<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le avril 28, 2026 à 1:06 pm par All in One SEO Pro v4.9.6.2 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.vaadata.com/fr//default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Vaadata</title>
		<link><![CDATA[https://www.vaadata.com/fr/]]></link>
		<description><![CDATA[Vaadata]]></description>
		<lastBuildDate><![CDATA[Tue, 28 Apr 2026 10:36:31 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.vaadata.com/fr/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/pentest-ingenierie-sociale/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/pentest-ingenierie-sociale/]]></link>
			<title>Pentest d’Ingénierie Sociale</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:36:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/certificate-et-public-key-pinning/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/certificate-et-public-key-pinning/]]></link>
			<title>Certificate et Public Key Pinning</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:35:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/audit-de-securite-informatique-ce-que-vous-devez-savoir/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/audit-de-securite-informatique-ce-que-vous-devez-savoir/]]></link>
			<title>Audit de sécurité informatique : ce que vous devez savoir</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:24:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/rgpd-mesures-techniques-securite/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/rgpd-mesures-techniques-securite/]]></link>
			<title>RGPD : mesures techniques de sécurité</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:23:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/quel-est-le-bon-moment-pour-realiser-un-pentest/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/quel-est-le-bon-moment-pour-realiser-un-pentest/]]></link>
			<title>Quel est le bon moment pour réaliser un pentest ?</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:18:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/pentest-application-mobile/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/pentest-application-mobile/]]></link>
			<title>Pentest Application Mobile iOS et Android</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:17:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/pentest-iot-objets-connectes/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/pentest-iot-objets-connectes/]]></link>
			<title>Pentest IoT</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:17:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/pentest-infrastructure-reseau/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/pentest-infrastructure-reseau/]]></link>
			<title>Pentest infrastructure et réseau</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:17:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/pentest-web/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/pentest-web/]]></link>
			<title>Pentest Web</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:16:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/pourquoi-externaliser-ses-tests-intrusion/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/pourquoi-externaliser-ses-tests-intrusion/]]></link>
			<title>Pourquoi externaliser ses tests d’intrusion ?</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:15:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/social-engineering-and-red-teaming-understanding-threats-and-defence-strategies/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/social-engineering-and-red-teaming-understanding-threats-and-defence-strategies/]]></link>
			<title>Social Engineering and Red Teaming: Understanding Threats and Defence Strategies</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:54:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/about-vaadata/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/about-vaadata/]]></link>
			<title>About Vaadata</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:26:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/comprendre-les-attaques-par-port-usb/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/comprendre-les-attaques-par-port-usb/]]></link>
			<title>Comprendre les attaques par port USB</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/phishing-comment-identifier-les-emails-suspects/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/phishing-comment-identifier-les-emails-suspects/]]></link>
			<title>Phishing : comment identifier les emails suspects ?</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:11:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/un-secret-en-dur-mene-a-la-prise-de-controle-de-comptes/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/un-secret-en-dur-mene-a-la-prise-de-controle-de-comptes/]]></link>
			<title>Un secret en dur dans Pancake mène à la prise de contrôle de comptes &#8211; Bulletin Vaadata</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:09:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/legal-notices/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/legal-notices/]]></link>
			<title>Legal notices</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:04:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/2021-web-mobile-iot-cybersecurity-statistics-strengthen-your-security-with-pentest/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/2021-web-mobile-iot-cybersecurity-statistics-strengthen-your-security-with-pentest/]]></link>
			<title>2021 web, mobile, IoT cybersecurity statistics &#8211; Strengthen your security with a pentest</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 09:38:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/red-team/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/red-team/]]></link>
			<title>Red Team</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 09:22:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/pentest-cloud/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/pentest-cloud/]]></link>
			<title>Pentest Cloud</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 09:06:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/a-propos/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/a-propos/]]></link>
			<title>À propos</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:22:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/social-engineering-penetration-testing/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/social-engineering-penetration-testing/]]></link>
			<title>Social Engineering Penetration Testing</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 12:16:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/cookies/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/cookies/]]></link>
			<title>Cookies</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:19:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/cookies/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/cookies/]]></link>
			<title>Cookies</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:18:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/mentions-legales/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/mentions-legales/]]></link>
			<title>Mentions légales</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 16:14:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/iot-penetration-testing/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/iot-penetration-testing/]]></link>
