
{"id":7244,"date":"2025-10-11T16:30:37","date_gmt":"2025-10-11T14:30:37","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=7244"},"modified":"2025-10-11T16:37:22","modified_gmt":"2025-10-11T14:37:22","slug":"piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/","title":{"rendered":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/d524f3762340826\/1200x800\/smart\/red-hat.jpg\" alt=\"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos. \u00a9 zimmytws \/ Shutterstock\" \/><\/p>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<h2 class=\"sc-29e2a271-0 jjhUrQ\"><strong>L\u2019affaire Red Hat vient de prendre une tournure plus inqui\u00e9tante. Apr\u00e8s avoir revendiqu\u00e9 le vol massif de donn\u00e9es techniques chez l\u2019\u00e9diteur open source, le groupe Crimson Collective s\u2019est alli\u00e9 aux Scattered Lapsus$ Hunters pour faire plier l\u2019\u00e9diteur.<\/strong><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div><\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-4d7ec7a0-1 cGqHvW\">\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Selon les informations rapport\u00e9es par\u00a0<em>BleepingComputer<\/em>, le groupe Crimson Collective, d\u00e9j\u00e0 responsable du\u00a0piratage <a class=\"un-styled-linked sc-74cbb8ed-0 glaUMp\" href=\"https:\/\/www.clubic.com\/actualite-581719-red-hat-confirme-avoir-ete-pirate-des-donnees-sensibles-de-clients-ont-fuite.html\" target=\"_blank\" rel=\"noopener\">d\u2019un <\/a>serveur GitLab de Red Hat\u00a0Consulting, vient d\u2019annoncer une alliance avec les\u00a0Scattered Lapsus$ Hunters. Ce m\u00e9ga-collectif de hackers, qui avait r\u00e9cemment annonc\u00e9 tirer sa r\u00e9v\u00e9rence, joue finalement les prolongations \u2013 surprise, non \u2013 pour mener une campagne d\u2019extorsion plus structur\u00e9e. Les assaillants utilisent d\u00e9sormais la plateforme de fuite de donn\u00e9es\u00a0ShinyHunters pour menacer de publier l\u2019int\u00e9gralit\u00e9 des informations vol\u00e9es si aucun accord n\u2019est trouv\u00e9 d\u2019ici le 10 octobre.<\/p>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<h2 class=\"sc-9e5e0317-0 SrXWJ\">La rencontre de deux collectifs de hackers qui rebat les cartes<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"2269.699951171875\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">Pour rappel, la semaine derni\u00e8re, Crimson Collective avait revendiqu\u00e9 le vol de pr\u00e8s de 570 Go de donn\u00e9es issues d\u2019environ 28 000 d\u00e9p\u00f4ts GitLab internes, dont plusieurs centaines de Customer Engagement Reports (CER). Ces documents, produits lors de missions de conseil, peuvent contenir des informations techniques extr\u00eamement sensibles sur les environnements et l\u2019architecture informatique des clients, au point que leur divulgation pourrait offrir \u00e0 des attaquants un plan d\u00e9taill\u00e9 pour cibler des syst\u00e8mes critiques. Red Hat avait alors confirm\u00e9 l\u2019intrusion, isol\u00e9 l\u2019instance compromise et assur\u00e9 que ses produits ainsi que sa cha\u00eene d\u2019approvisionnement logicielle n\u2019\u00e9taient pas affect\u00e9s.<\/p>\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"2547.050048828125\"><\/div>\n<\/div>\n<p class=\"sc-29e2a271-0 jjhUrQ\">De son c\u00f4t\u00e9, Crimson Collective avait quand m\u00eame tent\u00e9, sans succ\u00e8s, d\u2019extorquer l\u2019\u00e9diteur open source. Manifestement las de ses \u00e9checs, le groupe a fini par enclencher la seconde, et la situation vient officiellement de basculer dans une phase plus agressive. Sur leur groupe\u00a0Telegram, les pirates ont en effet annonc\u00e9 s\u2019allier aux Scattered Lapsus$ Hunters et s\u2019appuyer sur l\u2019infrastructure d\u2019extorsion de ShinyHunters, qui h\u00e9berge les premi\u00e8res fuites et menace de publier l\u2019int\u00e9gralit\u00e9 des donn\u00e9es vol\u00e9es si Red Hat refuse de n\u00e9gocier avant le 10 octobre.<\/p>\n<div>\n<div class=\"optidigital-wrapper-div\" data-optidigital-slot=\"true\">\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\">D\u2019apr\u00e8s Bleeping Computer, des \u00e9chantillons de CER ont d\u00e9j\u00e0 \u00e9t\u00e9 mis en ligne, dont des informations sur des clients majeurs tels que Walmart, HSBC, Bank of Canada, Atos Group, American Express, le Department of Defence ou encore SFR. Contact\u00e9 par\u00a0<em>BleepingComputer<\/em>, Red Hat n\u2019a pas encore comment\u00e9 cette nouvelle \u00e9tape.