{"id":22920,"date":"2024-12-30T16:39:02","date_gmt":"2024-12-30T16:39:02","guid":{"rendered":"https:\/\/www.complycube.com\/?p=22920"},"modified":"2025-01-06T09:27:48","modified_gmt":"2025-01-06T09:27:48","slug":"la-cybercriminalite-a-surveiller-en-2025","status":"publish","type":"post","link":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/","title":{"rendered":"La cybercriminalit\u00e9 \u00e0 surveiller en 2025"},"content":{"rendered":"<p>En 2024, la fraude num\u00e9rique a connu une forte hausse \u00e0 l\u2019\u00e9chelle mondiale. Les entreprises comme les particuliers sont confront\u00e9s \u00e0 une menace en constante \u00e9volution qui a commenc\u00e9 \u00e0 devenir incontr\u00f4lable. L\u2019IA a permis aux fraudeurs de cr\u00e9er de fausses identit\u00e9s extr\u00eamement trompeuses, en exploitant des technologies telles que les deepfakes pour commettre des attaques de pr\u00e9sentation sophistiqu\u00e9es lors des processus d\u2019int\u00e9gration des clients, entra\u00eenant souvent de graves cons\u00e9quences financi\u00e8res. \u00c0 l\u2019horizon 2025, \u00e0 quels types de d\u00e9lits num\u00e9riques les entreprises doivent-elles se pr\u00e9parer et que peuvent-elles faire pour renforcer leurs d\u00e9fenses ?<\/p>\n\n\n\n<p>Plusieurs formes cl\u00e9s de criminalit\u00e9 num\u00e9rique domineront les tentatives de fraude dans l\u2019ann\u00e9e \u00e0 venir, notamment les deepfakes de plus en plus sophistiqu\u00e9s, la fraude sur les r\u00e9seaux sociaux, les attaques de phishing men\u00e9es par l\u2019IA g\u00e9n\u00e9rative, les identit\u00e9s compromises, etc. En outre, \u00e0 mesure que des technologies comme l\u2019IA g\u00e9n\u00e9rative deviennent plus simples \u00e0 utiliser, le nombre d\u2019acteurs malveillants continue d\u2019augmenter. La barri\u00e8re \u00e0 l\u2019entr\u00e9e en termes de perp\u00e9tration d\u2019attaques frauduleuses a consid\u00e9rablement diminu\u00e9, avec des outils comme DeepFakeLab accessibles au public pour que chacun puisse cr\u00e9er un deepfake de son choix.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attaques de pr\u00e9sentations sophistiqu\u00e9es : Deepfakes<\/h2>\n\n\n\n<p>Les attaques de deepfakes ne sont plus rares, et de nombreux outils sont disponibles en ligne et peuvent \u00eatre utilis\u00e9s par n\u2019importe qui pour en cr\u00e9er une. Leur pr\u00e9valence en ligne a consid\u00e9rablement augment\u00e9 au cours des derni\u00e8res ann\u00e9es, un rapport de Deloitte faisant \u00e9tat d\u2019une augmentation de 100 % des attaques de deepfakes. <a href=\"https:\/\/eftsure.com\/statistics\/deepfake-statistics\/#source-wrapper\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">Augmentation du 700%<\/a> dans les incidents de deepfake dans la fintech rien qu&#039;en 2023.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>D&#039;ici 2026, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-01-gartner-predicts-30-percent-of-enterprises-will-consider-identity-verification-and-authentication-solutions-unreliable-in-isolation-due-to-deepfakes-by-2026\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">30% des organisations<\/a> consid\u00e9reront leurs syst\u00e8mes d\u2019authentification ou d\u2019identification num\u00e9rique existants comme insuffisants pour lutter contre les menaces deepfake.<\/p>\n<\/blockquote>\n\n\n\n<p>Un rapport Ofcom de 2024 a r\u00e9v\u00e9l\u00e9 que <a href=\"https:\/\/www.ofcom.org.uk\/online-safety\/illegal-and-harmful-content\/deepfakes-demean-defraud-disinform\/\" target=\"_blank\" rel=\"noopener nofollow\" title=\"https:\/\/www.ofcom.org.uk\/online-safety\/illegal-and-harmful-content\/deepfakes-demean-defraud-disinform\/\">60% de personnes<\/a> au Royaume-Uni ont rencontr\u00e9 au moins un deepfake. De plus, Gartner pr\u00e9dit que d&#039;ici 2026, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-01-gartner-predicts-30-percent-of-enterprises-will-consider-identity-verification-and-authentication-solutions-unreliable-in-isolation-due-to-deepfakes-by-2026\" target=\"_blank\" rel=\"noopener nofollow\" title=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-01-gartner-predicts-30-percent-of-enterprises-will-consider-identity-verification-and-authentication-solutions-unreliable-in-isolation-due-to-deepfakes-by-2026\">30% des organisations<\/a> consid\u00e9reront leurs syst\u00e8mes d\u2019authentification ou d\u2019identification num\u00e9rique existants comme insuffisants pour lutter contre les menaces deepfake. <\/p>\n\n\n\n<p>Akif Khan, vice-pr\u00e9sident analyste chez Gartner, d\u00e9clare : \u00ab Au cours de la derni\u00e8re d\u00e9cennie, plusieurs points d&#039;inflexion dans les domaines de l&#039;IA se sont produits, permettant la cr\u00e9ation d&#039;images synth\u00e9tiques. Ces images g\u00e9n\u00e9r\u00e9es artificiellement de visages de personnes r\u00e9elles, appel\u00e9es deepfakes, peuvent \u00eatre utilis\u00e9es par des acteurs malveillants pour compromettre l&#039;authentification biom\u00e9trique ou la rendre inefficace. En cons\u00e9quence, les organisations peuvent commencer \u00e0 remettre en question la fiabilit\u00e9 des solutions de v\u00e9rification et d&#039;authentification d&#039;identit\u00e9, car elles ne seront pas en mesure de d\u00e9terminer si le visage de la personne v\u00e9rifi\u00e9e est un visage humain. <a title=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-01-gartner-predicts-30-percent-of-enterprises-will-consider-identity-verification-and-authentication-solutions-unreliable-in-isolation-due-to-deepfakes-by-2026\" href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-01-gartner-predicts-30-percent-of-enterprises-will-consider-identity-verification-and-authentication-solutions-unreliable-in-isolation-due-to-deepfakes-by-2026\" target=\"_blank\" rel=\"noopener nofollow\">personne vivante ou un deepfake.