{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/","author_name":"Sheida Azimi","author_url":"https:\/\/unit42.paloaltonetworks.com\/fr\/author\/sheida-azimi\/","title":"Cartographie des environnements\u00a0cloud avec AzureHound","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"WN3n9O8yRC\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/fr\/threat-actor-misuse-of-azurehound\/\">Cartographie des environnements\u00a0cloud avec AzureHound<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unit42.paloaltonetworks.com\/fr\/threat-actor-misuse-of-azurehound\/embed\/#?secret=WN3n9O8yRC\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cartographie des environnements\u00a0cloud avec AzureHound\u00a0\u00bb &#8212; Unit 42\" data-secret=\"WN3n9O8yRC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/10\/08_Cloud_cybersecurity_research_Overview_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"Unit 42 analyse la mani\u00e8re dont des acteurs de la menace d\u00e9tournent AzureHound, un outil de pentesting, pour effectuer cartographier les environnements cloud. D\u00e9couvrez comment d\u00e9tecter cette activit\u00e9 gr\u00e2ce \u00e0 la t\u00e9l\u00e9m\u00e9trie."}