{"id":543,"date":"2019-09-17T12:28:51","date_gmt":"2019-09-17T10:28:51","guid":{"rendered":"https:\/\/www.riviera-networks.com\/?page_id=543"},"modified":"2019-09-18T16:16:22","modified_gmt":"2019-09-18T14:16:22","slug":"security-news","status":"publish","type":"page","link":"https:\/\/www.riviera-networks.com\/fr\/company\/security-news\/","title":{"rendered":"Security News"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"543\" class=\"elementor elementor-543\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ace3f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ace3f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-eaf08b1\" data-id=\"eaf08b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fba34d5 elementor-widget elementor-widget-wp-widget-feedzy_wp_widget\" data-id=\"fba34d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-feedzy_wp_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"feedzy-9c8596bcf299f6b4647c351c7a90fc89 feedzy-rss\"><ul><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/securityaffairs.com\/191018\/ai\/ai-model-claude-opus-turns-bugs-into-exploits-for-just-2283.html\" target=\"\" rel=\" noopener\">AI Model Claude Opus turns bugs into exploits for just $2,283<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Claude Opus created a working Chrome exploit for $2,283, showing that widely available AI models can already find and weaponize vulnerabilities. Claude Opus managed to produce a functional Chrome exploit for just $2,283, raising concerns about how easily AI can be used to find and exploit vulnerabilities. Below is the cost of the experiment: Model<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/securityaffairs.com\/191008\/security\/cyber-attacks-fuel-surge-in-cargo-theft-across-logistics-industry.html\" target=\"\" rel=\" noopener\" title=\"Cyber attacks fuel surge in cargo theft across logistics industry\" style=\"height:150px;width:150px;\"><img decoding=\"async\" src=\"https:\/\/i0.wp.com\/securityaffairs.com\/wp-content\/uploads\/2026\/04\/image-65.png?resize=1024%2C681&#038;ssl=1\" title=\"Cyber attacks fuel surge in cargo theft across logistics industry\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/securityaffairs.com\/191008\/security\/cyber-attacks-fuel-surge-in-cargo-theft-across-logistics-industry.html\" target=\"\" rel=\" noopener\">Cyber attacks fuel surge in cargo theft across logistics industry<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Hackers infiltrate logistics firms to steal cargo and divert payments, cyberattacks are linked to organized crime and rising losses. Proofpoint researchers observed crooks targeting trucking and logistics companies, running coordinated remote access campaigns to steal cargo and divert payments. These attacks appear to be linked to organized crime. The findings highlight a growing trend of<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/securityaffairs.com\/191001\/security\/security-affairs-malware-newsletter-round-93.html\" target=\"\" rel=\" noopener\">SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 93<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape CPU-Z \/ HWMonitor watering hole infection \u2013 a copy-pasted attack\u00a0\u00a0 Fake Claude site installs malware that gives attackers access to your computer\u00a0\u00a0 Malware Analysis Static SKILL for Codex\u00a0\u00a0 JanelaRAT: a financial threat targeting users in Latin<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/securityaffairs.com\/190994\/breaking-news\/security-affairs-newsletter-round-573-by-pierluigi-paganini-international-edition.html\" target=\"\" rel=\" noopener\">Security Affairs newsletter Round 573 by Pierluigi Paganini \u2013 INTERNATIONAL EDITION<\/a><\/span><div class=\"rss_content\" style=\"\"><p>A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Hidden VMs: how hackers leverage QEMU to stealthily steal data and spread malware Nexcorium Mirai variant<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><span class=\"title\"><a href=\"https:\/\/securityaffairs.com\/190982\/security\/hidden-vms-how-hackers-leverage-qemu-to-stealthily-steal-data-and-spread-malware.html\" target=\"\" rel=\" noopener\">Hidden VMs: how hackers leverage QEMU to stealthily steal data and spread malware<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Attackers abuse QEMU to hide malware in virtual machines, bypass detection, steal data, and deploy ransomware without leaving any trace. Sophos researchers report a rise in attackers abusing QEMU, an open-source emulator, to hide malicious activity inside virtual machines. By running malware in a VM, attackers avoid endpoint security controls and leave minimal traces on<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/securityaffairs.com\/190974\/malware\/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-to-launch-ddos-attacks.html\" target=\"\" rel=\" noopener\" title=\"Nexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks\" style=\"height:150px;width:150px;\"><img decoding=\"async\" src=\"https:\/\/i0.wp.com\/securityaffairs.com\/wp-content\/uploads\/2026\/04\/image-63.png?resize=832%2C268&#038;ssl=1\" title=\"Nexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/securityaffairs.com\/190974\/malware\/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-to-launch-ddos-attacks.html\" target=\"\" rel=\" noopener\">Nexcorium Mirai variant exploits TBK DVR flaw to launch DDoS attacks<\/a><\/span><div class=\"rss_content\" style=\"\"><p>A Mirai variant called Nexcorium exploits a flaw in TBK DVRs to infect devices and use them in DDoS attacks, along with outdated TP-Link routers. Fortinet researchers found that threat actors are exploiting vulnerabilities in TBK DVRs and end-of-life TP-Link routers to spread a Mirai variant called Nexcorium. \u201cIoT devices are increasingly prime targets for<\/p><\/div><\/li><\/ul> <\/div><style