{"id":6120,"date":"2025-05-16T10:40:30","date_gmt":"2025-05-16T10:40:30","guid":{"rendered":"https:\/\/www.urudata.com\/?p=6120"},"modified":"2026-01-08T16:48:04","modified_gmt":"2026-01-08T16:48:04","slug":"ciberataques-la-atribucion-quien-es-el-que-me-ataca","status":"publish","type":"post","link":"https:\/\/urudata.com\/en\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/","title":{"rendered":"Cyberattacks: Attribution \u2013 Who Is Attacking Me?"},"content":{"rendered":"<p>What Types of Cybercriminals Are There?<\/p>\n\n\n\n<p>For a few weeks now, Netflix has been streaming a series called Zero Day, which depicts a massive cyberattack on a country (in this case, the victim is the United States) and how such a conflict is addressed\u2014a highly relevant and probable scenario (needless to say, there are already recorded cases).<\/p>\n\n\n\n<p>In our previous column, we discussed <em>zero-day<\/em>attacks. Now, we will address another phenomenon: \u201cattribution\u201d\u2014the process by which analysts attempt to identify the origin of a cyberattack or, at the very least, determine the type of threat actor<em>(who did it<\/em>).<\/p>\n\n\n\n<p>In the series, shortly after the occurrence of the massive cyberattack, a \u201cState\/Nation Actor\u201d is identified as the likely threat actor.<\/p>\n\n\n\n<p>But what does this mean? Let's try to answer that.<\/p>\n\n\n\n<p>The world of cybercrime is huge\u2014truly vast. Therefore, classifying and grouping it is a necessary and significant task. Why? It is essential because the more accurately it is done, the more tailored and effective my defensive strategy will be. It is also extremely complex due to a factor present in virtual threats that doesn't occur in physical criminality: anonymity.<\/p>\n\n\n\n<p>If someone fires a weapon, I can see it, or at worst, I can reconstruct the scene to identify the perpetrator (CSI-style). However, in cyberspace, the shot isn't visible; only the impact is. And that impact could have originated from countless sources.<\/p>\n\n\n\n<p>The same tools that protect our privacy while browsing the internet are the ones that conceal the trail of a cyber threat.<\/p>\n\n\n\n<p>So, let me warn you: forget about knowing for certain who attacked you.<\/p>\n\n\n\n<p>Their identification, so to speak, is essentially carried out by classifying them based on their intentions or self-attribution (\u201cI did it\u201d), always running the risk of false flag attacks.<\/p>\n\n\n\n<p>On what factors is this possible identification based? On the firepower of the cyber threat? On its origin? On its techniques?<\/p>\n\n\n\n<p>Let's go from the most innocent to the most lethal.<\/p>\n\n\n\n<p><em>Script Kiddie<\/em> refers to the lowest level on the criminal scale (if it can be identified as such). It's about a beginner who tests tools obtained from open sources (accessible to anyone).<\/p>\n\n\n\n<p>These \u201ckids,\u201d after several trials, realize they can gain something from this practice (be it money or simple recognition in the community), and that's when the first evolutionary ring appears: <em>The Lone Wolf<\/em>\u2014individuals operating in cybercrime who already cause some type of limited damage by acting independently.<\/p>\n\n\n\n<p>&nbsp;These Lone Wolves, identified in the underworld by their aliases (\u201caka\u201d), begin to showcase their credentials (medals) in <em>dark web<\/em> forums and, like anyone seeking a job, await their opportunity to enter the <em>Champions League<\/em> of Cybercrime: joining already organized groups, the big leagues.<\/p>\n\n\n\n<p>Now: What is the intention of this Lone Wolf?<\/p>\n\n\n\n<p>Is it solely to uphold an idea and\/or cause some reputational damage, without personal gain? Well, then we can classify them as <em>hacktivists<\/em>. But this is the minority...<\/p>\n\n\n\n<p>Surely, these wolves seek the greatest treasure: economic gain. In this case, these actors are sheltered in Cybercriminal Syndicates: entities with criminal purposes, extremely organized, like any company we know (or even better than these). The only differences we might find with a normal work environment are that here, the \u201cemployees\u201d most likely don't know each other, and their contact with the organization is limited to a \u201csupervisor\u201d who manages the link between the criminal and the cybercriminal syndicate.<\/p>\n\n\n\n<p>It's also known that, replicating what happens in classic criminal organizations (from the physical world, like cartels or mafias), criminal actors, while aware they might be participating in illicit activity (at best), are unaware of the true identity of the organization they belong to. The less you know, the better.