<\/a>\u00bb<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-1024x577.png\" alt=\"Les deepfakes et les attaques de pr\u00e9sentation dans la criminalit\u00e9 num\u00e9rique en 2025\" class=\"wp-image-22925\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-1024x577.png 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-300x169.png 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-768x433.png 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-1536x866.png 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-2048x1154.png 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/2-4-18x10.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Les humains sont souvent incapables de diff\u00e9rencier un deepfake d\u2019une personne vivante, c\u2019est pourquoi les organisations doivent commencer \u00e0 investir massivement dans des logiciels de d\u00e9tection de pr\u00e9sence vivante de pointe. <a href=\"https:\/\/www.complycube.com\/fr\/solutions\/conformite-aux-exigences-de-diligence-raisonnable\/connaissez-votre-client\/detection-de-vivacite\/\" target=\"_blank\" rel=\"noopener\" title=\"https:\/\/www.complycube.com\/en\/solutions\/due-diligence-compliance\/know-your-customer\/liveness-detection\/\">Technologies de d\u00e9tection de vivacit\u00e9<\/a> peut identifier les deepfakes en analysant la texture de la peau, les micro-expressions subtiles et bien plus encore qui sont ind\u00e9tectables \u00e0 l&#039;\u0153il humain ou aux simples processus de v\u00e9rification d&#039;identit\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les plateformes de m\u00e9dias sociaux, nouveau terrain de jeu de la cybercriminalit\u00e9<\/h2>\n\n\n\n<p>Au-del\u00e0 de la simplification des pratiques de v\u00e9rification d&#039;identit\u00e9, le syst\u00e8me d&#039;identification \u00e9lectronique pose \u00e9galement les bases d&#039;une cybers\u00e9curit\u00e9 num\u00e9rique rapide. Il est d\u00e9j\u00e0 de notori\u00e9t\u00e9 publique que les plateformes de m\u00e9dias sociaux sont le lieu o\u00f9 commencent de nombreux crimes modernes, Facebook ayant admis avoir supprim\u00e9 700 millions de faux comptes de m\u00e9dias sociaux au quatri\u00e8me trimestre 2023, apr\u00e8s en avoir supprim\u00e9 827 millions au trimestre pr\u00e9c\u00e9dent. Il ne fait aucun doute qu&#039;en 2025, cette tendance se poursuivra, car le nombre d&#039;utilisateurs de m\u00e9dias sociaux continuera d&#039;augmenter.<\/p>\n\n\n\n<p>Les outils d\u2019IA g\u00e9n\u00e9rative permettront \u00e9galement aux fraudeurs de mener des attaques d\u2019usurpation d\u2019identit\u00e9 de plus haut niveau, ce qui exposera les utilisateurs des r\u00e9seaux sociaux \u00e0 un risque plus \u00e9lev\u00e9 de devenir victimes de pratiques telles que le catfishing et les escroqueries par abattage de porcs. Des mod\u00e8les de langage avanc\u00e9s comme Chat GPT peuvent g\u00e9n\u00e9rer du texte qui imite le style d\u2019\u00e9criture d\u2019une personne, ce qui permet aux fraudeurs d\u2019usurper l\u2019identit\u00e9 d\u2019une personne dans des messages ou des publications. De m\u00eame, l\u2019IA peut \u00eatre utilis\u00e9e pour cr\u00e9er automatiquement un grand nombre de faux comptes sur les plateformes de r\u00e9seaux sociaux, en utilisant des profils avec des noms, des photos et des arri\u00e8re-plans r\u00e9alistes.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Presque <a href=\"https:\/\/www.decisionmarketing.co.uk\/news\/labour-to-force-tech-giants-to-cough-up-for-online-scams#:~:text=A%20Lloyds%20Banking%20Group%20spokesperson,ready%20to%20play%20our%20part.\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">80% des escroqueries<\/a> commencer en ligne.<\/p>\n<\/blockquote>\n\n\n\n<p>Un porte-parole de Lloyds s&#039;est r\u00e9cemment entretenu avec le Sunday Times, d\u00e9clarant que \u00ab pr\u00e8s de 801 000 escroqueries commencent en ligne, et nous demandons depuis longtemps aux r\u00e9seaux sociaux et aux entreprises technologiques de faire davantage pour y parvenir. <a href=\"https:\/\/www.decisionmarketing.co.uk\/news\/labour-to-force-tech-giants-to-cough-up-for-online-scams#:~:text=A%20Lloyds%20Banking%20Group%20spokesperson,ready%20to%20play%20our%20part.\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">prot\u00e9ger leurs utilisateurs<\/a> et aider \u00e0 rembourser les victimes innocentes. \u00bb<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-1024x577.png\" alt=\"Les deepfakes et les attaques de pr\u00e9sentation dans la criminalit\u00e9 num\u00e9rique en 2025\" class=\"wp-image-22926\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-1024x577.png 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-300x169.png 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-768x433.png 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-1536x866.png 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-2048x1154.png 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/3-3-18x10.