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"2956\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-4d7ec7a0-1 cGqHvW\">\n<figure class=\"sc-4d7ec7a0-0 fxIHQO\">\n<section data-hydration-on-demand=\"true\"><picture class=\"sc-47b37427-3 iPqkBe sc-9c0fa451-0 QhPqW loaded\"><source srcset=\"\/\/pic.clubic.com\/d98c8d982340823\/673x336\/smart\/piratage-red-hat.webp 2x\" type=\"image\/webp\" media=\"(max-width: 768px)\" sizes=\"673px\" \/><source srcset=\"\/\/pic.clubic.com\/d98c8d982340823\/673x336\/smart\/piratage-red-hat.webp 1x\" type=\"image\/webp\" media=\"(min-width: 769px)\" sizes=\"673px\" \/><source srcset=\"\/\/pic.clubic.com\/acc0377c2340823\/673x336\/smart\/piratage-red-hat.jpg 2x\" media=\"(max-width: 768px)\" sizes=\"673px\" \/><\/picture><\/section>\n<section data-hydration-on-demand=\"true\"><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/v1\/images\/2340823\/raw?fit=smartCrop&amp;width=673&amp;height=336&amp;hash=d5a4d9217cac62f5c0139c976ede0785543bca1f\" \/><\/section>\n<\/figure>\n<section data-hydration-on-demand=\"true\">\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<h2><\/h2>\n<h2 class=\"sc-9e5e0317-0 SrXWJ\">D\u2019un chantage rat\u00e9 \u00e0 l\u2019op\u00e9ration d\u2019extorsion structur\u00e9e<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"3501.199951171875\">Evidemment, l\u2019arriv\u00e9e des Scattered Lapsus$ Hunters change tout \u00e0 la nature de l\u2019affaire. Ce qui n\u2019\u00e9tait au d\u00e9part qu\u2019une tentative d\u2019extorsion opportuniste s\u2019est d\u00e9finitivement mu en campagne organis\u00e9e, port\u00e9e par une infrastructure taill\u00e9e pour diffuser des donn\u00e9es vol\u00e9es et maintenir la pression sur la victime. En changeant d\u2019\u00e9chelle, Crimson Collective s\u2019est ainsi assur\u00e9 que l\u2019op\u00e9ration gagne en visibilit\u00e9 et en capacit\u00e9 de nuisance, alors qu\u2019elle s\u2019apparentait jusqu\u2019ici \u00e0 une tentative de chantage un peu maladroite.<\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"3720.25\"><\/div>\n<\/div>\n<p class=\"sc-29e2a271-0 jjhUrQ\">Pour les organisations clientes de Red Hat Consulting, l\u2019urgence consiste donc \u00e0 \u00e9valuer l\u2019impact potentiel de la fuite et \u00e0 prendre les mesures imm\u00e9diates n\u00e9cessaires. Les cl\u00e9s d\u2019acc\u00e8s, tokens et identifiants techniques qui pourraient se trouver dans les CER doivent \u00eatre r\u00e9voqu\u00e9s sans d\u00e9lai, tandis que les acc\u00e8s internes et les configurations d\u00e9crits dans ces documents doivent \u00eatre pass\u00e9s au peigne fin et ajust\u00e9s pour emp\u00eacher que ces informations sensibles puissent servir de tremplin \u00e0 une intrusion cibl\u00e9e.<\/p>\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"3939.300048828125\"><\/div>\n<\/div>\n<p class=\"sc-29e2a271-0 jjhUrQ\">On en profitera aussi pour rappeler que les instances GitLab autog\u00e9r\u00e9es requi\u00e8rent une attention toute particuli\u00e8re et exigent une maintenance irr\u00e9prochable. Les entreprises qui h\u00e9bergent leur propre serveur doivent appliquer sans d\u00e9lai les mises \u00e0 jour de s\u00e9curit\u00e9, contr\u00f4ler strictement les droits d\u2019acc\u00e8s et surveiller de pr\u00e8s les d\u00e9p\u00f4ts sensibles. Un suivi attentif des journaux d\u2019activit\u00e9 et un renforcement des r\u00e8gles r\u00e9seau peuvent aider \u00e0 d\u00e9tecter plus t\u00f4t une compromission.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div>\n<div class=\"div-breakable\" data-adslot-top=\"4158.35009765625\"><\/div>\n<\/div>\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<p class=\"sc-29e2a271-0 jjhUrQ\"><em><small>Source :\u00a0<\/small><\/em><a class=\"un-styled-linked sc-74cbb8ed-0 glaUMp\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-event=\"click\" data-mrf-recirculation=\"AffiliateLink\" data-mrf-link=\"https:\/\/www.bleepingcomputer.com\/news\/security\/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion\/\"><em><small>BleepingComputer<\/small><\/em><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sc-1034f182-1 gwOHxK\">\n<div class=\"sc-dbdf655-2 jvKxDs row\">\n<div class=\"sc-617cd4a-0 dMyXwD\">\n<div class=\"sc-e85b85f0-0 kLPdJx\">\n<div class=\"sc-e85b85f0-5 