{"id":2863,"date":"2021-03-12T13:25:45","date_gmt":"2021-03-12T13:25:45","guid":{"rendered":"https:\/\/partnernews.sophos.com\/fr-fr\/?p=2863"},"modified":"2021-04-09T15:36:32","modified_gmt":"2021-04-09T15:36:32","slug":"new-intercept-x-protection-feature-dynamic-shellcode-protection","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/fr-fr\/2021\/03\/products\/new-intercept-x-protection-feature-dynamic-shellcode-protection\/","title":{"rendered":"Nouvelle fonctionnalit\u00e9 d\u2019Intercept\u00a0X\u00a0: la Protection shellcode dynamique"},"content":{"rendered":"<p>Intercept\u00a0X est maintenant dot\u00e9 d\u2019une nouvelle fonction de protection appel\u00e9e Protection shellcode dynamique. <a href=\"https:\/\/www.sophos.com\/fr-fr\/products\/endpoint-antivirus.aspx\" target=\"_blank\" rel=\"noopener\">Sophos Intercept X<\/a> b\u00e9n\u00e9ficie ainsi d\u2019une fonction con\u00e7ue pour emp\u00eacher les adversaires actifs d\u2019atteindre l\u2019un de leurs objectifs les plus recherch\u00e9s\u00a0: utiliser des agents d\u2019acc\u00e8s \u00e0 distance pour obtenir des privil\u00e8ges de type \u00ab\u00a0Hands-on-Keyboard\u00a0\u00bb.<\/p>\n<p>Selon Mark Loman, directeur de l\u2019ing\u00e9nierie chez Sophos, \u00ab\u00a0la Protection shellcode dynamique est unique \u00e0 Sophos. Elle impose une LIMITE STRICTE \u00e0 TOUTES les applications sur la m\u00e9moire qu\u2019elles peuvent allouer. Elle a un impact sur TOUS les processus de la machine, m\u00eame ceux de Windows\u00a0! \u00a0Je n\u2019exag\u00e8re pas en disant qu\u2019imposer cette limite est extr\u00eamement audacieux de la part de Sophos.\u00a0\u00bb<\/p>\n<p>Vous pouvez lire notre <a href=\"https:\/\/news.sophos.com\/fr-fr\/2021\/03\/15\/protection-dynamic-shellcode-nouvelle-arme-secrete-intercept-x\/\" target=\"_blank\" rel=\"noopener\">article sur Sophos News<\/a> consacr\u00e9 \u00e0 cette nouvelle fonctionnalit\u00e9.<\/p>\n<p>Pour une analyse approfondie de cette technique d\u2019attaque et de la mani\u00e8re dont la Protection shellcode dynamique la bloque, lisez l\u2019<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/04\/covert-code-faces-a-heap-of-trouble-in-memory\/\" target=\"_blank\" rel=\"noopener\">excellent article de Mark Loman<\/a> (en anglais), \u00e9galement sur Sophos News.<\/p>\n<p>N\u2019h\u00e9sitez pas \u00e0 partager ces articles avec vos clients.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La protection shellcode dynamique dans Intercept X prot\u00e8ge contre les agents d\u2019acc\u00e8s \u00e0 distance.<\/p>\n","protected":false},"author":56,"featured_media":3000002650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[74],"tags":[33],"coauthors":[107],"class_list":["post-2863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-intercept-x"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/01\/featured-image-sophos-endpoint-blog-icon-1600x960-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/2863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=2863"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/2863\/revisions"}],"predecessor-version":[{"id":2901,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/2863\/revisions\/2901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=2863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=2863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=2863"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=2863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}