{"id":2552,"date":"2020-09-24T16:00:00","date_gmt":"2020-09-24T14:00:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2552"},"modified":"2020-09-26T16:04:02","modified_gmt":"2020-09-26T14:04:02","slug":"les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/","title":{"rendered":"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE"},"content":{"rendered":"\n<p>Les hackers ont re\u00e7u une invitation ferm\u00e9e \u00e0 se connecter \u00e0 la <strong><a href=\"https:\/\/blog.koddos.net\/hackerone-hackers-earn-100-million-could-earn-1-billion-by-2025\/\">plate-forme HackerOne<\/a><\/strong> et \u00e0 essayer de d\u00e9couvrir toute vuln\u00e9rabilit\u00e9 dans la plate-forme de ConnectWise.<\/p>\n\n\n\n<p>L&rsquo;objectif de la plateforme est de d\u00e9couvrir s&rsquo;il y a des failles et de les corriger avant que les hackers ne les d\u00e9couvrent eux-m\u00eames.<\/p>\n\n\n\n<p><strong>ConnectWise s&rsquo;appr\u00eate \u00e0 renforcer la s\u00e9curit\u00e9<\/strong><\/p>\n\n\n\n<p>En juillet, le MSP a d\u00e9couvert deux failles critiques dans le syst\u00e8me d&rsquo;automatisation ConnectWise, qui constituaient une menace pour les deux clients du MSP si les hackers parvenaient \u00e0 exploiter la vuln\u00e9rabilit\u00e9. Avant l&rsquo;incident, de nombreuses failles avaient \u00e9t\u00e9 d\u00e9couvertes dans le serveur de contr\u00f4le de ConnectWise.<\/p>\n\n\n\n<p>Aujourd&rsquo;hui, il semble que la soci\u00e9t\u00e9 ne prenne aucun risque, puisqu&rsquo;elle a invit\u00e9 les hackers \u00e0 essayer de d\u00e9couvrir s&rsquo;ils pouvaient d\u00e9couvrir une vuln\u00e9rabilit\u00e9.<\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 qu&rsquo;elle s&rsquo;occuperait de toutes les <strong><a href=\"https:\/\/blog.koddos.net\/fbi-warns-on-the-internet-vulnerabilities-of-smart-tvs\/\">vuln\u00e9rabilit\u00e9s<\/a><\/strong> confirm\u00e9es d\u00e9couvertes par le programme, et qu&rsquo;elle divulguerait certains probl\u00e8mes en fonction de leur gravit\u00e9.<\/p>\n\n\n\n<p>Le site ConnectWise Trust a d\u00e9clar\u00e9 qu&rsquo;il continuerait \u00e0 fournir des informations responsables, car il est la principale source d&rsquo;informations sur diff\u00e9rents sujets li\u00e9s \u00e0 la vie priv\u00e9e, \u00e0 la conformit\u00e9 et \u00e0 la s\u00e9curit\u00e9. Il accueille \u00e9galement les alertes et les bulletins de s\u00e9curit\u00e9 de ConnectWise, les mises \u00e0 jour et les correctifs indispensables.<\/p>\n\n\n\n<p>\u00ab\u00a0Notre objectif est de fournir un sc\u00e9nario en situation r\u00e9elle pour le test de nos produits\u00a0\u00bb, a r\u00e9v\u00e9l\u00e9 ConnectWise dans une d\u00e9claration sur son site.<\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 que le programme de prime aux bogues permet de d\u00e9couvrir les probl\u00e8mes, de trouver une solution durable et d&rsquo;aider l&rsquo;entreprise \u00e0 rester plus transparente en ce qui concerne la s\u00e9curit\u00e9 de ses produits.<\/p>\n\n\n\n<p>Ce type d&rsquo;invitation ouverte n&rsquo;est pas nouveau pour ConnectWise, car certaines entreprises pr\u00e9f\u00e8rent garder leur portail plus s\u00fbr en invitant les hackers \u00e0 tenter de s&rsquo;y introduire. Bien entendu, une telle action s&rsquo;accompagne g\u00e9n\u00e9ralement d&rsquo;une r\u00e9compense pour le hacker qui d\u00e9couvre une quelconque <strong><a href=\"https:\/\/blog.koddos.net\/new-bugs-enable-hackers-to-circumvent-mfa-for-microsoft-365\/\">faille existante<\/a><\/strong>. Les entreprises sont g\u00e9n\u00e9ralement ravies de payer de telles r\u00e9compenses si cela permet d&rsquo;am\u00e9liorer la s\u00e9curit\u00e9 de leurs serveurs, car elles peuvent \u00eatre oblig\u00e9es de payer beaucoup plus cher si leur syst\u00e8me est compromis.