{"id":26211,"date":"2025-12-09T01:13:16","date_gmt":"2025-12-09T01:13:16","guid":{"rendered":"https:\/\/compliancert.com\/?p=26211"},"modified":"2025-12-09T01:17:31","modified_gmt":"2025-12-09T01:17:31","slug":"la-vague-dhameconnage-en-2025","status":"publish","type":"post","link":"https:\/\/compliancert.com\/fr\/articles\/la-vague-dhameconnage-en-2025\/","title":{"rendered":"La mont\u00e9e en puissance du phishing en 2025"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"26211\" class=\"elementor elementor-26211\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0cc5771 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0cc5771\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f678174\" data-id=\"f678174\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-490ef96 elementor-widget elementor-widget-text-editor\" data-id=\"490ef96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le phishing n'est pas seulement une menace persistante, il \u00e9volue \u00e0 une vitesse alarmante. Il \u00e9volue \u00e0 une vitesse alarmante. <strong>Conformit\u00e9<\/strong> et les professionnels de la s\u00e9curit\u00e9 de l'information, il est essentiel de comprendre les derni\u00e8res statistiques pour mettre en place des d\u00e9fenses efficaces et garantir le respect de la r\u00e9glementation dans un paysage de la cybers\u00e9curit\u00e9 de plus en plus hostile.<\/p><p>Les donn\u00e9es de 2025 confirment que l'\u00e9l\u00e9ment humain reste le maillon faible et que <strong>Intelligence artificielle (IA)<\/strong> red\u00e9finit le risque cybern\u00e9tique.<!-- notionvc: f1f0f371-a461-47af-9dc6-c2fae8055b66 --><!-- notionvc: a0524eab-007c-498f-8853-3925b6c9388f --><!-- notionvc: bb95d0f6-fbee-44d6-bab4-bcf1597bb03b --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-2d8c310 e-flex e-con-boxed e-con e-parent\" data-id=\"2d8c310\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a519c elementor-widget elementor-widget-image\" data-id=\"e8a519c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"550\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1024%2C550&amp;ssl=1\" class=\"attachment-large size-large wp-image-26212\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=300%2C161&amp;ssl=1 300w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=1024%2C550&amp;ssl=1 1024w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=768%2C413&amp;ssl=1 768w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?resize=18%2C10&amp;ssl=1 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dccf118 e-flex e-con-boxed e-con e-parent\" data-id=\"dccf118\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c37412b elementor-widget elementor-widget-text-editor\" data-id=\"c37412b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Vue d'ensemble : L'hame\u00e7onnage, catalyseur de br\u00e8ches<\/h3><p>Le phishing reste la tactique d'attaque la plus courante, avec des cons\u00e9quences financi\u00e8res et op\u00e9rationnelles de plus en plus importantes :<\/p><ul><li><strong>Point d'entr\u00e9e principal :<\/strong> L'hame\u00e7onnage est impliqu\u00e9 dans environ <strong>36%<\/strong> de toutes les violations de donn\u00e9es, ce qui en fait le type d'attaque le plus courant sur de nombreux march\u00e9s.<\/li><li><strong>La menace quotidienne :<\/strong> Environ <strong>57%<\/strong> des organisations d\u00e9clarent \u00eatre confront\u00e9es \u00e0 des escroqueries par hame\u00e7onnage chaque semaine ou chaque jour. Le volume est stup\u00e9fiant, avec environ <strong>3,4 milliards d'euros<\/strong> courriels de phishing envoy\u00e9s chaque jour dans le monde.<\/li><li><strong>L'\u00e9l\u00e9ment humain :<\/strong> Autour de <strong>60%<\/strong> \u00e0 <strong>69%<\/strong> des atteintes \u00e0 la s\u00e9curit\u00e9 impliquent un \u00e9l\u00e9ment humain, comme le vol d'informations d'identification ou l'ing\u00e9nierie sociale, l'hame\u00e7onnage \u00e9tant un facteur primordial. La rapidit\u00e9 de r\u00e9action est cruciale : des employ\u00e9s mal form\u00e9s amplifient le co\u00fbt de l'incident.<\/li><\/ul><h3>Le co\u00fbt prohibitif du phishing pour les entreprises<\/h3><p>Les failles li\u00e9es \u00e0 l'hame\u00e7onnage ne sont pas seulement des incidents de s\u00e9curit\u00e9 ; ce sont des catastrophes financi\u00e8res qui requi\u00e8rent l'attention de la direction de la conformit\u00e9 et de la direction g\u00e9n\u00e9rale :<\/p><ul><li><strong>Co\u00fbt moyen d'une violation :<\/strong> Le co\u00fbt moyen d'une atteinte \u00e0 la protection des donn\u00e9es due au hame\u00e7onnage est pass\u00e9 \u00e0 <strong>$4.88 millions<\/strong> USD.<\/li><li><strong>Pertes de la BEC :<\/strong> <strong>Compromission du courrier \u00e9lectronique des entreprises (BEC)<\/strong>-une forme d'hame\u00e7onnage tr\u00e8s cibl\u00e9 provoquant une perte d'environ 1,5 million d'euros. <strong>$2,7 milliards<\/strong> de pertes aux \u00c9tats-Unis en 2024, ce qui en fait l'une des formes les plus destructrices de la cybercriminalit\u00e9 financi\u00e8re.