{"id":1769,"date":"2020-02-26T10:30:18","date_gmt":"2020-02-26T09:30:18","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1769"},"modified":"2020-02-27T10:33:26","modified_gmt":"2020-02-27T09:33:26","slug":"la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/","title":{"rendered":"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS"},"content":{"rendered":"\n<p>Selon\nun <strong><a href=\"https:\/\/www.techzimo.com\/a-security-mishap-left-remine-wide-open-to-hackers\/\">rapport\nr\u00e9cent<\/a><\/strong>, une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur le portail\nRemine Real Estate. La start-up immobili\u00e8re a laiss\u00e9 sa s\u00e9curit\u00e9 ouverte \u00e0\ntoute personne ext\u00e9rieure \u00e0 l&rsquo;entreprise pour qu&rsquo;elle puisse l&rsquo;explorer. Le\nrapport indique que l&rsquo;incident de s\u00e9curit\u00e9 a permis un acc\u00e8s non autoris\u00e9 au\nportail de la soci\u00e9t\u00e9, car des personnes ext\u00e9rieures pouvaient acc\u00e9der aux\ninformations personnelles des vendeurs et des locataires.<\/p>\n\n\n\n<p>R\u00e9cemment,\nla soci\u00e9t\u00e9 a d\u00e9clar\u00e9 avoir recueilli des donn\u00e9es \u00absur 150 millions de\npropri\u00e9t\u00e9s dans les 50 \u00c9tats\u00bb. Cependant, une telle quantit\u00e9 de donn\u00e9es a \u00e9t\u00e9\nlaiss\u00e9e vuln\u00e9rable r\u00e9cemment et les hackers auraient pu en faire un exploit.<\/p>\n\n\n\n<p>L&rsquo;ann\u00e9e\nderni\u00e8re, la soci\u00e9t\u00e9 a r\u00e9alis\u00e9 un investissement de 30 millions de dollars pour\nam\u00e9liorer sa plateforme de collecte de donn\u00e9es et de renseignements\nimmobiliers. <\/p>\n\n\n\n<p><strong>Vuln\u00e9rabilit\u00e9\ncaus\u00e9e par un syst\u00e8me mal configur\u00e9<\/strong><\/p>\n\n\n\n<p>La\ncause de cette <strong><a href=\"https:\/\/koddos.net\/blog\/nsa-rebuilding-its-reputation-by-reporting-a-vulnerability-in-microsoft-systems\/\">vuln\u00e9rabilit\u00e9<\/a><\/strong>\nest connue comme \u00e9tant un syst\u00e8me mal configur\u00e9. Elle a \u00e9t\u00e9 d\u00e9couverte dans\nl&rsquo;environnement de d\u00e9veloppement de l&rsquo;entreprise, qui, bien que prot\u00e9g\u00e9 par un\nmot de passe, permettait \u00e0 des personnes qui ne travaillaient pas de s&rsquo;inscrire\net de se connecter pour acc\u00e9der au portail.<\/p>\n\n\n\n<p>Les\nd\u00e9veloppeurs du portail Remine partageaient des mots de passe, des secrets et\ndes cl\u00e9s priv\u00e9es, ce qui aurait pu permettre aux <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-abusing-paypal-accounts-make-mass-unauthorized-payments\/\">hackers<\/a><\/strong>\nd&rsquo;acc\u00e9der \u00e0 l&rsquo;espace de travail et aux bases de donn\u00e9es priv\u00e9es de Remine. Le\nhacker malveillant aurait pu profiter de cette vuln\u00e9rabilit\u00e9 pour prendre le\ncontr\u00f4le des serveurs de stockage Amazon Web Services de l&rsquo;entreprise.<\/p>\n\n\n\n<p>Un\nchercheur de la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 SpideSilk, Mossab Hussein, a d\u00e9couvert\nla vuln\u00e9rabilit\u00e9 et a inform\u00e9 TechCrunch de ses d\u00e9couvertes.<\/p>\n\n\n\n<p>Il\na d\u00e9clar\u00e9 que les cl\u00e9s priv\u00e9es vuln\u00e9rables permettaient un acc\u00e8s total aux\nserveurs de stockage de l&rsquo;entreprise qui contient des documents d&rsquo;une valeur de\nplus de 10 ans, qui comprennent les adresses des vendeurs et des clients, les\ncontrats de location et les titres de propri\u00e9t\u00e9. <\/p>\n\n\n\n<p>De\nplus, l&rsquo;un de ces documents contient des informations personnelles, notamment\nles noms, les informations d&rsquo;identification personnelle et les adresses des\nlocataires. <\/p>\n\n\n\n<p>Lorsque\nRemine a \u00e9t\u00e9 inform\u00e9 de la vuln\u00e9rabilit\u00e9, le co-fondateur de la soci\u00e9t\u00e9,\nJonathan Spinetto, a convenu qu&rsquo;il y avait des failles de s\u00e9curit\u00e9 et la\nsoci\u00e9t\u00e9 a remplac\u00e9 ses cl\u00e9s priv\u00e9es et ses secrets.