<\/p>\n\n\n\n<p>L&rsquo;entreprise a toujours fait preuve de franchise dans sa gestion des probl\u00e8mes de vuln\u00e9rabilit\u00e9, avec le programme de prime aux bogues ConnectWise qui compl\u00e8te sa strat\u00e9gie de gestion des bogues. Pour ce programme, ConnectWise collabore avec une plateforme de s\u00e9curit\u00e9 support\u00e9e par les hackers, HackerOne, pour organiser le programme.<\/p>\n\n\n\n<p>Le programme de prime aux bogues encouragera la recherche en mati\u00e8re de s\u00e9curit\u00e9 sur la plateforme, en offrant de l&rsquo;argent \u00e0 toute personne qui trouve une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 sur la plateforme.<\/p>\n\n\n\n<p>Les organisations peuvent d\u00e9couvrir et r\u00e9soudre les probl\u00e8mes de s\u00e9curit\u00e9 lorsqu&rsquo;elles s&rsquo;associent \u00e0 des tiers pour accepter les rapports de vuln\u00e9rabilit\u00e9, ce qui r\u00e9duit au minimum les <strong><a href=\"https:\/\/blog.koddos.net\/iran-backed-hackers-are-exploiting-vpn-flaws-to-hack-top-organizations-fbi-says\/\">risques que les hackers les exploitent<\/a><\/strong>.<\/p>\n\n\n\n<p>Toutefois, ce programme de prime aux bogues ConnectWise n&rsquo;est pas ouvert \u00e0 tous. Il est sp\u00e9cifiquement con\u00e7u pour les hackers invit\u00e9s par la plateforme HackerOne.<\/p>\n\n\n\n<p><strong>Strat\u00e9gies vitales de cybers\u00e9curit\u00e9<\/strong><\/p>\n\n\n\n<p>ConnectWise a d\u00e9clar\u00e9 qu&rsquo;elle a \u00e9t\u00e9 guid\u00e9e par des strat\u00e9gies de s\u00e9curit\u00e9 cl\u00e9s pour am\u00e9liorer la s\u00e9curit\u00e9 de son application, ce qui am\u00e9liorera la r\u00e9putation de l&rsquo;entreprise.<\/p>\n\n\n\n<p>Le programme de prime aux bogues prend note des deux strat\u00e9gies pour am\u00e9liorer la s\u00e9curit\u00e9. Il vient s&rsquo;ajouter aux contr\u00f4les de s\u00e9curit\u00e9 des applications existantes, ce qui offre une \u00e9tendue et une profondeur \u00e0 la communaut\u00e9 de HackerOne.<\/p>\n\n\n\n<p>Alex Rice, directeur de la technologie et fondateur de HackerOne, a comment\u00e9 ce partenariat.<\/p>\n\n\n\n<p>Il a d\u00e9clar\u00e9 que HackerOne a aid\u00e9 plus de 2 000 clients \u00e0 d\u00e9couvrir plus de 180 000 vuln\u00e9rabilit\u00e9s dans leurs syst\u00e8mes et serveurs, ce qui a renforc\u00e9 le cadre de s\u00e9curit\u00e9 des biens num\u00e9riques.<\/p>\n\n\n\n<p>Alex a \u00e9galement rappel\u00e9 que depuis que la plateforme a commenc\u00e9 \u00e0 s&rsquo;associer avec d&rsquo;autres organisations commerciales pour d\u00e9tecter les bogues, les hackers ont gagn\u00e9 plus de 100 millions de dollars en r\u00e9compenses.<\/p>\n\n\n\n<p>C&rsquo;est une bonne compensation pour les entreprises par rapport aux implications techniques, commerciales et juridiques d&rsquo;une violation de s\u00e9curit\u00e9, qui sera bien plus importante que la compensation vers\u00e9e aux hackers \u00e0 chapeau blanc ou white hat, a-t-il poursuivi.<\/p>\n\n\n\n<p><strong>Les experts en s\u00e9curit\u00e9 encouragent la mise en place de programmes de primes aux bogues<\/strong><\/p>\n\n\n\n<p>Selon IBM Security et le Ponemon Institute, les implications financi\u00e8res d&rsquo;une faille de s\u00e9curit\u00e9 s&rsquo;\u00e9l\u00e8vent en moyenne \u00e0 3,86 millions de dollars pour une entreprise.