<\/li><li><strong>Co\u00fbt annuel pour les grandes entreprises :<\/strong> Les attaques par hame\u00e7onnage co\u00fbtent aux grandes organisations en moyenne <strong>$15 millions<\/strong> par an, ou plus de <strong>$1,500<\/strong> par employ\u00e9.<\/li><\/ul><h3>La menace acc\u00e9l\u00e9r\u00e9e par l'IA<\/h3><p>La prolif\u00e9ration des outils d'IA g\u00e9n\u00e9rative a chang\u00e9 la donne, permettant aux attaquants de cr\u00e9er des messages plus convaincants, \u00e0 grande \u00e9chelle, et de contourner les filtres de s\u00e9curit\u00e9 :<\/p><ul><li><strong>Augmentation exponentielle :<\/strong> L'activit\u00e9 globale d'hame\u00e7onnage a augment\u00e9 de <strong>49%<\/strong> depuis 2021, en grande partie en raison de l'utilisation de messages g\u00e9n\u00e9r\u00e9s par l'IA.<\/li><li><strong>Attaques aliment\u00e9es par l'IA :<\/strong> Une estimation de <strong>80%<\/strong> des attaques de phishing sont d\u00e9sormais g\u00e9n\u00e9r\u00e9es par l'IA, signalant une automatisation sophistiqu\u00e9e et continue.<\/li><li><strong>Les titres de comp\u00e9tences en danger :<\/strong> L'hame\u00e7onnage d'identit\u00e9 a augment\u00e9 de fa\u00e7on stup\u00e9fiante. <strong>1,265%<\/strong> depuis le lancement d'outils d'IA avanc\u00e9s tels que ChatGPT.<\/li><li><strong>BEC am\u00e9lior\u00e9 :<\/strong> Environ <strong>40%<\/strong> des courriels de BEC au cours du deuxi\u00e8me trimestre ont \u00e9t\u00e9 confirm\u00e9s comme \u00e9tant g\u00e9n\u00e9r\u00e9s par une IA.<\/li><\/ul><h3>Nouveaux vecteurs et profils des victimes<\/h3><p>Les attaquants se diversifient au-del\u00e0 du courrier \u00e9lectronique traditionnel, et le profil des victimes \u00e9volue \u00e9galement :<\/p><ul><li><strong>Multi-canal :<\/strong> A propos de <strong>40%<\/strong> des campagnes d'hame\u00e7onnage d\u00e9passent d\u00e9sormais le cadre du courrier \u00e9lectronique, exploitant des plateformes telles que <strong>Slack, Teams et les m\u00e9dias sociaux<\/strong>. Il y a eu une <strong>19%<\/strong> l'augmentation des <em>smishing<\/em> (hame\u00e7onnage par SMS) et <strong>11%<\/strong> en <em>vishing<\/em> (voix d'hame\u00e7onnage).<\/li><li><strong>G\u00e9n\u00e9ration la plus vuln\u00e9rable :<\/strong> <strong>G\u00e9n\u00e9ration Z<\/strong> et <strong>Les mill\u00e9niaux<\/strong> sont les plus susceptibles d'\u00eatre victimes d'attaques par hame\u00e7onnage.<\/li><li><strong>Travailleurs \u00e0 distance :<\/strong> <strong>62%<\/strong> des professionnels de la s\u00e9curit\u00e9 de l'information indiquent que les attaques par hame\u00e7onnage ont augment\u00e9 plus que tout autre type de menace depuis le passage au travail \u00e0 distance.<\/li><li><strong>Secteurs les plus cibl\u00e9s :<\/strong> Globalement, les secteurs les plus cibl\u00e9s sont <strong>Services Internet (32.8%)<\/strong>, <strong>t\u00e9l\u00e9communications (20.7%)<\/strong>et <strong>services financiers (18.8%)<\/strong>.<\/li><\/ul><h3>L'imp\u00e9ratif de conformit\u00e9 et d'att\u00e9nuation<\/h3><p>Pour Compliance, ces statistiques ne sont pas seulement des points de donn\u00e9es int\u00e9ressants ; elles sont la preuve que les programmes de s\u00e9curit\u00e9 et de formation existants sont insuffisants.<\/p><p>Le risque de non-conformit\u00e9 augmente de fa\u00e7on exponentielle lorsque la s\u00e9curit\u00e9 humaine est d\u00e9faillante, entra\u00eenant des amendes r\u00e9glementaires et des atteintes \u00e0 la r\u00e9putation.<\/p><blockquote><p>Actions cl\u00e9s pour la conformit\u00e9 :<\/p><ol><li><strong>Formation continue \u00e0 la lutte contre l'hame\u00e7onnage :<\/strong> La formation \u00e0 la sensibilisation ne peut pas \u00eatre un \u00e9v\u00e9nement ponctuel. Elle doit \u00eatre continue et bas\u00e9e sur des simulations r\u00e9alistes, en se concentrant sur les nouveaux vecteurs d'attaque tels que l'IA, les codes QR et les plateformes de messagerie.<\/li><li><strong>AMF robuste :<\/strong> Mettre en \u0153uvre et v\u00e9rifier l'utilisation de l'authentification multifactorielle (MFA) pour tous les comptes critiques. Cependant, les responsables de la conformit\u00e9 doivent \u00eatre conscients que m\u00eame l'AMF est contourn\u00e9e dans environ <strong>25%<\/strong> des campagnes qui utilisent des codes QR ou des liens d\u00e9guis\u00e9s.<\/li><li><strong>Surveillance active du BEC :<\/strong> Donner la priorit\u00e9 \u00e0 la d\u00e9tection des anomalies dans les communications par courrier \u00e9lectronique, en particulier celles qui impliquent des transactions financi\u00e8res ou des donn\u00e9es sensibles.