{"id":24059,"date":"2025-07-14T22:52:11","date_gmt":"2025-07-14T22:52:11","guid":{"rendered":"https:\/\/compliancert.com\/?p=24059"},"modified":"2025-07-14T23:24:59","modified_gmt":"2025-07-14T23:24:59","slug":"un-appel-au-reveil%e2%80%91-pour-la-securite-numerique-16-milliards-dinformations-didentification-exposees","status":"publish","type":"post","link":"https:\/\/compliancert.com\/fr\/articles\/un-appel-au-reveil%e2%80%91-pour-la-securite-numerique-16-milliards-dinformations-didentification-exposees\/","title":{"rendered":"Un signal d'alarme pour la s\u00e9curit\u00e9 num\u00e9rique : 16 milliards d'informations d'identification expos\u00e9es"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"24059\" class=\"elementor elementor-24059\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cc5771 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cc5771\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f678174\" data-id=\"f678174\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-490ef96 elementor-widget elementor-widget-text-editor\" data-id=\"490ef96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fin juin 2025, des chercheurs en cybers\u00e9curit\u00e9 de Cybernews, associ\u00e9s \u00e0 l'expert Bob Diachenko, ont d\u00e9couvert 30 bases de donn\u00e9es non s\u00e9curis\u00e9es contenant plus de 16 milliards d'identifiants de connexion - y compris des mots de passe r\u00e9els - collect\u00e9s par des logiciels malveillants \"voleurs d'informations\" et des br\u00e8ches historiques. Ces bases de donn\u00e9es ont \u00e9t\u00e9 bri\u00e8vement rendues publiques en raison d'une mauvaise configuration des serveurs.<\/p><p>Contrairement \u00e0 une violation unique, cette fuite provient de sources multiples : 85% provenant de logiciels malveillants en temps r\u00e9el, 15% provenant de fuites plus anciennes comme celles de LinkedIn<!-- notionvc: be7e105a-13bc-4790-a4cc-f7806d1aea33 --><\/p><p><!-- notionvc: b7af1b39-1a95-4056-8680-5c17d7c338b1 --><!-- notionvc: ac12328d-5b5e-4b99-b7e5-1a868d8a9d2d --><\/p><p><!-- notionvc: a6cf5e47-b000-44cd-8c44-1343fac4083b --><\/p><p><!-- notionvc: 5774a75c-2acb-4212-912a-5048def1e8d1 --><!-- notionvc: 8f743a38-22b9-48b0-8b97-3316c3b6fc8f --><\/p><p><!-- notionvc: 87920fcb-650f-4b43-b497-43beb039aff3 --><!-- notionvc: 89089a11-423b-4b6f-b63f-1a7bdc40e8e0 --><\/p><p><!-- notionvc: 0146686d-3bca-48d9-9049-c12c316bd8d2 --><\/p><p><!-- notionvc: 55bc1f08-6a7a-4856-a863-2ed4a6715c33 --><!-- notionvc: 33f54861-5ad7-47f1-8c6d-8caadc768764 --><\/p><p><!-- notionvc: 94e65eac-cb94-4430-9615-24d35eaa02e1 --><!-- notionvc: 514e998c-f713-4c8f-a9d2-81b71b624538 --><\/p><p><!-- notionvc: 2ee430fd-ca58-4b9b-8487-92f8ebb3f480 --><\/p><p><!-- notionvc: c61cfa3a-55b9-4003-ad24-a82f2bfdb5ba --><\/p><p><!-- notionvc: 13efe39f-77f1-47b6-bfe5-33b452b1a202 --><\/p><p><!-- notionvc: 3500c0f1-3541-436d-91c0-fc75d0c6307d --><!-- notionvc: 2739f6c4-e788-4031-b967-99cd9be79da6 --><\/p><p><!-- notionvc: a5d18595-dda7-4349-bcfa-75443c94b738 --><!-- notionvc: 350675f9-e7e6-4c31-bbfb-df918939f317 --><\/p><p><!-- notionvc: b52d616a-7870-4ca7-9156-174772f64549 --><\/p><p><!-- notionvc: 4132eb71-e3dc-473a-ac7a-f7b7574fc341 --><\/p><p><!-- notionvc: 0218a73c-57ac-4557-b263-8f78b9f69fcf --><\/p><p><!-- notionvc: 708c8477-e3d0-4e2d-adc8-2fb0eb342343 --><\/p><p><!-- notionvc: e942c3dd-0252-4001-900b-8fcabd6fdac5 --><\/p><p><!-- notionvc: 0efe7bef-5736-4a94-821f-37124b118b08 --><!-- notionvc: 0454b857-3f31-4214-b926-197ccd55c383 --><\/p><p><!-- notionvc: 94dde3c1-2cc7-43e5-94ef-be43f05a1675 --><\/p><p><!-- notionvc: b70eeb8f-ceb5-4479-bae3-fa880bb88f63 --><\/p><p><!-- notionvc: 0a47102e-ffaf-4355-aeb5-63fa022bd772 --><\/p><p><!-- notionvc: 04d25b1a-8a94-4c39-aa7c-4f3db675b09b --><\/p><p><!-- notionvc: 0b954cbd-0453-4a12-9943-9b9b9747e012 --><\/p><p class=\"p1\"><!-- notionvc: f4bd767b-583b-4d1f-b3e2-e1c0ad7496d5 --><\/p><p><!