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Jusqu&#039;\u00e0 pr\u00e9sent, nous n&#039;avons pas vu les plateformes de r\u00e9seaux sociaux mettre en \u0153uvre pleinement les contr\u00f4les de s\u00e9curit\u00e9 n\u00e9cessaires, car il ne pourrait pas \u00eatre plus simple de cr\u00e9er un compte Instagram ou Facebook sous une fausse identit\u00e9. Cependant, si ces plateformes mettaient en place des processus d&#039;inscription plus stricts avec une preuve d&#039;identit\u00e9 comme exigence, les cas de fraude diminueraient.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attaques de phishing prenant en charge l&#039;IA g\u00e9n\u00e9rative<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><\/figure>\n\n\n\n<p>Les menaces de phishing renforc\u00e9es par l&#039;IA prennent de nombreuses formes, depuis les e-mails g\u00e9n\u00e9r\u00e9s avec une grammaire irr\u00e9prochable et l&#039;inclusion de donn\u00e9es personnelles jusqu&#039;aux logiciels malveillants hautement adaptatifs capables d&#039;apprendre et d&#039;\u00e9chapper aux syst\u00e8mes de d\u00e9tection. Cette nouvelle g\u00e9n\u00e9ration d&#039;attaques de phishing exploitera la capacit\u00e9 de l&#039;IA \u00e0 apprendre \u00e0 partir de donn\u00e9es en temps r\u00e9el, en s&#039;adaptant en r\u00e9ponse \u00e0 l&#039;\u00e9volution des mesures de s\u00e9curit\u00e9, ce qui rendra la d\u00e9tection encore plus difficile.<\/p>\n\n\n\n<p>En plus de la qualit\u00e9 des attaques de phishing, leur nombre va \u00e9galement augmenter avec l\u2019aide de l\u2019IA g\u00e9n\u00e9rative. L\u2019IA g\u00e9n\u00e9rative permettra de mener des milliers d\u2019attaques de phishing cibl\u00e9es simultan\u00e9ment, sans compromettre la personnalisation cibl\u00e9e pour un effet maximal. Les fraudeurs m\u00e8neront des op\u00e9rations \u00e0 grande \u00e9chelle, avec des chances de r\u00e9ussite beaucoup plus \u00e9lev\u00e9es. De plus, comme il devient plus facile de commettre des fraudes avec l\u2019aide de l\u2019IA et que moins d\u2019expertise technique est n\u00e9cessaire, davantage de fraudeurs commenceront \u00e0 \u00e9merger.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10466545\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">Les recherches que nous avons publi\u00e9es plus t\u00f4t cette ann\u00e9e ont montr\u00e9<\/a> que 60% de participants ont \u00e9t\u00e9 victimes d&#039;un phishing automatis\u00e9 par intelligence artificielle (IA), ce qui est comparable aux taux de r\u00e9ussite des messages d&#039;hame\u00e7onnage non IA cr\u00e9\u00e9s par des experts humains. ~ Harvard Business Review<\/p>\n<\/blockquote>\n\n\n\n<p>D\u00e9but 2024, Harvard Business Review a publi\u00e9 une \u00e9tude qui a mis en \u00e9vidence le taux de r\u00e9ussite bien plus \u00e9lev\u00e9 des e-mails de phishing am\u00e9lior\u00e9s par l&#039;IA, avec 601 TP5T de participants victimes de ces escroqueries. Ils d\u00e9clarent : \u00ab Peut-\u00eatre encore plus inqui\u00e9tant, notre nouvelle recherche d\u00e9montre que l&#039;ensemble du processus de phishing peut \u00eatre automatis\u00e9 \u00e0 l&#039;aide de LLM, ce qui r\u00e9duit les co\u00fbts des attaques de phishing de <a href=\"https:\/\/hbr.org\/2024\/05\/ai-will-increase-the-quantity-and-quality-of-phishing-scams\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">plus de 95%<\/a> tout en obtenant des taux de r\u00e9ussite \u00e9gaux ou sup\u00e9rieurs. \u00bb Cela sugg\u00e8re que les attaques de phishing ne s&#039;am\u00e9lioreront pas seulement en qualit\u00e9, mais aussi en quantit\u00e9, avec une grande quantit\u00e9 d&#039;attaques men\u00e9es dans le monde entier dans tous les secteurs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attaques contre les cha\u00eenes d\u2019approvisionnement :<\/h2>\n\n\n\n<p class=\"wp-block-heading\">\u00c0 l\u2019approche de 2025, les attaques contre la cha\u00eene d\u2019approvisionnement devraient devenir plus sophistiqu\u00e9es, les cybercriminels ciblant les fournisseurs plus petits et moins s\u00e9curis\u00e9s pour acc\u00e9der aux grandes organisations. Ces attaques peuvent impliquer des fraudes bas\u00e9es sur l\u2019IA, des ransomwares, des exfiltrations de donn\u00e9es et m\u00eame des perturbations d\u2019infrastructures critiques. Le Centre national de cybers\u00e9curit\u00e9 du Royaume-Uni d\u00e9clare : \u00ab Ces derni\u00e8res ann\u00e9es, le nombre de cyberattaques a consid\u00e9rablement augment\u00e9.