u00e9s dans le coffre-fort du Bastion.<\/li>\n<li>Le Bastion de WALLIX peut \u00e9galement \u00eatre utilis\u00e9 pour faire en sorte que des utilisateurs puisse acc\u00e9der \u00e0 une plateforme sans jamais en avoir les identifiants. Ainsi, tout comportement d\u00e9viant, comme rebondir sur d\u2019autre syst\u00e8me ou ex\u00e9cuter des commandes interdites sera automatiquement identifi\u00e9, report\u00e9, et la session automatiquement interrompue par le Bastion.<\/li>\n<li>Une autre alternative aurait \u00e9t\u00e9 d\u2019utiliser les fonctionnalit\u00e9s de forward d\u2019agent SSH du Bastion de WALLIX pour permettre aux d\u00e9veloppeurs d\u2019utiliser automatiquement leurs clefs priv\u00e9es pour se connecter sur les diff\u00e9rentes plateformes, sans avoir \u00e0 re-saisir leurs identifiants, et sans stocker ces identifiants sur le serveur de production.<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36\">\n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-600px;\nmargin-bottom:0;\n}\n.flex_column.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-av_one_third-8b3a908a4c9229354e4fe1a0efcfaf36 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-av_social_share-0a73d8854da5c7c5d5ad87c7877e27c0 av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Partager cet article<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur X\" href='https:\/\/twitter.com\/share?text=Piratage%20%3A%20Quand%20la%20s%C3%A9curit%C3%A9%20compte%20pour%20d%E2%80%99Uber&#038;url=https:\/\/www.wallix.com\/fr\/?p=38523' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur X'><span class='avia_hidden_link_text'>Partager sur X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Partager sur LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Piratage%20%3A%20Quand%20la%20s%C3%A9curit%C3%A9%20compte%20pour%20d%E2%80%99Uber&#038;url=https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager sur LinkedIn'><span class='avia_hidden_link_text'>Partager sur LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Partager par Mail\" href='mailto:?subject=Piratage%20%3A%20Quand%20la%20s%C3%A9curit%C3%A9%20compte%20pour%20d%E2%80%99Uber&#038;body=https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Partager par Mail'><span class='avia_hidden_link_text'>Partager par Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-97d9f49f990ddcfd6e03daaeba0494be\">\n#top .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-97d9f49f990ddcfd6e03daaeba0494be .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-97d9f49f990ddcfd6e03daaeba0494be av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >contenus associ\u00e9s<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-ls8q85tv-7537594bf16f94167ea85aa3c662ead2  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86673 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : La partie la plus dangereuse de l&#039;attaque s&#039;est produite des mois avant que quiconque ne s&#039;en rende compte\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-30T10:24:20+01:00\" >30 Mars 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/la-partie-la-plus-dangereuse-de-lattaque-sest-produite-des-mois-avant-que-quiconque-ne-sen-rende-compte\/' title='Lier vers : La partie la plus dangereuse de l&rsquo;attaque s&rsquo;est produite des mois avant que quiconque ne s&rsquo;en rende compte'>La partie la plus dangereuse de l&rsquo;attaque s&rsquo;est produite des mois avant que quiconque ne s&rsquo;en rende compte<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-86007 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Web Session Manager - Le pilier d&#039;une strat\u00e9gie PAM efficace\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-16T14:15:26+01:00\" >16 Mars 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/web-session-manager-le-pilier-dune-strategie-pam-efficace\/' title='Lier vers : Web Session Manager &#8211; Le pilier d&rsquo;une strat\u00e9gie PAM efficace'>Web Session Manager &#8211; Le pilier d&rsquo;une strat\u00e9gie PAM efficace<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-86003 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Qu\u2019est-ce que le ZERO TRUST ?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-16T14:14:47+01:00\" >16 Mars 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/quest-ce-que-le-zero-trust\/' title='Lier vers : Qu\u2019est-ce que le ZERO TRUST ?'>Qu\u2019est-ce que le ZERO TRUST ?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-70421 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Qu&#039;est-ce que la Gestion de l&#039;\u00c9l\u00e9vation et de la D\u00e9l\u00e9gation des Privil\u00e8ges (PEDM) ?