type=\"text\/css\" media=\"all\">.feedzy-rss .rss_item .rss_image{float:left;position:relative;border:none;text-decoration:none;max-width:100%}.feedzy-rss .rss_item .rss_image span{display:inline-block;position:absolute;width:100%;height:100%;background-position:50%;background-size:cover}.feedzy-rss .rss_item .rss_image{margin:.3em 1em 0 0;content-visibility:auto}.feedzy-rss ul{list-style:none}.feedzy-rss ul li{display:inline-block}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-68dd16d\" data-id=\"68dd16d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ee9750 elementor-widget elementor-widget-wp-widget-feedzy_wp_widget\" data-id=\"1ee9750\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-feedzy_wp_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"feedzy-6ff995f3b1ec2157c53039213e6b3e0a feedzy-rss\"><ul><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/threatpost.com\/student-loan-breach-exposes-2-5m-records\/180492\/\" target=\"\" rel=\" noopener\" title=\"Student Loan Breach Exposes 2.5M Records\" style=\"height:150px;width:150px;\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/103\/2015\/02\/07005821\/data.jpg?w=750&#038;ssl=1\" title=\"Student Loan Breach Exposes 2.5M Records\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/threatpost.com\/student-loan-breach-exposes-2-5m-records\/180492\/\" target=\"\" rel=\" noopener\">Student Loan Breach Exposes 2.5M Records<\/a><\/span><div class=\"rss_content\" style=\"\"><p>2.5 million people were affected, in a breach that could spell more trouble down the line.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/threatpost.com\/watering-hole-attacks-push-scanbox-keylogger\/180490\/\" target=\"\" rel=\" noopener\" title=\"Watering Hole Attacks Push ScanBox Keylogger\" style=\"height:150px;width:150px;\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/103\/2020\/03\/31170116\/watering-hole-e1585688492540.jpg?w=750&#038;ssl=1\" title=\"Watering Hole Attacks Push ScanBox Keylogger\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/threatpost.com\/watering-hole-attacks-push-scanbox-keylogger\/180490\/\" target=\"\" rel=\" noopener\">Watering Hole Attacks Push ScanBox Keylogger<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/threatpost.com\/0ktapus-victimize-130-firms\/180487\/\" target=\"\" rel=\" noopener\" title=\"Tentacles of \u20180ktapus\u2019 Threat Group Victimize 130 Firms\" style=\"height:150px;width:150px;\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/103\/2020\/06\/02111030\/octopus-e1591110643368.jpg?w=750&#038;ssl=1\" title=\"Tentacles of \u20180ktapus\u2019 Threat Group Victimize 130 Firms\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/threatpost.com\/0ktapus-victimize-130-firms\/180487\/\" target=\"\" rel=\" noopener\">Tentacles of \u20180ktapus\u2019 Threat Group Victimize 130 Firms<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/threatpost.com\/ransomware-attacks-are-on-the-rise\/180481\/\" target=\"\" rel=\" noopener\" title=\"Ransomware Attacks are on the Rise\" style=\"height:150px;width:150px;\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/103\/2019\/12\/24125329\/Ransomware_700_420.png?w=750&#038;ssl=1\" title=\"Ransomware Attacks are on the Rise\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/threatpost.com\/ransomware-attacks-are-on-the-rise\/180481\/\" target=\"\" rel=\" noopener\">Ransomware Attacks are on the Rise<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Lockbit is by far this summer\u2019s most prolific ransomware group, trailed by two offshoots of the Conti group.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/threatpost.com\/cybercriminals-are-selling-access-to-chinese-surveillance-cameras\/180478\/\" target=\"\" rel=\" noopener\" title=\"Cybercriminals Are Selling Access to Chinese Surveillance Cameras\" style=\"height:150px;width:150px;\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/103\/2020\/11\/19110609\/iot.jpg?w=750&#038;ssl=1\" title=\"Cybercriminals Are Selling Access to Chinese Surveillance Cameras\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/threatpost.com\/cybercriminals-are-selling-access-to-chinese-surveillance-cameras\/180478\/\" target=\"\" rel=\" noopener\">Cybercriminals Are Selling Access to Chinese Surveillance Cameras<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.<\/p><\/div><\/li><li  style=\"padding: 15px 0 25px\" class=\"rss_item\"><div class=\"rss_image\" style=\"height:150px;width:150px;\"><a href=\"https:\/\/threatpost.com\/twitter-whistleblower-tldr-version\/180472\/\" target=\"\" rel=\" noopener\" title=\"Twitter Whistleblower Complaint: The TL;DR Version\" style=\"height:150px;width:150px;\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/103\/2022\/08\/24101017\/Twitter-vulnerability.jpg?w=750&#038;ssl=1\" title=\"Twitter Whistleblower Complaint: The TL;DR Version\" style=\"height:150px;width:150px;\"><\/a><\/div><span class=\"title\"><a href=\"https:\/\/threatpost.com\/twitter-whistleblower-tldr-version\/180472\/\" target=\"\" rel=\" noopener\">Twitter Whistleblower Complaint: The TL;DR Version<\/a><\/span><div class=\"rss_content\" style=\"\"><p>Twitter is blasted for security and privacy lapses by the company\u2019s former head of security who alleges the social media giant\u2019s actions amount to a national security risk.