<a href=\"https:\/\/www.ncsc.gov.uk\/collection\/supply-chain-security\/supply-chain-attack-examples\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\"> r\u00e9sultant de vuln\u00e9rabilit\u00e9s au sein de la cha\u00eene d&#039;approvisionnement<\/a>\u00ab Ces attaques peuvent avoir des cons\u00e9quences d\u00e9vastatrices, co\u00fbteuses et \u00e0 long terme pour les organisations touch\u00e9es, leurs cha\u00eenes d\u2019approvisionnement et leurs clients. \u00bb<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong data-renderer-mark=\"true\">Principales tendances en mati\u00e8re d\u2019attaques contre la cha\u00eene d\u2019approvisionnement :<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong data-renderer-mark=\"true\">Attaques bas\u00e9es sur l&#039;IA<\/strong>:Les fraudeurs utiliseront des outils d\u2019IA pour cr\u00e9er de fausses communications, du phishing et des deepfakes, rendant la d\u00e9tection plus difficile.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong data-renderer-mark=\"true\">Cibler les petits fournisseurs<\/strong>:Les cybercriminels exploiteront les maillons les plus faibles de la cha\u00eene d\u2019approvisionnement pour infiltrer des organisations plus grandes.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong data-renderer-mark=\"true\">Ransomware et vol de donn\u00e9es<\/strong>:Les attaquants peuvent prendre des syst\u00e8mes en otage ou voler des donn\u00e9es sensibles pour exiger une ran\u00e7on.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong data-renderer-mark=\"true\">Perturbation des infrastructures critiques<\/strong>:Les attaques sur la cha\u00eene d\u2019approvisionnement peuvent cibler des secteurs comme l\u2019\u00e9nergie ou la sant\u00e9 et causer des dommages consid\u00e9rables.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Fortifying-Operations-with-Robust-KYC\">Renforcer les op\u00e9rations de lutte contre la cybercriminalit\u00e9 gr\u00e2ce \u00e0 une connaissance du client (KYC) robuste<\/h2>\n\n\n\n<p>Les processus KYC (Know Your Customer) peuvent \u00eatre essentiels pour att\u00e9nuer de nombreuses menaces de fraude num\u00e9rique \u00e9mergentes auxquelles les entreprises seront confront\u00e9es en 2025, telles que les deepfakes, la fraude sur les r\u00e9seaux sociaux, le phishing bas\u00e9 sur l&#039;IA et les attaques de la cha\u00eene d&#039;approvisionnement.<\/p>\n\n\n\n<p><strong data-renderer-mark=\"true\">Lutte contre les deepfakes<\/strong>: KYC peut renforcer la v\u00e9rification d&#039;identit\u00e9 en garantissant que les personnes soumises \u00e0 l&#039;int\u00e9gration sont bien celles qu&#039;elles pr\u00e9tendent \u00eatre. En int\u00e9grant <a href=\"https:\/\/www.complycube.com\/fr\/solutions\/conformite-aux-exigences-de-diligence-raisonnable\/connaissez-votre-client\/detection-de-vivacite\/\" target=\"_blank\" rel=\"noopener\" title=\"\">d\u00e9tection de vivacit\u00e9<\/a> Gr\u00e2ce \u00e0 KYC, les entreprises peuvent emp\u00eacher la fraude par deepfake lors de la cr\u00e9ation de compte ou des transactions financi\u00e8res, ce qui rend plus difficile pour les fraudeurs de se faire passer pour des clients l\u00e9gitimes. Pour plus d&#039;informations sur l&#039;essor des deepfakes, lisez \u00ab<a href=\"https:\/\/www.complycube.com\/fr\/logiciel-de-detection-de-deepfake-empechant-le-contenu-frauduleux\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Logiciel de d\u00e9tection de Deepfake : pr\u00e9venir le contenu frauduleux.<\/a>&quot;<\/p>\n\n\n\n<p><strong data-renderer-mark=\"true\">Pr\u00e9venir le phishing bas\u00e9 sur l&#039;IA<\/strong>: Les donn\u00e9es KYC permettent de garantir que les communications (e-mails, messages, etc.) impliquant des actions sensibles, telles que les virements \u00e9lectroniques ou les changements de compte, sont authentifi\u00e9es. En v\u00e9rifiant l&#039;identit\u00e9 de la personne derri\u00e8re chaque demande, les entreprises peuvent mieux identifier les tentatives de phishing g\u00e9n\u00e9r\u00e9es par l&#039;IA, qui s&#039;appuient sur l&#039;imitation des mod\u00e8les de communication humaine.<\/p>\n\n\n\n<p><strong data-renderer-mark=\"true\">S\u00e9curiser la cha\u00eene d&#039;approvisionnement<\/strong>:Le KYC peut \u00eatre utilis\u00e9 pour v\u00e9rifier la l\u00e9gitimit\u00e9 des fournisseurs et vendeurs tiers, garantissant qu&#039;ils ne sont pas li\u00e9s \u00e0 des activit\u00e9s frauduleuses ou criminelles. En effectuant une v\u00e9rification approfondie de tous les fournisseurs, les entreprises peuvent r\u00e9duire le risque d&#039;attaques de la cha\u00eene d&#039;approvisionnement qui exploitent les maillons faibles pour infiltrer des organisations plus grandes.<\/p>\n\n\n\n<p>Pour plus d&#039;informations sur la mani\u00e8re de renforcer vos op\u00e9rations avec une infrastructure KYC de pointe, contactez l&#039;un des ComplyCube <a href=\"https:\/\/www.complycube.com\/fr\/contactez\/contacter-le-service-commercial\/\" target=\"_blank\" rel=\"noopener\" title=\"https:\/\/www.complycube.com\/en\/contact\/contact-sales\/\">experts en conformit\u00e9<\/a> aujourd&#039;hui.