<\/p>\n\n\n\n<p>Now, let's pause here.<\/p>\n\n\n\n<p>For some time now, these cybercriminal organizations have found a strategic advantage in a current scenario where armed conflicts abound: they can operate from these nations, attacking their enemies. Thus, in an implicitly agreed contract between the nation and the organization, they become an armed arm of the state, killing two birds with one stone: achieving the primary goal of generating financial gains from cybercriminal activity while simultaneously obtaining the state's protection from which they operate (acting as <em>cyber-mercenaries<\/em>)<\/p>\n\n\n\n<p>And here lies the greatest threat to nations: State\/Nation Actors\u2014cybercriminal organizations that, regardless of their purpose (be it financial or other), act aligned with geopolitical interests.<\/p>\n\n\n\n<p>Today, State\/Nation Actors are the most feared scourge in cyberspace, and their techniques vary in nature.<\/p>\n\n\n\n<p>The most notable of these are pure cybercriminality (financial or hacktivist) or the Advanced Persistent Threat (APT). <em>hackivista<\/em>) o la Amenaza Persistente Avanzada (APT).<\/p>\n\n\n\n<p>Just as cybercriminal syndicates seek quick action (strike quickly with immediate results), APTs seek the opposite: to remain in the shadows for an extended period, implementing advanced techniques of stealth and persistence, staying in the affected system for a long time without being detected, with the sole objective of listening and stealing information.<\/p>\n\n\n\n<p>And that's it. If you've made it this far and understood everything, you can now consider yourself a cyber threat intelligence analyst. Now, all that's left is to see a news story about a data breach in government agencies, turn around, and shout confidently to the four winds: \u201cOhhh, this is most likely the work of an APT.\u201d  You're welcome.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 tipos de cibercriminales existen? Desde hace ya unas semanas que en la plataforma Netflix se est\u00e1 viendo una serie denominada \u201cD\u00eda Cero\u201d que trata del ciberataque masivo a un pa\u00eds (en este caso la v\u00edctima es Estados Unidos), y de c\u00f3mo se responde ante este tipo de conflicto, tan actual y de probable ocurrencia [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":6121,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-6120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":{"bajada":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Urudata &gt; Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudata.com\/en\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urudata &gt; Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?\" \/>\n<meta property=\"og:description\" content=\"\u00bfQu\u00e9 tipos de cibercriminales existen? Desde hace ya unas semanas que en la plataforma Netflix se est\u00e1 viendo una serie denominada \u201cD\u00eda Cero\u201d que trata del ciberataque masivo a un pa\u00eds (en este caso la v\u00edctima es Estados Unidos), y de c\u00f3mo se responde ante este tipo de conflicto, tan actual y de probable ocurrencia [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudata.com\/en\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/\" \/>\n<meta property=\"og:site_name\" content=\"Urudata\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/urudatasa\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-16T10:40:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-08T16:48:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"562\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Claudio L\u00f3pez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudio L\u00f3pez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/\"},\"author\":{\"name\":\"Claudio L\u00f3pez\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/23ca11845398907d7f78447c291bd77f\"},\"headline\":\"Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?\",\"datePublished\":\"2025-05-16T10:40:30+00:00\",\"dateModified\":\"2026-01-08T16:48:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/\"},\"wordCount\":1074,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Imagen1.jpg?fit=562%2C440&ssl=1\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/\",\"url\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/\",\"name\":\"Urudata > Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Imagen1.jpg?fit=562%2C440&ssl=1\",\"datePublished\":\"2025-05-16T10:40:30+00:00\",\"dateModified\":\"2026-01-08T16:48:04+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Imagen1.jpg?fit=562%2C440&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Imagen1.jpg?fit=562%2C440&ssl=1\",\"width\":562,\"height\":440},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"name\":\"Urudata\",\"description\":\"Integramos soluciones innovadoras\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudata.