{"id":26855,"date":"2023-09-08T11:32:41","date_gmt":"2023-09-08T09:32:41","guid":{"rendered":"https:\/\/sendapp.live\/?p=26855"},"modified":"2023-09-08T11:33:06","modified_gmt":"2023-09-08T09:33:06","slug":"les-pirates-controlent-la-securite-de-lia","status":"publish","type":"post","link":"https:\/\/sendapp.live\/fr\/2023\/09\/08\/gli-hacker-controllano-la-sicurezza-dellai\/","title":{"rendered":"Les pirates surveillent la s\u00e9curit\u00e9 de l\u2019IA"},"content":{"rendered":"<p class=\"entry-title my-4\"><strong>Les pirates surveillent la s\u00e9curit\u00e9 de l\u2019IA<\/strong><\/p>\n<p>\u00c0 l\u2019\u00e8re de l\u2019information, des titans de la technologie comme Microsoft, Google, Nvidia et Meta testent leurs mod\u00e8les d\u2019intelligence artificielle (IA) comme jamais auparavant. Avec l\u2019essor des syst\u00e8mes d\u2019IA g\u00e9n\u00e9rative, la s\u00e9curit\u00e9 est devenue une pr\u00e9occupation centrale. Forbes a interview\u00e9 les responsables des \u00e9quipes rouges d&#039;IA de ces entreprises, soulignant \u00e0 quel point la s\u00e9curit\u00e9 devient un crit\u00e8re marketing cl\u00e9 pour ces entreprises.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-26857\" src=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462.jpg\" alt=\"\" width=\"810\" height=\"462\" srcset=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462.jpg 810w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-300x171.jpg 300w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-768x438.jpg 768w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-18x10.jpg 18w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-600x342.jpg 600w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/h3>\n<h3>Mieux vaut pr\u00e9venir que gu\u00e9rir\u00a0: le r\u00f4le des \u00e9quipes rouges dans l\u2019IA<\/h3>\n<p>Une \u00e9quipe rouge est un groupe de hackers \u00e9thiques charg\u00e9s de tester la robustesse et la s\u00e9curit\u00e9 d\u2019un syst\u00e8me. OpenAI, par exemple, a embauch\u00e9 des experts externes pour tester les d\u00e9fauts et biais potentiels de ses mod\u00e8les GPT-3.5 et GPT-4. Ces experts ont effectu\u00e9 des tests qui ont r\u00e9v\u00e9l\u00e9 des r\u00e9ponses inacceptables g\u00e9n\u00e9r\u00e9es par les mod\u00e8les, qui ont \u00e9t\u00e9 rapidement corrig\u00e9es.<\/p>\n<p>De m\u00eame, d\u2019autres \u00e9quipes rouges ont examin\u00e9 des versions pr\u00e9liminaires de mod\u00e8les comme GPT-4, leur demandant d\u2019effectuer des activit\u00e9s ill\u00e9gales et malveillantes. Ces tests de s\u00e9curit\u00e9 ont conduit \u00e0 l&#039;identification et \u00e0 la correction de plusieurs vuln\u00e9rabilit\u00e9s.<\/p>\n<h3>Trouver le bon \u00e9quilibre\u00a0: s\u00e9curit\u00e9 et utilit\u00e9<\/h3>\n<p>Les chefs d\u2019\u00e9quipe rouge se retrouvent souvent oblig\u00e9s de trouver un \u00e9quilibre entre s\u00e9curit\u00e9 et utilit\u00e9. Un mod\u00e8le d\u2019IA trop restrictif est s\u00fbr mais inutile ; au contraire, un mod\u00e8le trop permissif est utile mais potentiellement dangereux. Il s\u2019agit d\u2019un exercice d\u2019\u00e9quilibre d\u00e9licat, qui n\u00e9cessite une attention constante et m\u00e9ticuleuse afin de conserver les mod\u00e8les \u00e0 la fois utiles et s\u00fbrs.<\/p>\n<h3>Techniques et tactiques de l&#039;\u00e9quipe rouge en IA<\/h3>\n<p>Le concept de red teaming n\u2019est pas nouveau et remonte aux ann\u00e9es 1960. Cependant, avec l\u2019av\u00e8nement de l\u2019IA g\u00e9n\u00e9rative, les m\u00e9thodes de test et les d\u00e9fis de s\u00e9curit\u00e9 ont \u00e9volu\u00e9. Les \u00e9quipes rouges emploient diverses tactiques, allant de la g\u00e9n\u00e9ration de r\u00e9ponses inappropri\u00e9es \u00e0 l&#039;extraction de donn\u00e9es sensibles et \u00e0 la contamination d&#039;ensembles de donn\u00e9es. Daniel Fabian, responsable de la nouvelle \u00e9quipe rouge IA de Google, explique que l&#039;\u00e9quipe utilise un ensemble diversifi\u00e9 de techniques pour assurer la s\u00e9curit\u00e9 des mod\u00e8les.