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-1024x577.jpg\" alt=\"exigences kyc contactez-nous\" class=\"wp-image-22607\" srcset=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-1024x577.jpg 1024w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-300x169.jpg 300w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-768x433.jpg 768w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-1536x866.jpg 1536w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-2048x1154.jpg 2048w, https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/10\/4-3-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>","protected":false},"excerpt":{"rendered":"<p>La criminalit\u00e9 num\u00e9rique est en hausse \u00e0 l&#039;\u00e9chelle mondiale, car les attaques de pr\u00e9sentation utilisant des deepfakes g\u00e9n\u00e9r\u00e9s par l&#039;IA deviennent de plus en plus sophistiqu\u00e9es. \u00c0 l&#039;horizon 2025, d\u00e9couvrez comment les entreprises peuvent renforcer leurs d\u00e9fenses et prot\u00e9ger leurs op\u00e9rations.<\/p>","protected":false},"author":24,"featured_media":22924,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[6],"tags":[53],"class_list":["post-22920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","tag-identity-verification"],"acf":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"What kinds of digital crime should you watch out for in 2025? Learn more about digital threats such as the rise of presentation attacks leveraging deepfakes.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Sofia Daley\"\/>\n\t<meta name=\"google-site-verification\" content=\"9nwsC3BxNQT0rN_dh5xNnCBQI6EVMaGEtvfky-IUUgQ\" \/>\n\t<meta name=\"msvalidate.01\" content=\"6787C3F0846FBE039FCD4064ECED4F6A\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"fr_FR\" \/>\n\t\t<meta property=\"og:site_name\" content=\"ComplyCube | ComplyCube&#039;s API automates Identity Verification (IDV), Know Your Customer (KYC) &amp; Anti-Money Laundering (AML) checks. Get started with our AML\/KYC API today\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Digital Crime to Watch Out For in 2025 | ComplyCube\" \/>\n\t\t<meta property=\"og:description\" content=\"Digital crime is on the rise on a worldwide scale, as presentation attacks using AI-generated deepfakes become increasingly advanced. With 2025 on the horizon, learn how businesses can fortify defences and safeguard operations.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t\t<meta property=\"og:image:height\" content=\"1443\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2024-12-30T16:39:02+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2025-01-06T09:27:48+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ComplyCube\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@ComplyCube\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Digital Crime to Watch Out For in 2025\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Digital crime is on the rise on a worldwide scale, as presentation attacks using AI-generated deepfakes become increasingly advanced. With 2025 on the horizon, learn how businesses can fortify defences and safeguard operations.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@ComplyCube\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#blogposting\",\"name\":\"Digital Crime to Watch Out For in 2025 | ComplyCube\",\"headline\":\"Digital Crime to Watch Out For in 2025\",\"author\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/author\\\/sofia-d\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/header-9.png\",\"width\":2560,\"height\":1443,\"caption\":\"digital crimes such as deepfakes\"},\"datePublished\":\"2024-12-30T16:39:02+00:00\",\"dateModified\":\"2025-01-06T09:27:48+00:00\",\"inLanguage\":\"fr-FR\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#webpage\"},\"articleSection\":\"Guides, Identity Verification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/category\\\/guides\\\/#listItem\",\"name\":\"Guides\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/category\\\/guides\\\/#listItem\",\"position\":2,\"name\":\"Guides\",\"item\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/category\\\/guides\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#listItem\",\"name\":\"Digital Crime to Watch Out For in 2025\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#listItem\",\"position\":3,\"name\":\"Digital Crime to Watch Out For in 2025\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/category\\\/guides\\\/#listItem\",\"name\":\"Guides\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#organization\",\"name\":\"ComplyCube\",\"description\":\"ComplyCube's API automates Identity Verification (IDV), Know Your Customer (KYC) & Anti-Money Laundering (AML) checks. Get started with our AML\\\/KYC API today\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/\",\"telephone\":\"+442032861575\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ComplyCube-Square-125-x-125.png\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#organizationLogo\",\"width\":125,\"height\":125,\"caption\":\"ComplyCube Square Logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ComplyCube\",\"https:\\\/\\\/x.com\\\/ComplyCube\",\"https:\\\/\\\/www.instagram.com\\\/complycube\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@complycube\",\"https:\\\/\\\/linkedin.com\\\/company\\\/ComplyCube\"],\"address\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#postaladdress\",\"@type\":\"PostalAddress\",\"streetAddress\":\"30 Churchill Place, Canary Wharf\",\"postalCode\":\"E14 5RE\",\"addressLocality\":\"London\",\"addressCountry\":\"GB\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/author\\\/sofia-d\\\/#author\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/author\\\/sofia-d\\\/\",\"name\":\"Sofia