<\/p>\n\n\n\n<p>Spinetto\na \u00e9galement r\u00e9v\u00e9l\u00e9 qu&rsquo;il avait envoy\u00e9 une lettre pour informer ses clients de\nla vuln\u00e9rabilit\u00e9 de la s\u00e9curit\u00e9.<\/p>\n\n\n\n<p>En\noutre, la soci\u00e9t\u00e9 a fait appel aux services de Crypsis, une soci\u00e9t\u00e9 de\ncybers\u00e9curit\u00e9, pour enqu\u00eater sur la situation. Il a en outre d\u00e9clar\u00e9 que la\nsoci\u00e9t\u00e9 va adh\u00e9rer aux r\u00e8gles n\u00e9cessaires de notification des <strong><a href=\"https:\/\/koddos.net\/blog\/mixcloud-suffers-a-data-breach-that-exposed-20-million-accounts\/\">violations\nde donn\u00e9es<\/a><\/strong> apr\u00e8s son enqu\u00eate.<\/p>\n\n\n\n<p>Cependant,\nRemine a eu la chance que les attaquants ne se soient pas encore jet\u00e9s sur le\nr\u00e9seau vuln\u00e9rable. La soci\u00e9t\u00e9 immobili\u00e8re proc\u00e8de \u00e0 un correctif de maintenance\npour corriger les failles, car une enqu\u00eate sur l&rsquo;incident est toujours en\ncours.<\/p>\n\n\n\n<p>L<strong>es entreprises toujours confront\u00e9es \u00e0 des\nprobl\u00e8mes de vuln\u00e9rabilit\u00e9<\/strong><\/p>\n\n\n\n<p>La\nvuln\u00e9rabilit\u00e9 de la s\u00e9curit\u00e9 appara\u00eet au milieu de rapports faisant \u00e9tat de\nplusieurs probl\u00e8mes de vuln\u00e9rabilit\u00e9 sur diff\u00e9rentes plateformes. Les probl\u00e8mes\nde s\u00e9curit\u00e9 ont constitu\u00e9 un d\u00e9fi pour de nombreuses entreprises et\norganisations. Et la vuln\u00e9rabilit\u00e9 de Remine nous rappelle qu&rsquo;aucune entreprise\nou organisation n&rsquo;est \u00e0 l&rsquo;abri des <strong><a href=\"https:\/\/koddos.net\/blog\/atm-tests-reveal-surprising-security-flaws\/\">failles\nde s\u00e9curit\u00e9<\/a><\/strong>. Les plus grandes multinationales et m\u00eame les\nentreprises technologiques ont connu des failles de s\u00e9curit\u00e9, dont certaines\nn&rsquo;ont pas eu la chance d&rsquo;\u00e9viter d&rsquo;\u00eatre attaqu\u00e9es. <\/p>\n\n\n\n<p>Remine\naura la chance de ne pas voir son syst\u00e8me infiltr\u00e9 \u00e0 cause de cette\nvuln\u00e9rabilit\u00e9. \u00c0 partir des rapports qu&rsquo;elle aura recueillis, l&rsquo;entreprise va\ninformer ses clients et le public de tout nouveau progr\u00e8s sur la situation.<\/p>\n\n\n\n<p>Remine\nest une plateforme immobili\u00e8re qui met en relation les pr\u00eateurs, les agents,\nles consommateurs et les autres fournisseurs de services sur une m\u00eame\nplateforme afin d&rsquo;aider chacun \u00e0 avoir un meilleur acc\u00e8s aux donn\u00e9es. La\nsoci\u00e9t\u00e9 met cette plateforme \u00e0 la disposition des pr\u00eateurs, des consommateurs\net d&rsquo;autres prestataires de services afin de garantir la meilleure transaction\npossible.