<\/p>\n<div id=\"attachment_26860\" style=\"width: 903px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-26860\" class=\"size-full wp-image-26860\" src=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01.jpg\" alt=\"\" width=\"893\" height=\"536\" srcset=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01.jpg 893w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-300x180.jpg 300w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-768x461.jpg 768w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-18x12.jpg 18w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-600x360.jpg 600w\" sizes=\"auto, (max-width: 893px) 100vw, 893px\" \/><p id=\"caption-attachment-26860\" class=\"wp-caption-text\">102010925 \u2013 pirate informatique utilisant Internet pirat\u00e9 un serveur informatique abstrait, une base de donn\u00e9es, un stockage r\u00e9seau, un pare-feu, un compte de r\u00e9seau social, un vol de donn\u00e9es<\/p><\/div>\n<h3>Partage de connaissances et d&#039;outils\u00a0: la communaut\u00e9 Red Team<\/h3>\n<p>Le domaine de la s\u00e9curit\u00e9 de l\u2019IA \u00e9tant encore en d\u00e9veloppement, les \u00e9quipes rouges ont tendance \u00e0 partager leurs d\u00e9couvertes et leurs outils. Microsoft a mis \u00e0 la disposition du public des outils de test de s\u00e9curit\u00e9 open source, tels que Counterfit. Ce partage de ressources et de connaissances contribue \u00e0 renforcer l\u2019ensemble de l\u2019\u00e9cosyst\u00e8me de l\u2019IA.<\/p>\n<h3>\u00c9v\u00e9nements de haut niveau et d\u00e9fis Red Teaming<\/h3>\n<p>R\u00e9cemment, un \u00e9v\u00e9nement soutenu par la Maison Blanche a r\u00e9uni plusieurs g\u00e9ants de la technologie, qui ont mis leurs mod\u00e8les d\u2019IA \u00e0 la disposition des pirates informatiques ext\u00e9rieurs. Ces tests intensifs ont conduit \u00e0 la d\u00e9couverte de plusieurs nouvelles vuln\u00e9rabilit\u00e9s, d\u00e9montrant l\u2019importance de tels \u00e9v\u00e9nements pour la s\u00e9curit\u00e9 mondiale de l\u2019IA.<\/p>\n<h3>L\u2019importance croissante de la s\u00e9curit\u00e9 dans l\u2019IA<\/h3>\n<p>Alors que le public et les gouvernements accordent une attention accrue \u00e0 la s\u00e9curit\u00e9 de l\u2019IA, les \u00e9quipes rouges deviennent un \u00e9l\u00e9ment essentiel du succ\u00e8s des entreprises technologiques. Ils aident non seulement \u00e0 identifier et \u00e0 corriger les vuln\u00e9rabilit\u00e9s, mais offrent \u00e9galement un avantage concurrentiel, alors que la s\u00e9curit\u00e9 et la confiance deviennent de plus en plus critiques dans le paysage de l&#039;IA.<\/p>\n<p>En conclusion, les hackers contr\u00f4lent la s\u00e9curit\u00e9 de l\u2019IA dans la bataille visant \u00e0 rendre l\u2019intelligence artificielle plus s\u00fbre. Gr\u00e2ce \u00e0 un ensemble de techniques avanc\u00e9es, d&#039;\u00e9v\u00e9nements de grande envergure et de partage de connaissances,<\/p>","protected":false},"excerpt":{"rendered":"<p>Les pirates informatiques contr\u00f4lent la s\u00e9curit\u00e9 de l&#039;IA \u00c0 l&#039;\u00e8re de l&#039;information, les titans de la technologie comme Microsoft, Google, Nvidia et Meta testent leurs mod\u00e8les d&#039;intelligence artificielle (IA) comme jamais auparavant\u2026<\/p>","protected":false},"author":22,"featured_media":26856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daim_seo_power":"","_daim_enable_ail":"","footnotes":""},"categories":[2538],"tags":[2855,3089,840,3617,3009,3119,3618],"class_list":{"0":"post-26855","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-microsoft","9":"tag-ai","10":"tag-google","11":"tag-hacker","12":"tag-meta","13":"tag-nvidia","14":"tag-red-teaming"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gli Hacker Controllano La Sicurezza Dell&#039;AI<\/title>\n<meta name=\"description\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI. Nell&#039;era dell&#039;informazione, i titani tecnologici come Microsoft, Google\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sendapp.live\/fr\/2023\/09\/08\/les-pirates-controlent-la-securite-de-lia\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI\" \/>\n<meta property=\"og:description\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI. Nell&#039;era dell&#039;informazione, i titani tecnologici come