			<title>IoT Penetration Testing</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:16:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/cloud-penetration-testing/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/cloud-penetration-testing/]]></link>
			<title>Cloud Penetration Testing</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 14:27:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/infrastructure-and-network-penetration-testing/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/infrastructure-and-network-penetration-testing/]]></link>
			<title>Infrastructure and Network Penetration Testing</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:41:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/mobile-app-penetration-testing/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/mobile-app-penetration-testing/]]></link>
			<title>Mobile App Penetration Testing</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:25:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/web-app-penetration-testing/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/web-app-penetration-testing/]]></link>
			<title>Web App Penetration Testing</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:45:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/contact/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:42:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/contact/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:42:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/ebooks-white-papers/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/ebooks-white-papers/]]></link>
			<title>Ebooks &amp; White Papers</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:07:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/assumed-breach/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/assumed-breach/]]></link>
			<title>Assumed Breach</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:48:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/assumed-breach/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/assumed-breach/]]></link>
			<title>Assumed Breach</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:47:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/red-teaming/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/red-teaming/]]></link>
			<title>Red Teaming</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:29:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/pentest/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/pentest/]]></link>
			<title>Pentest &#8211; Tests d’Intrusion</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 08:40:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/penetration-testing-services/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/penetration-testing-services/]]></link>
			<title>Penetration Testing Services</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 08:40:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/home/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/home/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 08:15:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/]]></link>
			<title>Accueil</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 07:10:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/ad-cs-security-understanding-and-exploiting-esc-techniques/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/ad-cs-security-understanding-and-exploiting-esc-techniques/]]></link>
			<title>AD CS Security: Understanding and Exploiting ESC Techniques</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:59:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/monitoring-active-directory-analyse-logs-ldap-et-regles-elk/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/monitoring-active-directory-analyse-logs-ldap-et-regles-elk/]]></link>
			<title>Monitoring Active Directory : analyse logs LDAP et règles ELK</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:58:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/active-directory-monitoring-ldap-log-analysis-and-elk-rules/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/active-directory-monitoring-ldap-log-analysis-and-elk-rules/]]></link>
			<title>Active Directory Monitoring: LDAP Log Analysis and ELK Rules</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:57:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/ingenierie-sociale-et-red-teaming-comprendre-les-menaces-et-les-leviers-de-defense/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/ingenierie-sociale-et-red-teaming-comprendre-les-menaces-et-les-leviers-de-defense/]]></link>
			<title>Ingénierie sociale et Red Teaming : comprendre les menaces et les leviers de défense</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:56:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/pass-the-hash-principes-variantes-et-bonnes-pratiques/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/pass-the-hash-principes-variantes-et-bonnes-pratiques/]]></link>
			<title>Pass-the-Hash : principes, variantes et bonnes pratiques</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:54:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/what-is-pass-the-hash-attacks-types-and-security-best-practices/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/what-is-pass-the-hash-attacks-types-and-security-best-practices/]]></link>
			<title>What is Pass-the-Hash? Attacks Types and Security Best Practices</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:53:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/injection-de-requetes-ransack-analyse-et-exploitation-dune-vulnerabilite-orm/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/injection-de-requetes-ransack-analyse-et-exploitation-dune-vulnerabilite-orm/]]></link>
			<title>Injection de requêtes Ransack : analyse et exploitation d’une vulnérabilité ORM</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:53:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/ransack-query-injection-analysis-and-exploitation-of-an-orm-vulnerability/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/ransack-query-injection-analysis-and-exploitation-of-an-orm-vulnerability/]]></link>
			<title>Ransack Query Injection: Analysis and Exploitation of an ORM Vulnerability</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 12:52:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/jwt-json-web-token-vulnerabilities-common-attacks-and-security-best-practices/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/jwt-json-web-token-vulnerabilities-common-attacks-and-security-best-practices/]]></link>
			<title>JWT (JSON Web Token): Vulnerabilities, Common Attacks and Security Best Practices</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:37:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/en/blog/nmap-the-tool-for-mapping-and-assessing-network-security/]]></guid>
			<link><![CDATA[https://www.vaadata.com/en/blog/nmap-the-tool-for-mapping-and-assessing-network-security/]]></link>
			<title>Nmap, the Tool for Mapping and Assessing Network Security</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:37:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.vaadata.com/fr/blog/]]></guid>
			<link><![CDATA[https://www.vaadata.com/fr/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 13:59:12 +0000]]></pubDate>
		</item>
				</channel>
</rss>
