{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/","author_name":"Nathaniel Quist","author_url":"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/author\/nathaniel-quist\/","title":"L\u2019\u00e9volution des binaires\u00a0Linux dans les op\u00e9rations cibl\u00e9es sur le cloud","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"aQmShrZtt1\"><a href=\"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/elf-based-malware-targets-cloud\/\">L\u2019\u00e9volution des binaires\u00a0Linux dans les op\u00e9rations cibl\u00e9es sur le cloud<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/origin-unit42.paloaltonetworks.com\/fr\/elf-based-malware-targets-cloud\/embed\/#?secret=aQmShrZtt1\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0L\u2019\u00e9volution des binaires\u00a0Linux dans les op\u00e9rations cibl\u00e9es sur le cloud\u00a0\u00bb &#8212; Unit 42\" data-secret=\"aQmShrZtt1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/origin-unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/06\/02_Cloud_cybersecurity_research_Overview_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"Gr\u00e2ce aux donn\u00e9es issues de ses outils d\u2019apprentissage automatique, Unit 42 pr\u00e9voit une recrudescence des attaques ciblant le cloud via des fichiers ELF (Executable and Linkage Format) Linux r\u00e9utilis\u00e9s ou modifi\u00e9s. Gr\u00e2ce aux donn\u00e9es issues de ses outils d\u2019apprentissage automatique, Unit 42 pr\u00e9voit une recrudescence des attaques ciblant le cloud via des fichiers ELF (Executable and Linkage Format) Linux r\u00e9utilis\u00e9s ou modifi\u00e9s."}