-- notionvc: c218d5aa-ca05-4f07-b537-a721088411e1 --><\/p><p><!-- notionvc: cf734c31-fc22-4a34-9b93-fc91bfc50cad --><!-- notionvc: 998ad04b-52ce-4397-abc7-850afcc6ad1f --><\/p><p><!-- notionvc: 3bedbc35-471d-47e1-b4f8-0941168a2fae --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-2d8c310 e-flex e-con-boxed e-con e-parent\" data-id=\"2d8c310\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a519c elementor-widget elementor-widget-image\" data-id=\"e8a519c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"583\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1024%2C583&amp;ssl=1\" class=\"attachment-large size-large wp-image-24060\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?resize=300%2C171&amp;ssl=1 300w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?resize=1024%2C583&amp;ssl=1 1024w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?resize=768%2C437&amp;ssl=1 768w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?resize=18%2C10&amp;ssl=1 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dccf118 e-flex e-con-boxed e-con e-parent\" data-id=\"dccf118\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c37412b elementor-widget elementor-widget-text-editor\" data-id=\"c37412b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Pourquoi c'est plus qu'une simple fuite \ud83d\udccc<\/strong><\/h4><ul><li><strong>Taille et fra\u00eecheur<\/strong>: Il s'agit de la plus grande fuite d'informations d'identification jamais enregistr\u00e9e - suffisamment pour que chaque personne sur terre ait deux informations d'identification.<\/li><li><strong>Donn\u00e9es structur\u00e9es<\/strong>: Chaque enregistrement suit le format \"URL - nom d'utilisateur - mot de passe\", ce qui permet aux pirates d'automatiser les tentatives de prise de contr\u00f4le des comptes.<\/li><li><strong>Impact dans le monde r\u00e9el<\/strong>: Les informations d'identification couvrent les principales plateformes - Apple, Google, Facebook, Telegram, les portails gouvernementaux - ce qui rend l'usurpation d'identit\u00e9 et l'hame\u00e7onnage beaucoup plus probables.<\/li><\/ul><h3>\u00a0<\/h3><h4><strong>Ce que les experts recommandent (et ce que nous promouvons chez Compliancert)<\/strong><\/h4><ol><li><p><strong>Modifier imm\u00e9diatement les mots de passe :\u00a0<\/strong>N'attendez pas - si vous avez r\u00e9utilis\u00e9 des mots de passe, modifiez-les pour tous vos comptes. <strong>et<\/strong> sur les syst\u00e8mes li\u00e9s .<\/p><\/li><li><p><strong>Utilisez des mots de passe forts et uniques + un gestionnaire :\u00a0<\/strong>\u00c9vitez les mots simples, faciles \u00e0 deviner. Utilisez des phrases de passe ou un gestionnaire de mots de passe r\u00e9put\u00e9 pour g\u00e9n\u00e9rer et stocker des identifiants al\u00e9atoires.<\/p><\/li><li><p><strong>Activer l'authentification multifactorielle (MFA) ou les cl\u00e9s d'acc\u00e8s :\u00a0<\/strong>Ajoutez une couche de s\u00e9curit\u00e9 suppl\u00e9mentaire. Dans la mesure du possible, optez pour des cl\u00e9s d'acc\u00e8s : elles sont plus s\u00fbres que les mots de passe traditionnels.<\/p><\/li><li><p><strong>V\u00e9rifiez si votre adresse \u00e9lectronique est apparue dans des violations ant\u00e9rieures :\u00a0<\/strong>Utilisez des outils tels que <strong>Avoir \u00e9t\u00e9 jet\u00e9 \u00e0 la poubelle<\/strong> \u00e0 v\u00e9rifier .<\/p><\/li><li><p><strong>Surveiller les connexions suspectes :\u00a0<\/strong>Surveillez les alertes relatives \u00e0 l'activit\u00e9 du compte et agissez rapidement si quelque chose ne va pas.<\/p><\/li><li><p><strong>Restez vigilant contre le phishing :\u00a0<\/strong>Avec ce tr\u00e9sor de donn\u00e9es en circulation, il faut s'attendre \u00e0 des tentatives plus cibl\u00e9es. La protection par mot de passe n'est plus s\u00fbre<\/p><\/li><\/ol><h3>\u00a0<\/h3><h4><strong>Pourquoi cela est important pour votre entreprise<\/strong><\/h4><ul><li><strong>Risque de bourrage massif d'informations d'identification<\/strong>: Des mots de passe r\u00e9utilis\u00e9s sur des comptes professionnels pourraient permettre \u00e0 des pirates de p\u00e9n\u00e9trer dans les syst\u00e8mes des entreprises.