Daley\",\"description\":\"Sofia Daley is a dynamic Content Marketing Executive at ComplyCube, renowned for her expertise in growth marketing, social media strategy, and compliance-driven content creation. With strong knowledge of AML and KYC compliance, Sofia designs impactful narratives that empower organisations to scale responsibly while fostering trust and ensuring strict regulatory adherence. Her proven track record includes building a TikTok following of over 140K and a Meta audience of 15K, generating $30,000+ in monthly sales through engaging, user-focused content. Sofia\\u2019s ability to integrate AML and KYC frameworks into customer-facing materials ensures businesses not only meet compliance standards but also enhance credibility and customer trust. In addition to her marketing expertise, Sofia is the award-winning author of The Bird Who Could Not Sing, a children\\u2019s book widely praised for its creativity and storytelling. She complements her professional accomplishments with a strong academic foundation, holding a degree in English Literature from UCL and a Professional Certificate in Digital Marketing from Imperial College Business School. At ComplyCube, Sofia combines her growth-oriented mindset, compliance knowledge, and creative storytelling abilities to deliver innovative content solutions that enhance customer experiences and drive sustainable growth.\",\"jobTitle\":\"Content Marketing Executive\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"University College London\",\"sameAs\":\"https:\\\/\\\/www.ucl.ac.uk\"},{\"@type\":\"EducationalOrganization\",\"name\":\"Imperial Business School\",\"sameAs\":\"https:\\\/\\\/www.imperial.ac.uk\\\/business-school\\\/\"}],\"knowsAbout\":[{\"@type\":\"Thing\",\"name\":\"Regulatory compliance\",\"url\":\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Regulatory_compliance\"},{\"@type\":\"Thing\",\"name\":\"Know your customer\",\"url\":\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Know_your_customer\"},{\"@type\":\"Thing\",\"name\":\"Growth hacking\",\"url\":\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Growth_hacking\"},{\"@type\":\"Thing\",\"name\":\"FinTech\",\"url\":\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Fintech\"}],\"knowsLanguage\":[\"English\",\"Spanish\"],\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/1715852152509.jpeg\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#webpage\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/\",\"name\":\"Digital Crime to Watch Out For in 2025 | ComplyCube\",\"description\":\"What kinds of digital crime should you watch out for in 2025? Learn more about digital threats such as the rise of presentation attacks leveraging deepfakes.\",\"inLanguage\":\"fr-FR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/author\\\/sofia-d\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/author\\\/sofia-d\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/header-9.png\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#mainImage\",\"width\":2560,\"height\":1443,\"caption\":\"digital crimes such as deepfakes\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/digital-crime-to-watch-out-for-in-2025\\\/#mainImage\"},\"datePublished\":\"2024-12-30T16:39:02+00:00\",\"dateModified\":\"2025-01-06T09:27:48+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/\",\"name\":\"ComplyCube\",\"description\":\"ComplyCube's API automates Identity Verification (IDV), Know Your Customer (KYC) & Anti-Money Laundering (AML) checks. Get started with our AML\\\/KYC API today\",\"inLanguage\":\"fr-FR\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.complycube.com\\\/fr\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Digital Crime to Watch Out For in 2025 | ComplyCube<\/title>\n\n","aioseo_head_json":{"title":"La cybercriminalit\u00e9 \u00e0 surveiller en 2025 | ComplyCube","description":"\u00c0 quels types de d\u00e9lits num\u00e9riques faut-il faire attention en 2025 ? Apprenez-en plus sur les menaces num\u00e9riques telles que l&#039;augmentation des attaques de pr\u00e9sentation exploitant les deepfakes.","canonical_url":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"google-site-verification":"9nwsC3BxNQT0rN_dh5xNnCBQI6EVMaGEtvfky-IUUgQ","msvalidate.01":"6787C3F0846FBE039FCD4064ECED4F6A","miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#blogposting","name":"Digital Crime to Watch Out For in 2025 | ComplyCube","headline":"Digital Crime to Watch Out For in 2025","author":{"@id":"https:\/\/www.complycube.com\/fr\/author\/sofia-d\/#author"},"publisher":{"@id":"https:\/\/www.complycube.com\/fr\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png","width":2560,"height":1443,"caption":"digital crimes such as deepfakes"},"datePublished":"2024-12-30T16:39:02+00:00","dateModified":"2025-01-06T09:27:48+00:00","inLanguage":"fr-FR","mainEntityOfPage":{"@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#webpage"},"isPartOf":{"@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#webpage"},"articleSection":"Guides, Identity