Microsoft, Google\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sendapp.live\/fr\/2023\/09\/08\/les-pirates-controlent-la-securite-de-lia\/\" \/>\n<meta property=\"og:site_name\" content=\"SendApp - Software Whatsapp Marketing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sendapp.live\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T09:32:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T09:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sendapp_live\" \/>\n<meta name=\"twitter:site\" content=\"@sendapp_live\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"},\"author\":{\"name\":\"Blogger\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/person\\\/d299d0c16bd060adfd11119ff8f7d98b\"},\"headline\":\"Gli Hacker Controllano La Sicurezza Dell&#8217;AI\",\"datePublished\":\"2023-09-08T09:32:41+00:00\",\"dateModified\":\"2023-09-08T09:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"keywords\":[\"#Microsoft\",\"ai\",\"Google\",\"Hacker\",\"meta\",\"nvidia\",\"Red Teaming\"],\"articleSection\":[\"news\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\",\"url\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\",\"name\":\"Gli Hacker Controllano La Sicurezza Dell'AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"datePublished\":\"2023-09-08T09:32:41+00:00\",\"dateModified\":\"2023-09-08T09:33:06+00:00\",\"description\":\"Gli Hacker Controllano La Sicurezza Dell'AI. Nell'era dell'informazione, i titani tecnologici come Microsoft, Google\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"contentUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sendapp.live\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gli Hacker Controllano La Sicurezza Dell&#8217;AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/sendapp.live\\\/it\\\/\",\"name\":\"SendApp\",\"description\":\"Automate Your Messages &amp; Grow Your Business\",\"publisher\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\"},\"alternateName\":\"SendApp WhatsApp Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sendapp.live\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\",\"name\":\"SendApp\",\"url\":\"https:\\\/\\\/sendapp.live\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Logo-Sendapp-300x60-1.png\",\"contentUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Logo-Sendapp-300x60-1.png\",\"width\":300,\"height\":60,\"caption\":\"SendApp\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/sendapp.live\",\"https:\\\/\\\/x.com\\\/sendapp_live\",\"https:\\\/\\\/www.instagram.com\\\/sendapp.live\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC2gaLpi0-OJLG4CFbOr6mLw\",\"https:\\\/\\\/it.trustpilot.com\\\/review\\\/sendapp.live\"],\"description\":\"Piattaforma italiana di WhatsApp Marketing con API ufficiali Meta. Assistente AI, campagne massive, SMS Gateway gratuito, Google Calendar, automazioni. Da \u20ac16\\\/mese senza markup sui messaggi.\",\"email\":\"info@sendapp.live\",\"foundingDate\":\"2016-07-25\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/person\\\/d299d0c16bd060adfd11119ff8f7d98b\",\"name\":\"Blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"caption\":\"Blogger\"},\"url\":\"https:\\\/\\\/sendapp.live\\\/fr\\\/author\\\/blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les pirates surveillent la s\u00e9curit\u00e9 de l\u2019IA","description":"Les pirates surveillent la s\u00e9curit\u00e9 de l\u2019IA. \u00c0 l&#039;\u00e8re de l&#039;information, des g\u00e9ants de la technologie comme Microsoft, Google","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sendapp.live\/fr\/2023\/09\/08\/les-pirates-controlent-la-securite-de-lia\/","og_locale":"fr_FR","og_type":"article","og_title":"Gli Hacker Controllano La Sicurezza Dell'AI","og_description":"Gli Hacker Controllano La Sicurezza Dell'AI. Nell'era dell'informazione, i titani tecnologici come Microsoft, Google","og_url":"https:\/\/sendapp.live\/fr\/2023\/09\/08\/les-pirates-controlent-la-securite-de-lia\/","og_site_name":"SendApp - Software Whatsapp Marketing","article_publisher":"https:\/\/www.facebook.com\/sendapp.live","article_published_time":"2023-09-08T09:32:41+00:00","article_modified_time":"2023-09-08T09:33:06+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","type":"image\/jpeg"}],"author":"Blogger","twitter_card":"summary_large_image","twitter_creator":"@sendapp_live","twitter_site":"@sendapp_live","twitter_misc":{"\u00c9crit