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-03-26T13:14:45+01:00\" >26 Mars 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/pedm-gestion-de-elevation-t-delegation-des-privileges\/' title='Lier vers : Qu&rsquo;est-ce que la Gestion de l&rsquo;\u00c9l\u00e9vation et de la D\u00e9l\u00e9gation des Privil\u00e8ges (PEDM) ?'>Qu&rsquo;est-ce que la Gestion de l&rsquo;\u00c9l\u00e9vation et de la D\u00e9l\u00e9gation des Privil\u00e8ges (PEDM) ?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68427 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Gestionnaire de session : Qu&#039;est-ce que c&#039;est et pourquoi vous en avez besoin\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T16:07:06+01:00\" >12 F\u00e9vrier 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/blogpost\/gestionnaire-de-session-quest-ce-que-cest-et-pourquoi-vous-en-avez-besoin\/' title='Lier vers : Gestionnaire de session : Qu&rsquo;est-ce que c&rsquo;est et pourquoi vous en avez besoin'>Gestionnaire de session : Qu&rsquo;est-ce que c&rsquo;est et pourquoi vous en avez besoin<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-7b60af3a779ac8669615c90b07612884\">\n#top .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-7b60af3a779ac8669615c90b07612884 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-7b60af3a779ac8669615c90b07612884 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >ressources associ\u00e9es <\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-af89a52d51412774536fa272e468f7cd\">\n#top .hr.hr-invisible.av-av_hr-af89a52d51412774536fa272e468f7cd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-af89a52d51412774536fa272e468f7cd hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-ls8q7trc-00dae8394a70a25011d06da474b1a9f2  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-83623 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Efficacit\u00e9 et s\u00e9curit\u00e9 : renforcer les op\u00e9rations OT avec un acc\u00e8s \u00e0 distance ma\u00eetris\u00e9\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T15:48:02+01:00\" >27 Janvier 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ressources\/webinars-fr\/efficacite-et-securite-renforcer-les-operations-ot-avec-un-acces-a-distance-maitrise\/' title='Lier vers : Efficacit\u00e9 et s\u00e9curit\u00e9 : renforcer les op\u00e9rations OT avec un acc\u00e8s \u00e0 distance ma\u00eetris\u00e9'>Efficacit\u00e9 et s\u00e9curit\u00e9 : renforcer les op\u00e9rations OT avec un acc\u00e8s \u00e0 distance ma\u00eetris\u00e9<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-83614 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : WALLIX One Console : Le point de contr\u00f4le central pour un PAM scalable, s\u00e9curis\u00e9 et performant - Session mars\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T15:39:47+01:00\" >27 Janvier 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ressources\/webinars-fr\/wallix-one-console-le-point-de-controle-central-pour-un-pam-scalable-securise-et-performant-2\/' title='Lier vers : WALLIX One Console : Le point de contr\u00f4le central pour un PAM scalable, s\u00e9curis\u00e9 et performant &#8211; Session mars'>WALLIX One Console : Le point de contr\u00f4le central pour un PAM scalable, s\u00e9curis\u00e9 et performant &#8211; Session mars<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-83585 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : WALLIX One Console : Le point de contr\u00f4le central pour un PAM scalable, s\u00e9curis\u00e9 et performant - Session f\u00e9vrier\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T15:25:34+01:00\" >27 Janvier 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ressources\/webinars-fr\/wallix-one-console-le-point-de-controle-central-pour-un-pam-scalable-securise-et-performant\/' title='Lier vers : WALLIX One Console : Le point de contr\u00f4le central pour un PAM scalable, s\u00e9curis\u00e9 et performant &#8211; Session f\u00e9vrier'>WALLIX One Console : Le point de contr\u00f4le central pour un PAM scalable, s\u00e9curis\u00e9 et performant &#8211; Session f\u00e9vrier<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65687 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Webinaire Client | WALLIX Pr\u00e9sente WALLIX One PAM en mode SAAS\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-15T13:03:24+01:00\" >15 Novembre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ressources\/webinars-fr\/webinaire-client-wallix-presente-wallix-one-pam-en-mode-saas\/' title='Lier vers : Webinaire Client | WALLIX Pr\u00e9sente WALLIX One PAM en mode SAAS'>Webinaire Client | WALLIX Pr\u00e9sente WALLIX One PAM en mode SAAS<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-65667 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Articles : Optimisez votre politique de s\u00e9curit\u00e9 en combinant gouvernance et gestion des acc\u00e8s \u00e0 privil\u00e8ges dans des