Verification"},{"@type":"BreadcrumbList","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/#listItem","position":1,"name":"Home","item":"https:\/\/www.complycube.com\/fr\/","nextItem":{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/category\/guides\/#listItem","name":"Guides"}},{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/category\/guides\/#listItem","position":2,"name":"Guides","item":"https:\/\/www.complycube.com\/fr\/category\/guides\/","nextItem":{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#listItem","name":"Digital Crime to Watch Out For in 2025"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#listItem","position":3,"name":"Digital Crime to Watch Out For in 2025","previousItem":{"@type":"ListItem","@id":"https:\/\/www.complycube.com\/fr\/category\/guides\/#listItem","name":"Guides"}}]},{"@type":"Organization","@id":"https:\/\/www.complycube.com\/fr\/#organization","name":"ComplyCube","description":"ComplyCube's API automates Identity Verification (IDV), Know Your Customer (KYC) & Anti-Money Laundering (AML) checks. Get started with our AML\/KYC API today","url":"https:\/\/www.complycube.com\/fr\/","telephone":"+442032861575","logo":{"@type":"ImageObject","url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2022\/09\/ComplyCube-Square-125-x-125.png","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#organizationLogo","width":125,"height":125,"caption":"ComplyCube Square Logo"},"image":{"@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/ComplyCube","https:\/\/x.com\/ComplyCube","https:\/\/www.instagram.com\/complycube\/","https:\/\/www.youtube.com\/@complycube","https:\/\/linkedin.com\/company\/ComplyCube"],"address":{"@id":"https:\/\/www.complycube.com\/fr\/#postaladdress","@type":"PostalAddress","streetAddress":"30 Churchill Place, Canary Wharf","postalCode":"E14 5RE","addressLocality":"London","addressCountry":"GB"}},{"@type":"Person","@id":"https:\/\/www.complycube.com\/fr\/author\/sofia-d\/#author","url":"https:\/\/www.complycube.com\/fr\/author\/sofia-d\/","name":"Sofia Daley","description":"Sofia Daley is a dynamic Content Marketing Executive at ComplyCube, renowned for her expertise in growth marketing, social media strategy, and compliance-driven content creation. With strong knowledge of AML and KYC compliance, Sofia designs impactful narratives that empower organisations to scale responsibly while fostering trust and ensuring strict regulatory adherence. Her proven track record includes building a TikTok following of over 140K and a Meta audience of 15K, generating $30,000+ in monthly sales through engaging, user-focused content. Sofia\u2019s ability to integrate AML and KYC frameworks into customer-facing materials ensures businesses not only meet compliance standards but also enhance credibility and customer trust. In addition to her marketing expertise, Sofia is the award-winning author of The Bird Who Could Not Sing, a children\u2019s book widely praised for its creativity and storytelling. She complements her professional accomplishments with a strong academic foundation, holding a degree in English Literature from UCL and a Professional Certificate in Digital Marketing from Imperial College Business School. At ComplyCube, Sofia combines her growth-oriented mindset, compliance knowledge, and creative storytelling abilities to deliver innovative content solutions that enhance customer experiences and drive sustainable growth.","jobTitle":"Content Marketing Executive","alumniOf":[{"@type":"EducationalOrganization","name":"University College London","sameAs":"https:\/\/www.ucl.ac.uk"},{"@type":"EducationalOrganization","name":"Imperial Business School","sameAs":"https:\/\/www.imperial.ac.uk\/business-school\/"}],"knowsAbout":[{"@type":"Thing","name":"Regulatory compliance","url":"https:\/\/en.wikipedia.org\/wiki\/Regulatory_compliance"},{"@type":"Thing","name":"Know your customer","url":"https:\/\/en.wikipedia.org\/wiki\/Know_your_customer"},{"@type":"Thing","name":"Growth hacking","url":"https:\/\/en.wikipedia.org\/wiki\/Growth_hacking"},{"@type":"Thing","name":"FinTech","url":"https:\/\/en.wikipedia.org\/wiki\/Fintech"}],"knowsLanguage":["English","Spanish"],"image":{"@type":"ImageObject","url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/1715852152509.jpeg"}},{"@type":"WebPage","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#webpage","url":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/","name":"Digital Crime to Watch Out For in 2025 | ComplyCube","description":"What kinds of digital crime should you watch out for in 2025? Learn more about digital threats such as the rise of presentation attacks leveraging deepfakes.","inLanguage":"fr-FR","isPartOf":{"@id":"https:\/\/www.complycube.com\/fr\/#website"},"breadcrumb":{"@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#breadcrumblist"},"author":{"@id":"https:\/\/www.complycube.com\/fr\/author\/sofia-d\/#author"},"creator":{"@id":"https:\/\/www.complycube.com\/fr\/author\/sofia-d\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png","@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#mainImage","width":2560,"height":1443,"caption":"digital crimes such as