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\",\"name\":\"Urudata\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"width\":512,\"height\":123,\"caption\":\"Urudata\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/urudatasa\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/23ca11845398907d7f78447c291bd77f\",\"name\":\"Claudio L\u00f3pez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g\",\"caption\":\"Claudio L\u00f3pez\"},\"description\":\"Consultor Ciberseguridad\",\"url\":\"https:\\\/\\\/urudata.com\\\/en\\\/author\\\/claudiolopez\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Urudata > Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudata.com\/en\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/","og_locale":"en_US","og_type":"article","og_title":"Urudata > Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?","og_description":"\u00bfQu\u00e9 tipos de cibercriminales existen? Desde hace ya unas semanas que en la plataforma Netflix se est\u00e1 viendo una serie denominada \u201cD\u00eda Cero\u201d que trata del ciberataque masivo a un pa\u00eds (en este caso la v\u00edctima es Estados Unidos), y de c\u00f3mo se responde ante este tipo de conflicto, tan actual y de probable ocurrencia [&hellip;]","og_url":"https:\/\/urudata.com\/en\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/","og_site_name":"Urudata","article_publisher":"https:\/\/www.facebook.com\/urudatasa","article_published_time":"2025-05-16T10:40:30+00:00","article_modified_time":"2026-01-08T16:48:04+00:00","og_image":[{"width":562,"height":440,"url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1","type":"image\/jpeg"}],"author":"Claudio L\u00f3pez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claudio L\u00f3pez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/#article","isPartOf":{"@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/"},"author":{"name":"Claudio L\u00f3pez","@id":"https:\/\/urudata.com\/#\/schema\/person\/23ca11845398907d7f78447c291bd77f"},"headline":"Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?","datePublished":"2025-05-16T10:40:30+00:00","dateModified":"2026-01-08T16:48:04+00:00","mainEntityOfPage":{"@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/"},"wordCount":1074,"commentCount":0,"publisher":{"@id":"https:\/\/urudata.com\/#organization"},"image":{"@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/","url":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/","name":"Urudata > Ciberataques: La Atribuci\u00f3n \u00bfQui\u00e9n es el que me ataca?","isPartOf":{"@id":"https:\/\/urudata.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/#primaryimage"},"image":{"@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1","datePublished":"2025-05-16T10:40:30+00:00","dateModified":"2026-01-08T16:48:04+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/ciberataques-la-atribucion-quien-es-el-que-me-ataca\/#primaryimage","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1","width":562,"height":440},{"@type":"WebSite","@id":"https:\/\/urudata.com\/#website","url":"https:\/\/urudata.com\/","name":"Urudata","description":"Integramos soluciones innovadoras","publisher":{"@id":"https:\/\/urudata.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudata.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudata.com\/#organization","name":"Urudata","url":"https:\/\/urudata.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","width":512,"height":123,"caption":"Urudata"},"image":{"@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/urudatasa"]},{"@type":"Person","@id":"https:\/\/urudata.com\/#\/schema\/person\/23ca11845398907d7f78447c291bd77f","name":"Claudio L\u00f3pez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g","caption":"Claudio L\u00f3pez"},"description":"Cybersecurity Consultant","url":"https:\/\/urudata.com\/en\/author\/claudiolopez\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2025\/05\/Imagen1.jpg?fit=562%2C440&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/comments?post=6120"}],"version-history":[{"count":1,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6120\/revisions"}],"predecessor-version":[{"id":6122,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/6120\/revisions\/6122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media\/6121"}],"wp:attachment":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media?parent=6120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/categories?post=6120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/tags?post=6120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}