<\/li><li><strong>Obligation r\u00e9glementaire de diligence<\/strong>: En vertu du GDPR et de r\u00e9glementations similaires, <strong>contr\u00f4leurs\/processeurs de donn\u00e9es<\/strong> doit emp\u00eacher de mani\u00e8re proactive tout acc\u00e8s non autoris\u00e9 .<\/li><li><strong>Pr\u00e9vention des pertes d'exploitation<\/strong>: Un seul mot de passe administrateur compromis peut entra\u00eener des interruptions de service, des fraudes financi\u00e8res et des atteintes \u00e0 la r\u00e9putation.<\/li><\/ul><p><!-- notionvc: 20896ffb-c1de-4973-aeb8-242c44f9ce83 --><\/p><p><!-- notionvc: 13f6e09e-14c6-4cf8-9830-70026c113d1d --><\/p><p><!-- notionvc: 9b652d23-9748-495b-b1ed-dcde3d6752aa --><\/p><p><!-- notionvc: 8d11fcf9-1cae-4b79-b0e8-6220e8d50760 --><\/p><p><!-- notionvc: 95741ca6-eae8-4ac2-9e4b-76fbf47d9872 --><\/p><p><!-- notionvc: f90c3d3f-60e4-4d73-89e9-c91b2e1fd26b --><\/p><p><!-- notionvc: 50c79593-9b1f-4ee3-98c7-029de8eed7e6 --><\/p><p><!-- notionvc: 38746180-7112-43cd-aa32-62e279becc7e --><\/p><p><!-- notionvc: a5aed8fa-2e1a-4d38-9582-551cdc5d6bf9 --><\/p><p><!-- notionvc: 32a08353-3e0f-442c-bc7d-6290f745bb76 --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-479f3c0 e-flex e-con-boxed e-con e-parent\" data-id=\"479f3c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a68fccf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a68fccf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-72ddec2\" data-id=\"72ddec2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a21662e elementor-align-start elementor-mobile-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a21662e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-brand-symbol\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Nous pouvons vous aider \u00e0 vous mettre en conformit\u00e9 avec le FADP !<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9953c7 elementor-widget elementor-widget-text-editor\" data-id=\"e9953c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Des conseils d'experts, des solutions abordables et une d\u00e9marche claire vers la conformit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1c96bc0\" data-id=\"1c96bc0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-461faa9 elementor-align-right elementor-widget__width-auto elementor-tablet-align-justify elementor-mobile-align-justify elementor-widget-tablet__width-inherit elementor-widget-mobile__width-inherit vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"461faa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/compliancert.com\/fr\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactez-nous<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p> Il est temps pour chaque organisation d'agir maintenant, avant que l'acc\u00e8s \u00e0 16 milliards d'informations d'identification ne devienne une br\u00e8che dans leur propre forteresse.<\/p>","protected":false},"author":4,"featured_media":24060,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[67,74],"tags":[108,105,99,294,296,288,295],"class_list":["post-24059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-news","tag-compliance","tag-compliancert","tag-cybersecurity","tag-databreach","tag-infosec","tag-privacy","tag-riskmanagement"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed - ComplianceRT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancert.com\/fr\/articles\/un-appel-au-reveil\u2011-pour-la-securite-numerique-16-milliards-dinformations-didentification-exposees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed - ComplianceRT\" \/>\n<meta property=\"og:description\" content=\"It\u2019s time for every organization to act now\u2014before the access to 16\u202fbillion credentials becomes a breach in their own fortress.