fsqgFc\">\n<div class=\"sc-e85b85f0-13 iDAmHw\"><picture class=\"sc-47b37427-3 jKEAgm isEager\"><source srcset=\"\/\/pic.clubic.com\/v1\/images\/2324754\/raw?fit=smartCrop&amp;width=42&amp;height=42&amp;hash=ce085f7f498a168b34f558af2679f84333f1aa88 1x, \/\/pic.clubic.com\/v1\/images\/2324754\/raw?fit=smartCrop&amp;width=84&amp;height=84&amp;hash=0812b2700a0c28b6b673e73ad056e28c32f8c6a0 2x\" type=\"image\/webp\" sizes=\"42px\" \/><\/picture><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019affaire Red Hat vient de prendre une tournure plus inqui\u00e9tante. Apr\u00e8s avoir revendiqu\u00e9 le vol massif de donn\u00e9es techniques chez l\u2019\u00e9diteur open source, le groupe Crimson Collective s\u2019est alli\u00e9 aux [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11],"tags":[],"class_list":["post-7244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"L\u2019affaire Red Hat vient de prendre une tournure plus inqui\u00e9tante. Apr\u00e8s avoir revendiqu\u00e9 le vol massif de donn\u00e9es techniques chez l\u2019\u00e9diteur open source, le groupe Crimson Collective s\u2019est alli\u00e9 aux [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-11T14:30:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-11T14:37:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/social_affiche-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/social_affiche-4.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos\",\"datePublished\":\"2025-10-11T14:30:37+00:00\",\"dateModified\":\"2025-10-11T14:37:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/\"},\"wordCount\":721,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ab-4.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/\",\"name\":\"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ab-4.jpg\",\"datePublished\":\"2025-10-11T14:30:37+00:00\",\"dateModified\":\"2025-10-11T14:37:22+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ab-4.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ab-4.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2025\\\/10\\\/11\\\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/","og_locale":"fr_FR","og_type":"article","og_title":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - ParlonsTechs","og_description":"L\u2019affaire Red Hat vient de prendre une tournure plus inqui\u00e9tante. Apr\u00e8s avoir revendiqu\u00e9 le vol massif de donn\u00e9es techniques chez l\u2019\u00e9diteur open source, le groupe Crimson Collective s\u2019est alli\u00e9 aux [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/","og_site_name":"Parlons Techs - Store","article_published_time":"2025-10-11T14:30:37+00:00","article_modified_time":"2025-10-11T14:37:22+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/social_affiche-4.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/social_affiche-4.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos","datePublished":"2025-10-11T14:30:37+00:00","dateModified":"2025-10-11T14:37:22+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/"},"wordCount":721,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/ab-4.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/","url":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/","name":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/ab-4.jpg","datePublished":"2025-10-11T14:30:37+00:00","dateModified":"2025-10-11T14:37:22+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/ab-4.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2025\/10\/ab-4.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2025\/10\/11\/piratage-de-red-hat-la-situation-empire-alors-quun-mega-collectif-de-hackers-sinvite-dans-les-negos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Piratage de Red Hat : la situation empire alors qu\u2019un m\u00e9ga-collectif de hackers s\u2019invite dans les n\u00e9gos"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=7244"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7244\/revisions"}],"predecessor-version":[{"id":7247,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/7244\/revisions\/7247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/7245"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=7244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=7244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=7244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}