<\/li><\/ol><\/blockquote><p>Le paysage du phishing en 2025 exige une r\u00e9\u00e9valuation urgente des strat\u00e9gies de s\u00e9curit\u00e9 et de conformit\u00e9. L'IA a arm\u00e9 les attaquants, mais la connaissance des tactiques et la formation des employ\u00e9s restent les d\u00e9fenses les plus vitales.<!-- notionvc: 14dbb44c-2442-44d3-9eec-80d2b6f6b1aa --><!-- notionvc: 56f0ec73-524e-4532-98a8-58610e2612fa --><\/p><p><!-- notionvc: c73506c8-fa90-4918-bf29-9271b727252e --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a68fccf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a68fccf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-72ddec2\" data-id=\"72ddec2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a21662e elementor-align-start elementor-mobile-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a21662e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-brand-symbol\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Nous pouvons vous aider \u00e0 vous mettre en conformit\u00e9 avec le FADP !<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9953c7 elementor-widget elementor-widget-text-editor\" data-id=\"e9953c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Des conseils d'experts, des solutions abordables et une d\u00e9marche claire vers la conformit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1c96bc0\" data-id=\"1c96bc0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-461faa9 elementor-align-right elementor-widget__width-auto elementor-tablet-align-justify elementor-mobile-align-justify elementor-widget-tablet__width-inherit elementor-widget-mobile__width-inherit vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"461faa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/compliancert.com\/fr\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactez-nous<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-a61e06c e-flex e-con-boxed e-con e-parent\" data-id=\"a61e06c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Des statistiques choquantes et le d\u00e9fi de la conformit\u00e9<\/p>","protected":false},"author":5,"featured_media":26212,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[67,75],"tags":[21,108,113,296,167,34],"class_list":["post-26211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-frameworks-and-regulations","tag-ai","tag-compliance","tag-cyber-security","tag-infosec","tag-phishing","tag-risk-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Phishing Surge in 2025 - ComplianceRT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancert.com\/fr\/articles\/la-vague-dhameconnage-en-2025\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Phishing Surge in 2025 - ComplianceRT\" \/>\n<meta property=\"og:description\" content=\"Shocking Statistics and the Compliance Challenge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancert.com\/fr\/articles\/la-vague-dhameconnage-en-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"ComplianceRT\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T01:13:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T01:17:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"645\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Karina Ladeira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karina Ladeira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\"},\"author\":{\"name\":\"Karina Ladeira\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/65efd9b371d4ab20b3757fe2b1361971\"},\"headline\":\"The Phishing Surge in 2025\",\"datePublished\":\"2025-12-09T01:13:16+00:00\",\"dateModified\":\"2025-12-09T01:17:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\"},\"wordCount\":663,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"keywords\":[\"AI\",\"compliance\",\"cyber security\",\"infosec\",\"Phishing\",\"Risk Management\"],\"articleSection\":[\"Articles\",\"Frameworks and Regulations\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\",\"name\":\"The Phishing Surge in 2025 - ComplianceRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"datePublished\":\"2025-12-09T01:13:16+00:00\",\"dateModified\":\"2025-12-09T01:17:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1\",\"width\":1200,\"height\":645},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/articles\\\/the-phishing-surge-in-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compliancert.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Phishing Surge in 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"name\":\"ComplianceRT\",\"description\":\"AI-Powered Compliance Tool &amp; Automation Platform | GDPR | ISO27001 | EU AI Act | NIS2\",\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compliancert.