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancert.com\/fr\/articles\/un-appel-au-reveil\u2011-pour-la-securite-numerique-16-milliards-dinformations-didentification-exposees\/\" \/>\n<meta property=\"og:site_name\" content=\"ComplianceRT\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-14T22:52:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T23:24:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Kelly\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Kelly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/\"},\"author\":{\"name\":\"Sam Kelly\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/575fd5c78af7d82c8699e8f70bcb0fec\"},\"headline\":\"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed\",\"datePublished\":\"2025-07-14T22:52:11+00:00\",\"dateModified\":\"2025-07-14T23:24:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/\"},\"wordCount\":338,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1\",\"keywords\":[\"compliance\",\"ComplianCERT\",\"Cybersecurity\",\"databreach\",\"infosec\",\"Privacy\",\"riskmanagement\"],\"articleSection\":[\"Articles\",\"News\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/\",\"name\":\"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed - ComplianceRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1\",\"datePublished\":\"2025-07-14T22:52:11+00:00\",\"dateModified\":\"2025-07-14T23:24:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1\",\"width\":1200,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compliancert.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"name\":\"ComplianceRT\",\"description\":\"AI-Powered Compliance Tool &amp; Automation Platform | GDPR | ISO27001 | EU AI Act | NIS2\",\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compliancert.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\",\"name\":\"RT Europe SA\",\"alternateName\":\"RT\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"contentUrl\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"width\":116,\"height\":60,\"caption\":\"RT Europe SA\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compliancert\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/575fd5c78af7d82c8699e8f70bcb0fec\",\"name\":\"Sam Kelly\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/31af5c87e8bf90b8ee2b5bbc3a3646aec2d8136426bb5ed99dd3c9034ee0ba8f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/31af5c87e8bf90b8ee2b5bbc3a3646aec2d8136426bb5ed99dd3c9034ee0ba8f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/31af5c87e8bf90b8ee2b5bbc3a3646aec2d8136426bb5ed99dd3c9034ee0ba8f?s=96&d=mm&r=g\",\"caption\":\"Sam Kelly\"},\"url\":\"https:\\\/\\\/compliancert.com\\\/fr\\\/author\\\/sam-kelly\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un appel de r\u00e9veil pour la s\u00e9curit\u00e9 num\u00e9rique : 16 milliards d'identifiants expos\u00e9s - ComplianceRT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancert.com\/fr\/articles\/un-appel-au-reveil\u2011-pour-la-securite-numerique-16-milliards-dinformations-didentification-exposees\/","og_locale":"fr_FR","og_type":"article","og_title":"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed - ComplianceRT","og_description":"It\u2019s time for every organization to act now\u2014before the access to 16\u202fbillion credentials becomes a breach in their own fortress.","og_url":"https:\/\/compliancert.com\/fr\/articles\/un-appel-au-reveil\u2011-pour-la-securite-numerique-16-milliards-dinformations-didentification-exposees\/","og_site_name":"ComplianceRT","article_published_time":"2025-07-14T22:52:11+00:00","article_modified_time":"2025-07-14T23:24:59+00:00","og_image":[{"width":1200,"height":683,"url":"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg","type":"image\/jpeg"}],"author":"Sam Kelly","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Sam