environnements IT \/ OT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-11-15T12:41:36+01:00\" >15 Novembre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/fr\/ressources\/webinars-fr\/optimisez-votre-politique-de-securite-en-combinant-gouvernance-et-gestion-des-acces-a-privileges-dans-des-environnements-it-ot\/' title='Lier vers : Optimisez votre politique de s\u00e9curit\u00e9 en combinant gouvernance et gestion des acc\u00e8s \u00e0 privil\u00e8ges dans des environnements IT \/ OT'>Optimisez votre politique de s\u00e9curit\u00e9 en combinant gouvernance et gestion des acc\u00e8s \u00e0 privil\u00e8ges dans des environnements IT \/ OT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":73320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1640,1788],"tags":[],"class_list":["post-38523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-gestion-des-acces-a-privileges-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-26T15:32:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-10T12:53:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1453\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber\",\"datePublished\":\"2023-12-26T15:32:15+00:00\",\"dateModified\":\"2026-02-10T12:53:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/\"},\"wordCount\":2591,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/nhi-scaled.jpeg\",\"articleSection\":[\"BLOGPOST\",\"GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/\",\"name\":\"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/nhi-scaled.jpeg\",\"datePublished\":\"2023-12-26T15:32:15+00:00\",\"dateModified\":\"2026-02-10T12:53:52+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/blogpost\\\/piratage-quand-la-securite-compte-pour-duber\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/nhi-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/nhi-scaled.jpeg\",\"width\":2560,\"height\":1453,\"caption\":\"Logo\\\/banner for NHI, reflecting Wallix\u2019s partnership with this organization to strengthen privileged access management and identity security. The image underscores Wallix\u2019s network of trusted partners committed to secure IAM solutions.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/fr\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/","og_locale":"fr_FR","og_type":"article","og_title":"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber - WALLIX","og_url":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/","og_site_name":"WALLIX","article_published_time":"2023-12-26T15:32:15+00:00","article_modified_time":"2026-02-10T12:53:52+00:00","og_image":[{"width":2560,"height":1453,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"\u00c9crit par":"WALLIX","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber","datePublished":"2023-12-26T15:32:15+00:00","dateModified":"2026-02-10T12:53:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/"},"wordCount":2591,"publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-scaled.jpeg","articleSection":["BLOGPOST","GESTION DES ACC\u00c8S \u00c0 PRIVIL\u00c8GES"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/","url":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/","name":"Piratage : Quand la s\u00e9curit\u00e9 compte pour d\u2019Uber - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-scaled.jpeg","datePublished":"2023-12-26T15:32:15+00:00","dateModified":"2026-02-10T12:53:52+00:00","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/blogpost\/piratage-quand-la-securite-compte-pour-duber\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2025\/06\/nhi-scaled.jpeg","width":2560,"height":1453,"caption":"Logo\/banner for NHI, reflecting Wallix\u2019s partnership with this organization to strengthen privileged access management and identity security. The image underscores Wallix\u2019s network of trusted partners committed to secure IAM solutions."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/fr\/#website","url":"https:\/\/www.wallix.com\/fr\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/fr\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/fr\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/fr\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/comments?post=38523"}],"version-history":[{"count":9,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38523\/revisions"}],"predecessor-version":[{"id":84136,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/posts\/38523\/revisions\/84136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media\/73320"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/media?parent=38523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/categories?post=38523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/fr\/wp-json\/wp\/v2\/tags?post=38523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}