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\",\"name\":\"RT Europe SA\",\"alternateName\":\"RT\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"contentUrl\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"width\":116,\"height\":60,\"caption\":\"RT Europe SA\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compliancert\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/person\\\/65efd9b371d4ab20b3757fe2b1361971\",\"name\":\"Karina Ladeira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g\",\"caption\":\"Karina Ladeira\"},\"url\":\"https:\\\/\\\/compliancert.com\\\/fr\\\/author\\\/karina-ladeira\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La mont\u00e9e en puissance du phishing en 2025 - ComplianceRT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancert.com\/fr\/articles\/la-vague-dhameconnage-en-2025\/","og_locale":"fr_FR","og_type":"article","og_title":"The Phishing Surge in 2025 - ComplianceRT","og_description":"Shocking Statistics and the Compliance Challenge","og_url":"https:\/\/compliancert.com\/fr\/articles\/la-vague-dhameconnage-en-2025\/","og_site_name":"ComplianceRT","article_published_time":"2025-12-09T01:13:16+00:00","article_modified_time":"2025-12-09T01:17:31+00:00","og_image":[{"width":1200,"height":645,"url":"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg","type":"image\/jpeg"}],"author":"Karina Ladeira","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Karina Ladeira","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#article","isPartOf":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/"},"author":{"name":"Karina Ladeira","@id":"https:\/\/compliancert.com\/#\/schema\/person\/65efd9b371d4ab20b3757fe2b1361971"},"headline":"The Phishing Surge in 2025","datePublished":"2025-12-09T01:13:16+00:00","dateModified":"2025-12-09T01:17:31+00:00","mainEntityOfPage":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/"},"wordCount":663,"commentCount":0,"publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"image":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","keywords":["AI","compliance","cyber security","infosec","Phishing","Risk Management"],"articleSection":["Articles","Frameworks and Regulations"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/","url":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/","name":"La mont\u00e9e en puissance du phishing en 2025 - ComplianceRT","isPartOf":{"@id":"https:\/\/compliancert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage"},"image":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","datePublished":"2025-12-09T01:13:16+00:00","dateModified":"2025-12-09T01:17:31+00:00","breadcrumb":{"@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#primaryimage","url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","contentUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","width":1200,"height":645},{"@type":"BreadcrumbList","@id":"https:\/\/compliancert.com\/articles\/the-phishing-surge-in-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancert.com\/"},{"@type":"ListItem","position":2,"name":"The Phishing Surge in 2025"}]},{"@type":"WebSite","@id":"https:\/\/compliancert.com\/#website","url":"https:\/\/compliancert.com\/","name":"Conformit\u00e9RT","description":"Outil de Conformit\u00e9 et Plateforme d'Automatisation Aliment\u00e9s par l'IA | RGPD | ISO27001 | EU AI Act | NIS2","publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/compliancert.com\/#organization","name":"RT Europe SA","alternateName":"RT","url":"https:\/\/compliancert.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","contentUrl":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","width":116,"height":60,"caption":"RT Europe SA"},"image":{"@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compliancert\/"]},{"@type":"Person","@id":"https:\/\/compliancert.com\/#\/schema\/person\/65efd9b371d4ab20b3757fe2b1361971","name":"Karina Ladeira","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88436bcc79a9708e733fce7124a714f75a635ad616e922ec88063ddb22be025f?s=96&d=mm&r=g","caption":"Karina Ladeira"},"url":"https:\/\/compliancert.com\/fr\/author\/karina-ladeira\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/12\/RT-Article-phishing-statistics.jpg?fit=1200%2C645&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/26211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/comments?post=26211"}],"version-history":[{"count":3,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/26211\/revisions"}],"predecessor-version":[{"id":26215,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/posts\/26211\/revisions\/26215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/media\/26212"}],"wp:attachment":[{"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/media?parent=26211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/categories?post=26211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancert.com\/fr\/wp-json\/wp\/v2\/tags?post=26211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}