Kelly","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#article","isPartOf":{"@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/"},"author":{"name":"Sam Kelly","@id":"https:\/\/compliancert.com\/#\/schema\/person\/575fd5c78af7d82c8699e8f70bcb0fec"},"headline":"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed","datePublished":"2025-07-14T22:52:11+00:00","dateModified":"2025-07-14T23:24:59+00:00","mainEntityOfPage":{"@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/"},"wordCount":338,"commentCount":0,"publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"image":{"@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1","keywords":["compliance","ComplianCERT","Cybersecurity","databreach","infosec","Privacy","riskmanagement"],"articleSection":["Articles","News"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/","url":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/","name":"Un appel de r\u00e9veil pour la s\u00e9curit\u00e9 num\u00e9rique : 16 milliards d'identifiants expos\u00e9s - ComplianceRT","isPartOf":{"@id":"https:\/\/compliancert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#primaryimage"},"image":{"@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1","datePublished":"2025-07-14T22:52:11+00:00","dateModified":"2025-07-14T23:24:59+00:00","breadcrumb":{"@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#primaryimage","url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1","contentUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1","width":1200,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/compliancert.com\/articles\/a-wake%e2%80%91up-call-for-digital-security-16-billion-credentials-exposed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancert.com\/"},{"@type":"ListItem","position":2,"name":"A Wake\u2011Up Call for Digital Security: 16 Billion Credentials Exposed"}]},{"@type":"WebSite","@id":"https:\/\/compliancert.com\/#website","url":"https:\/\/compliancert.com\/","name":"Conformit\u00e9RT","description":"Outil de Conformit\u00e9 et Plateforme d'Automatisation Aliment\u00e9s par l'IA | RGPD | ISO27001 | EU AI Act | NIS2","publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/compliancert.com\/#organization","name":"RT Europe SA","alternateName":"RT","url":"https:\/\/compliancert.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","contentUrl":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","width":116,"height":60,"caption":"RT Europe SA"},"image":{"@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compliancert\/"]},{"@type":"Person","@id":"https:\/\/compliancert.com\/#\/schema\/person\/575fd5c78af7d82c8699e8f70bcb0fec","name":"Sam Kelly","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/31af5c87e8bf90b8ee2b5bbc3a3646aec2d8136426bb5ed99dd3c9034ee0ba8f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/31af5c87e8bf90b8ee2b5bbc3a3646aec2d8136426bb5ed99dd3c9034ee0ba8f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/31af5c87e8bf90b8ee2b5bbc3a3646aec2d8136426bb5ed99dd3c9034ee0ba8f?s=96&d=mm&r=g","caption":"Sam Kelly"},"url":"https:\/\/compliancert.com\/fr\/author\/sam-kelly\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/07\/RT-Artcl-16-Billion-Credentials-Exposed.jpg?fit=1200%2C683&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/24059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/comments?post=24059"}],"version-history":[{"count":3,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/24059\/revisions"}],"predecessor-version":[{"id":24063,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/24059\/revisions\/24063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/media\/24060"}],"wp:attachment":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/media?parent=24059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/categories?post=24059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/tags?post=24059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}