<?xml version='1.0' encoding='UTF-8'?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:ccmbenchmark="https://www.ccmbenchmark.com/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>Olivier M&amp;eacute;lis : Dernier contenus</title><link>/account/olivier-melis-12548</link><atom:link href="/account/olivier-melis-12548" rel="self" type="application/rss+xml" /><language>fr</language><pubDate>Sun, 19 Apr 2026 15:58:13 +0200</pubDate><lastBuildDate>Sun, 19 Apr 2026 15:58:13 +0200</lastBuildDate><item><title>Opération Windigo : annihiler le démon en renforçant la protection des comptes à privilèges</title><link>https://www.journaldunet.com/solutions/dsi/1137528-operation-windigo-annihiler-le-demon-en-renforcant-la-protection-des-comptes-a-privileges/</link><description><![CDATA[<a href="https://www.journaldunet.com/solutions/dsi/1137528-operation-windigo-annihiler-le-demon-en-renforcant-la-protection-des-comptes-a-privileges/"><img src="https://img-0.journaldunet.com/WeRXVS_s5zWCGbMdGa9BLS1P16Y=/100x/smart/a6d1910ae220489f85e3b760609a58af/user-jdn/28029.jpg" align="left" hspace="5" vspace="0"></a>L’éditeur de solutions de sécurité ESET a récemment mis en lumière les résultats de « l’opération Windigo », un rapport sur le malware sophistiqué qui aurait détourné plus de 25 000 serveurs Unix/Linux depuis 2011.]]></description><pubDate>Mon, 28 Apr 2014 15:36:39 +0200</pubDate><guid>https://www.journaldunet.com/solutions/dsi/1137528-operation-windigo-annihiler-le-demon-en-renforcant-la-protection-des-comptes-a-privileges/</guid><dc:creator><![CDATA[Olivier M&eacute;lis]]></dc:creator><ccmbenchmark:content_author><![CDATA[Olivier M&eacute;lis]]></ccmbenchmark:content_author><ccmbenchmark:content_author_company><![CDATA[CyberArk]]></ccmbenchmark:content_author_company><ccmbenchmark:content_author_illustration>1</ccmbenchmark:content_author_illustration></item></channel></rss>