<\/p>\n\n\n\n<p>En\n2018, la soci\u00e9t\u00e9 a lanc\u00e9 sa plateforme mobile, la rendant disponible sur les\nappareils Android et Apple. L&rsquo;application de base robuste permet \u00e0 ses membres\net utilisateurs d&rsquo;acc\u00e9der au portail lorsqu&rsquo;ils sont en d\u00e9placement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selon un rapport r\u00e9cent, une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur le portail Remine Real Estate. La start-up immobili\u00e8re a laiss\u00e9 sa s\u00e9curit\u00e9 ouverte \u00e0 toute personne ext\u00e9rieure \u00e0 l&rsquo;entreprise pour qu&rsquo;elle puisse l&rsquo;explorer. Le rapport indique que l&rsquo;incident de s\u00e9curit\u00e9 a permis un acc\u00e8s non autoris\u00e9 au portail de la soci\u00e9t\u00e9, car des &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1770,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-1769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Selon un rapport r\u00e9cent, une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur le portail Remine Real Estate. La start-up immobili\u00e8re a laiss\u00e9 sa s\u00e9curit\u00e9 ouverte \u00e0 toute personne ext\u00e9rieure \u00e0 l&rsquo;entreprise pour qu&rsquo;elle puisse l&rsquo;explorer. Le rapport indique que l&rsquo;incident de s\u00e9curit\u00e9 a permis un acc\u00e8s non autoris\u00e9 au portail de la soci\u00e9t\u00e9, car des &hellip; Continue reading LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-26T09:30:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-27T09:33:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS\",\"datePublished\":\"2020-02-26T09:30:18+00:00\",\"dateModified\":\"2020-02-27T09:33:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/\"},\"wordCount\":832,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/\",\"name\":\"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-02-26T09:30:18+00:00\",\"dateModified\":\"2020-02-27T09:33:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/","og_locale":"fr_FR","og_type":"article","og_title":"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS - Blog KoDDoS","og_description":"Selon un rapport r\u00e9cent, une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur le portail Remine Real Estate. La start-up immobili\u00e8re a laiss\u00e9 sa s\u00e9curit\u00e9 ouverte \u00e0 toute personne ext\u00e9rieure \u00e0 l&rsquo;entreprise pour qu&rsquo;elle puisse l&rsquo;explorer. Le rapport indique que l&rsquo;incident de s\u00e9curit\u00e9 a permis un acc\u00e8s non autoris\u00e9 au portail de la soci\u00e9t\u00e9, car des &hellip; Continue reading LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS","og_url":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-02-26T09:30:18+00:00","article_modified_time":"2020-02-27T09:33:26+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS","datePublished":"2020-02-26T09:30:18+00:00","dateModified":"2020-02-27T09:33:26+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/"},"wordCount":832,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/","url":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/","name":"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1","datePublished":"2020-02-26T09:30:18+00:00","dateModified":"2020-02-27T09:33:26+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/la-vulnerabilite-de-la-securite-de-remine-ouvre-la-porte-aux-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LA VULN\u00c9RABILIT\u00c9 DE LA S\u00c9CURIT\u00c9 DE REMINE OUVRE LA PORTE AUX HACKERS"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/02\/Most-Commonly-Used-Brands-By-Hackers-Trying-to-Perpetrate-Phishing-Attacks.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-sx","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1769"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1769\/revisions"}],"predecessor-version":[{"id":1771,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1769\/revisions\/1771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1770"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}