par":"Blogger","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#article","isPartOf":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"},"author":{"name":"Blogger","@id":"https:\/\/sendapp.live\/it\/#\/schema\/person\/d299d0c16bd060adfd11119ff8f7d98b"},"headline":"Gli Hacker Controllano La Sicurezza Dell&#8217;AI","datePublished":"2023-09-08T09:32:41+00:00","dateModified":"2023-09-08T09:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/sendapp.live\/it\/#organization"},"image":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","keywords":["#Microsoft","ai","Google","Hacker","meta","nvidia","Red Teaming"],"articleSection":["news"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/","url":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/","name":"Les pirates surveillent la s\u00e9curit\u00e9 de l\u2019IA","isPartOf":{"@id":"https:\/\/sendapp.live\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"image":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","datePublished":"2023-09-08T09:32:41+00:00","dateModified":"2023-09-08T09:33:06+00:00","description":"Les pirates surveillent la s\u00e9curit\u00e9 de l\u2019IA. \u00c0 l&#039;\u00e8re de l&#039;information, des g\u00e9ants de la technologie comme Microsoft, Google","breadcrumb":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage","url":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","contentUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sendapp.live\/"},{"@type":"ListItem","position":2,"name":"Gli Hacker Controllano La Sicurezza Dell&#8217;AI"}]},{"@type":"WebSite","@id":"https:\/\/sendapp.live\/it\/#website","url":"https:\/\/sendapp.live\/it\/","name":"EnvoyerApp","description":"Automatisez vos messages et d\u00e9veloppez votre activit\u00e9","publisher":{"@id":"https:\/\/sendapp.live\/it\/#organization"},"alternateName":"SendApp WhatsApp Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sendapp.live\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/sendapp.live\/it\/#organization","name":"EnvoyerApp","url":"https:\/\/sendapp.live\/it\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sendapp.live\/it\/#\/schema\/logo\/image\/","url":"https:\/\/sendapp.live\/wp-content\/uploads\/2025\/04\/Logo-Sendapp-300x60-1.png","contentUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2025\/04\/Logo-Sendapp-300x60-1.png","width":300,"height":60,"caption":"SendApp"},"image":{"@id":"https:\/\/sendapp.live\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sendapp.live","https:\/\/x.com\/sendapp_live","https:\/\/www.instagram.com\/sendapp.live","https:\/\/www.youtube.com\/channel\/UC2gaLpi0-OJLG4CFbOr6mLw","https:\/\/it.trustpilot.com\/review\/sendapp.live"],"description":"Plateforme italienne de marketing WhatsApp avec API Meta officielle. Assistant IA, campagnes de masse, passerelle SMS gratuite, Google Agenda, automatisations. \u00c0 partir de 16 \u20ac\/mois sans majoration de prix.","email":"info@sendapp.live","foundingDate":"2016-07-25"},{"@type":"Person","@id":"https:\/\/sendapp.live\/it\/#\/schema\/person\/d299d0c16bd060adfd11119ff8f7d98b","name":"Blogueurs","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","caption":"Blogger"},"url":"https:\/\/sendapp.live\/fr\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/posts\/26855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/comments?post=26855"}],"version-history":[{"count":1,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/posts\/26855\/revisions"}],"predecessor-version":[{"id":26862,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/posts\/26855\/revisions\/26862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/media\/26856"}],"wp:attachment":[{"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/media?parent=26855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/categories?post=26855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sendapp.live\/fr\/wp-json\/wp\/v2\/tags?post=26855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}