<\/p>\n\n\n\n<p>Les experts en s\u00e9curit\u00e9 saluent \u00e9galement le travail de ces programmes de primes aux bogues, car ils ont contribu\u00e9 \u00e0 r\u00e9duire la fr\u00e9quence des failles de s\u00e9curit\u00e9 et de l&rsquo;exploitation des vuln\u00e9rabilit\u00e9s par les hackers. Beaucoup esp\u00e8rent que d&rsquo;autres entreprises organiseront des programmes similaires pour r\u00e9duire encore plus le niveau d&rsquo;exploitation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les hackers ont re\u00e7u une invitation ferm\u00e9e \u00e0 se connecter \u00e0 la plate-forme HackerOne et \u00e0 essayer de d\u00e9couvrir toute vuln\u00e9rabilit\u00e9 dans la plate-forme de ConnectWise. L&rsquo;objectif de la plateforme est de d\u00e9couvrir s&rsquo;il y a des failles et de les corriger avant que les hackers ne les d\u00e9couvrent eux-m\u00eames. ConnectWise s&rsquo;appr\u00eate \u00e0 renforcer la &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2553,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les hackers ont re\u00e7u une invitation ferm\u00e9e \u00e0 se connecter \u00e0 la plate-forme HackerOne et \u00e0 essayer de d\u00e9couvrir toute vuln\u00e9rabilit\u00e9 dans la plate-forme de ConnectWise. L&rsquo;objectif de la plateforme est de d\u00e9couvrir s&rsquo;il y a des failles et de les corriger avant que les hackers ne les d\u00e9couvrent eux-m\u00eames. ConnectWise s&rsquo;appr\u00eate \u00e0 renforcer la &hellip; Continue reading LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-24T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-26T14:04:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE\",\"datePublished\":\"2020-09-24T14:00:00+00:00\",\"dateModified\":\"2020-09-26T14:04:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/\"},\"wordCount\":904,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/\",\"name\":\"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-09-24T14:00:00+00:00\",\"dateModified\":\"2020-09-26T14:04:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/","og_locale":"fr_FR","og_type":"article","og_title":"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE - Blog KoDDoS","og_description":"Les hackers ont re\u00e7u une invitation ferm\u00e9e \u00e0 se connecter \u00e0 la plate-forme HackerOne et \u00e0 essayer de d\u00e9couvrir toute vuln\u00e9rabilit\u00e9 dans la plate-forme de ConnectWise. L&rsquo;objectif de la plateforme est de d\u00e9couvrir s&rsquo;il y a des failles et de les corriger avant que les hackers ne les d\u00e9couvrent eux-m\u00eames. ConnectWise s&rsquo;appr\u00eate \u00e0 renforcer la &hellip; Continue reading LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE","og_url":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-09-24T14:00:00+00:00","article_modified_time":"2020-09-26T14:04:02+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE","datePublished":"2020-09-24T14:00:00+00:00","dateModified":"2020-09-26T14:04:02+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/"},"wordCount":904,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/","url":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/","name":"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1","datePublished":"2020-09-24T14:00:00+00:00","dateModified":"2020-09-26T14:04:02+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/les-hackers-sont-invites-a-participer-au-programme-de-prime-aux-bogues-de-connectwise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LES HACKERS SONT INVIT\u00c9S \u00c0 PARTICIPER AU PROGRAMME DE PRIME AUX BOGUES DE CONNECTWISE"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Hackers-are-Deploying-Backdoors-on-Microsoft-SQL-Servers.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-Fa","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2552"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2552\/revisions"}],"predecessor-version":[{"id":2555,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2552\/revisions\/2555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2553"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}