[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"article_295":3},{"tableOfContents":4,"markDownContent":5,"htmlContent":6,"metaTitle":5,"metaDescription":5,"wordCount":7,"readTime":7,"title":8,"nbDownloads":7,"excerpt":5,"lang":9,"url":10,"intro":11,"featured":4,"state":12,"author":13,"authorId":14,"datePublication":20,"dateCreation":21,"dateUpdate":21,"mainCategory":22,"categories":37,"metaDatas":43,"imageUrl":5,"imageThumbUrls":44,"id":45},false,null,"\u003Cp>L'ENISA (European Union Agency for Cybersecurity) a publié son rapport annuel sur les cybermenaces couvrant la période de janvier 2019 à avril 2020.\u003C/p>\r\n\u003Cp>\u003Cstrong>Les menaces en image :\u003C/strong>\u003C/p>\r\n\u003Cp>\u003Cimg loading=\"lazy\"  src=\"https://storagealliage.blob.core.windows.net/richtextbackoffice/c3a754e2-898b-4949-8273-bcdf1c9a3b84/2cc190c6-e8bf-4915-b411-3716e1c22512.png\" alt=\"2cc190c6-e8bf-4915-b411-3716e1c22512.png\">\u003C/p>\r\n\u003Cp>\u003Cstrong>Les 15 menaces répertoriées par l'ENISA sont les suivantes :\u003C/strong>\u003C/p>\r\n\u003Cp>Malware\u003Cbr>\r\nAttaques sur le Web\u003Cbr>\r\nPhishing\u003Cbr>\r\nAttaques contre les applications web\u003Cbr>\r\nSPAM\u003Cbr>\r\nDéni de service distribué (DDoS)\u003Cbr>\r\nVol d'identité\u003Cbr>\r\nViolation des données\u003Cbr>\r\nMenaces internes\u003Cbr>\r\nBotnets\u003Cbr>\r\nManipulation physique, dommages, vol et perte\u003Cbr>\r\nFuite d'informations\u003Cbr>\r\nRansomware\u003Cbr>\r\nCyber-espionnage\u003Cbr>\r\nCryptojacking\u003C/p>\r\n\u003Cp>\u003Cstrong>Plus d'infos et détails sur les menaces (en anglais) sur le \u003Ca href=\"https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends\" rel=\"nofollow\">site de l'ENISA.\u003C/a>\u003C/strong>\u003C/p>\r\n",0,"[cybermois] Top 15 des cybermenaces par l'ENISA","fr","top-cybermenaces-2020-enisa","L'ENISA, l'agence européenne de sécurité des systèmes d'information recense les 15 menaces d'attaques informatiques les plus importantes au sein de son rapport sur les cybermenaces 2020.  ","Published",{"id":14,"displayName":15,"avatarUrl":16,"bio":17,"blogUrl":18,"color":5,"userId":14,"creationDate":19},31,"Jérôme de Mercey","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png","COO/cofounder","https://www.dastra.eu","2021-11-15T12:57:57","2020-10-21T08:34:32.315","2020-10-21T08:51:13.8829277",{"id":23,"name":24,"description":25,"url":26,"color":27,"parentId":5,"count":5,"imageUrl":5,"parent":5,"order":7,"translations":28},2,"Blog","A list of curated articles provided by the community","article","#28449a",[29,31,34],{"lang":9,"name":24,"description":30},"Une liste d'articles rédigés par la communauté",{"lang":32,"name":24,"description":33},"es","Una lista de artículos escritos por la comunidad",{"lang":35,"name":24,"description":36},"de","Eine Liste von Artikeln, die von der Community verfasst wurden",[38],{"id":23,"name":24,"description":25,"url":26,"color":27,"parentId":5,"count":5,"imageUrl":5,"parent":5,"order":7,"translations":39},[40,41,42],{"lang":9,"name":24,"description":30},{"lang":32,"name":24,"description":33},{"lang":35,"name":24,"description":36},[],[],295]