deepfakes"},"primaryImageOfPage":{"@id":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/#mainImage"},"datePublished":"2024-12-30T16:39:02+00:00","dateModified":"2025-01-06T09:27:48+00:00"},{"@type":"WebSite","@id":"https:\/\/www.complycube.com\/fr\/#website","url":"https:\/\/www.complycube.com\/fr\/","name":"ComplyCube","description":"ComplyCube's API automates Identity Verification (IDV), Know Your Customer (KYC) & Anti-Money Laundering (AML) checks. Get started with our AML\/KYC API today","inLanguage":"fr-FR","publisher":{"@id":"https:\/\/www.complycube.com\/fr\/#organization"}}]},"og:locale":"fr_FR","og:site_name":"ComplyCube | ComplyCube's API automates Identity Verification (IDV), Know Your Customer (KYC) &amp; Anti-Money Laundering (AML) checks. Get started with our AML\/KYC API today","og:type":"article","og:title":"Digital Crime to Watch Out For in 2025 | ComplyCube","og:description":"Digital crime is on the rise on a worldwide scale, as presentation attacks using AI-generated deepfakes become increasingly advanced. With 2025 on the horizon, learn how businesses can fortify defences and safeguard operations.","og:url":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/","og:image":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png","og:image:secure_url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png","og:image:width":"2560","og:image:height":"1443","article:published_time":"2024-12-30T16:39:02+00:00","article:modified_time":"2025-01-06T09:27:48+00:00","article:publisher":"https:\/\/www.facebook.com\/ComplyCube","twitter:card":"summary","twitter:site":"@ComplyCube","twitter:title":"Digital Crime to Watch Out For in 2025","twitter:description":"Digital crime is on the rise on a worldwide scale, as presentation attacks using AI-generated deepfakes become increasingly advanced. With 2025 on the horizon, learn how businesses can fortify defences and safeguard operations.","twitter:creator":"@ComplyCube","twitter:image":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png"},"aioseo_meta_data":{"post_id":"22920","title":null,"description":"\u00c0 quels types de d\u00e9lits num\u00e9riques faut-il faire attention en 2025 ? Apprenez-en plus sur les menaces num\u00e9riques telles que l&#039;augmentation des attaques de pr\u00e9sentation exploitant les deepfakes.","keywords":null,"keyphrases":{"focus":{"keyphrase":"digital crime","score":78,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":2},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":9,"maxScore":9,"error":0},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":{"score":9,"maxScore":9,"error":0},"keywordDensity":{"score":0,"type":"low","maxScore":9,"error":1}}},"additional":[{"keyphrase":"presentation attacks","score":80,"analysis":{"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":2},"keyphraseInIntroduction":{"score":9,"maxScore":9,"error":0},"keyphraseInImageAlt":{"score":9,"maxScore":9,"error":0},"keywordDensity":{"score":0,"type":"low","maxScore":9,"error":1}}},{"keyphrase":"deepfakes","score":100,"analysis":{"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":1},"keyphraseInIntroduction":{"score":9,"maxScore":9,"error":0},"keyphraseInImageAlt":{"score":9,"maxScore":9,"error":0},"keywordDensity":{"type":"best","score":9,"maxScore":9,"error":0}}}]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":"#post_excerpt","og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png","og_image_width":"2560","og_image_height":"1443","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"featured","twitter_image_url":"https:\/\/www.complycube.com\/wp-content\/uploads\/2024\/12\/header-9.png","twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":"#post_title","twitter_description":"#post_excerpt","schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-12-23 18:01:19","breadcrumb_settings":null,"limit_modified_date":true,"reviewed_by":"0","open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2024-12-30 15:01:31","updated":"2025-12-23 18:01:19"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.complycube.com\/fr\/\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.complycube.com\/fr\/category\/guides\/\" title=\"Guides\">Guides<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tDigital Crime to Watch Out For in 2025\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.complycube.com\/fr\/"},{"label":"Guides","link":"https:\/\/www.complycube.com\/fr\/category\/guides\/"},{"label":"Digital Crime to Watch Out For in 2025","link":"https:\/\/www.complycube.com\/fr\/digital-crime-to-watch-out-for-in-2025\/"}],"_links":{"self":[{"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/posts\/22920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/comments?post=22920"}],"version-history":[{"count":15,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/posts\/22920\/revisions"}],"predecessor-version":[{"id":30744,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/posts\/22920\/revisions\/30744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/media\/22924"}],"wp:attachment":[{"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/media?parent=22920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/categories?post=22920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.complycube.com\/fr\/wp-json\/wp\/v2\/tags?post=22920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}