<\/p><\/div><\/li><\/ul> <\/div><style type=\"text\/css\" media=\"all\">.feedzy-rss .rss_item .rss_image{float:left;position:relative;border:none;text-decoration:none;max-width:100%}.feedzy-rss .rss_item .rss_image span{display:inline-block;position:absolute;width:100%;height:100%;background-position:50%;background-size:cover}.feedzy-rss .rss_item .rss_image{margin:.3em 1em 0 0;content-visibility:auto}.feedzy-rss ul{list-style:none}.feedzy-rss ul li{display:inline-block}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-31564f2\" data-id=\"31564f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36c4061 elementor-widget elementor-widget-wp-widget-feedzy_wp_widget\" data-id=\"36c4061\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-feedzy_wp_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"feedzy-6c05b29690b6b6316509a0888c4a941e feedzy-rss\"><ul><\/ul> <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":648,"parent":519,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-fullwidth.php","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"class_list":["post-543","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security News - Riviera Networks Inc<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riviera-networks.com\/fr\/company\/security-news\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security News - Riviera Networks Inc\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riviera-networks.com\/fr\/company\/security-news\/\" \/>\n<meta property=\"og:site_name\" content=\"Riviera Networks Inc\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-18T14:16:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2019\/09\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@RivieraNetwrks\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/\",\"name\":\"Security News - Riviera Networks Inc\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1\",\"datePublished\":\"2019-09-17T10:28:51+00:00\",\"dateModified\":\"2019-09-18T14:16:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1\",\"width\":2000,\"height\":1334},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/security-news\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Riviera Networks Inc\",\"item\":\"https:\\\/\\\/www.riviera-networks.com\\\/en\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security News\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\",\"name\":\"Riviera Networks Inc\",\"description\":\"Infrastructure Experts\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#organization\",\"name\":\"Riviera Networks Inc\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/rnilogo-white-bg1.png\",\"contentUrl\":\"https:\\\/\\\/www.riviera-networks.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/rnilogo-white-bg1.png\",\"width\":849,\"height\":299,\"caption\":\"Riviera Networks Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.riviera-networks.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/RivieraNetwrks\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/riviera-networks\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security News - Riviera Networks Inc","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riviera-networks.com\/fr\/company\/security-news\/","og_locale":"fr_FR","og_type":"article","og_title":"Security News - Riviera Networks Inc","og_url":"https:\/\/www.riviera-networks.com\/fr\/company\/security-news\/","og_site_name":"Riviera Networks Inc","article_modified_time":"2019-09-18T14:16:22+00:00","og_image":[{"width":2000,"height":1334,"url":"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2019\/09\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@RivieraNetwrks","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/","url":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/","name":"Security News - Riviera Networks Inc","isPartOf":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/#primaryimage"},"image":{"@id":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2019\/09\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1","datePublished":"2019-09-17T10:28:51+00:00","dateModified":"2019-09-18T14:16:22+00:00","breadcrumb":{"@id":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riviera-networks.com\/en\/company\/security-news\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/#primaryimage","url":"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2019\/09\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.riviera-networks.com\/wp-content\/uploads\/2019\/09\/hacking-2964100.jpeg?fit=2000%2C1334&ssl=1","width":2000,"height":1334},{"@type":"BreadcrumbList","@id":"https:\/\/www.riviera-networks.com\/en\/company\/security-news\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.riviera-networks.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Riviera Networks Inc","item":"https:\/\/www.riviera-networks.com\/en\/company\/"},{"@type":"ListItem","position":3,"name":"Security News"}]},{"@type":"WebSite","@id":"https:\/\/www.riviera-networks.com\/fr\/#website","url":"https:\/\/www.riviera-networks.com\/fr\/","name":"Riviera Networks Inc","description":"Infrastructure Experts","publisher":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riviera-networks.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.riviera-networks.com\/fr\/#organization","name":"Riviera Networks Inc","url":"https:\/\/www.riviera-networks.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2020\/04\/rnilogo-white-bg1.png","contentUrl":"https:\/\/www.riviera-networks.com\/wp-content\/uploads\/2020\/04\/rnilogo-white-bg1.png","width":849,"height":299,"caption":"Riviera Networks Inc"},"image":{"@id":"https:\/\/www.riviera-networks.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/RivieraNetwrks","https:\/\/www.linkedin.com\/company\/riviera-networks\/"]}]}},"jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/pages\/543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/comments?post=543"}],"version-history":[{"count":8,"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/pages\/543\/revisions"}],"predecessor-version":[{"id":799,"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/pages\/543\/revisions\/799"}],"up":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/pages\/519"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/media\/648"}],"wp:attachment":[{"href":"https:\/\/www.riviera-networks.com\/fr\/wp-json\/wp\/v2\/media?parent=543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}