{"id":7711,"date":"2026-04-10T21:14:30","date_gmt":"2026-04-10T21:14:30","guid":{"rendered":"https:\/\/urudata.com\/?p=7711"},"modified":"2026-04-13T11:57:30","modified_gmt":"2026-04-13T11:57:30","slug":"la-ciber-amenaza-no-viste-canguro-negro","status":"publish","type":"post","link":"https:\/\/urudata.com\/en\/la-ciber-amenaza-no-viste-canguro-negro\/","title":{"rendered":"The cyber threat does not wear a black hoodie"},"content":{"rendered":"<p class=\"\">It is the night of December 16, 2025, at Quinta de Olivos in Buenos Aires. Home of\nPresident Milei, although he is not present in this moment.<br><br>In the middle of the silence, a detonation is heard. The sound originated from one\nof the perimeter security posts, where Gendarmerie officer Rodrigo G\u00f3mez is on\nduty.<br><br>Rodrigo, 21 years old, alone, has just made the worst decision of his life. There is\nno logical explanation, although his farewell letter hints at a personal issue.\nTherefore, the investigation turns to our great life logbook: the mobile phone.<br><br>Rodrigo, like many others, had arrived in the big city to change his life.<br>Shy, very\nintroverted, and eager to meet women, he downloaded a dating app. There he\nmeets July, a very attractive 20yearold woman.<br><br>Rodrigo builds a virtual relationship with July, which gradually evolves. Little by\nlittle, they begin to exchange conversations and images. Increasingly private,\nincreasingly intimate, something common, especially at that age.<br><br>And then the unexpected happens: He receives a call from July. But the person on\nthe other end of the line is not July\u2014it is her mother, who begins screaming\nfrantically: <br>\u201cYou degenerate! Look at the things you\u2019re sending my daughter! She\u2019s 17 years\nold, and you send her that filth! I\u2019m going to the police right now!\u201d<br><br>The situation was an exploding bomb. July was a minor, and he, as an adult, had\nshared intimate material with her.<br>But how could that be? July had assured him she was 20 years old, and that is\nhow she appeared on her dating app profile\u2026 Had she deceived him?<br>Still overwhelmed by the previous call, barely able to process it, the phone rings\nagain almost immediately this time from an unknown number.<\/p>\n\n\n\n<p class=\"\">This time it is a police investigations commissioner, from the \u201cCyber Child Abuse\nUnit\u201d, informing him that the mother\u2019s complaint had just been received and that his\narrest would proceed.<\/p>\n\n\n\n<p class=\"\">\u201cI find your situation very complicated in the case against\nyou.\u201d<br><br>But the officer shows empathy, a light in the darkness, and understanding that\nRodrigo had been deceived tells him there is a way to help. There was an\nalternative to silence the accusations: paying money to the complaining mother.\nThe police officer himself would take care of arranging it.<\/p>\n\n\n\n<p class=\"\">By the time of the incident at Quinta de Olivos, Rodrigo had been paying\nconsecutive demands totaling close to one thousand dollars, and more was being\ndemanded. Impossible to keep up. There was no way out.<br><br>As you might imagine, it was ultimately discovered that the people on the other end\nof the line were neither July, nor her mother, nor the commissioner.<br><br>The perpetrators were a group of criminals led by former police officer Tom\u00e1s\nFrancavilla (who played the role of the supposed commissioner), who at the time\nwas imprisoned for other crimes at the Magdalena prison.From there, with the support of family members (the supposed July and her\nmother), they carried out phone extortions him operating from inside the prison\nitself.<br><br>Rodrigo had been the victim of one of the greatest current cyber threats facing\nyoung people: sextortion.<br>Sextortion is criminal extortion based on the threat of exposing a victim\u2019s intimate\nimages. Internationally, this crime has reached extreme levels of\nsophistication\u2014such as those revealed in Interpol\u2019s Operation Strikeback in 2014,\n\nincluding the case of Daniel Perry and the dismantling of the syndicate led by\nMaria Caparas, known as \u201cThe Queen of Sextortion,\u201d which operated globally from\nthe Philippines.\nNow, that same model was being systematically deployed from the R\u00edo de la Plata.<br>Sextortion schemes generally differ depending on the victim\u2019s gender.<br>In the case of male victims, the process typically consists of four stages:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"\">Bait Construction: The cyber threat creates a fake profile of an attractive\nwoman on a social network, using images stolen from other accounts\n(catfishing) or, increasingly, images generated by artificial intelligence.<\/li>\n\n\n\n<li class=\"\">Fishing: From this fake profile, potential victims are identified and\ncontacted\u2014usually shy men with limited apparent social lives.<\/li>\n\n\n\n<li class=\"\">The Bite: Once the victim accepts the connection request, a virtual\nrelationship begins, carefully avoiding video calls under various pretexts.<\/li>\n\n\n\n<li class=\"\">Reeling in the Catch: Conversations come first. Once trust is established,\nintimate material is exchanged. The supposed woman sends increasingly\nexplicit images (often AIgenerated) and eventually asks the victim to\nreciprocate.<br>de la v\u00edctima.<\/li>\n\n\n\n<li class=\"\">Acquisition of the Target: With intimate images of the victim in hand, the\nextortion begins\u2014threatening to make them public unless payment is made.<br><\/li>\n<\/ol>\n\n\n\n<p class=\"\">The demand for money and its payment becomes an endless cycle, known as pig\nbutchering.<br><br>In the case of women, the strategy changes. Possibly because they tend to be\nmore cautious and less riskoriented, the attack is direct: nude images of the victim\nare generated using artificial intelligence (there are applications specifically\ndesigned for this purpose), and the victim is extorted under the threat of public\nexposure unless she provides real images of herself\u2014triggering an endless spiral\nof violence.<br><br>For kids, the threat usually comes from anonymous sources and has primarily\neconomic motives. For women, the threat most often comes from someone in their\nsocial environment and is primarily intended to cause psychological harm.<br><br>Sextortion, grooming, pig butchering, romance scams different forms of\npersonallevel cyberattacks that present a significant opportunity for those of us\nwho work in cybersecurity. In a digital world where full observability of a cyberattack is almost impossible, these attacks allow us to observe their entire lifecycle.<br>While cyberattacks against individuals may differ in motivation, operational\nmethods, or victim profiles and contrary to the popular imagination of what a\n\u201chacker\u201d looks like the primary strength of the cyber threat lies not in technical\nexpertise, but in psychological manipulation. In many cases, the attackers\u2019\ntechnical knowledge is minimal or even nonexistent.<\/p>\n\n\n\n<p class=\"\">This is something Hollywood has deeply ingrained in our minds: the image of the\ncybercriminal in a black hoodie, introverted, antisocial, operating from a dark\nbasement full of machines. That image no longer reflects reality.<br><br>On the contrary, cyber threats rely fundamentally on psychology as their main tool\nto exploit human vulnerability. Their operations are defined by apparent empathy\ntoward the victim, while being completely dehumanized.<\/p>\n\n\n\n<p class=\"\">Worse still, cybercriminal organizations are often better organized than the\ncompanies we work for. <br><br>Insights gained from studying the internal operations of these groups\u2014most\nnotably through Jon DiMaggio\u2019s symbolic infiltration of LockBit\u2014have revealed\nhighly structured and meticulously organized systems. In some cases, individuals\nwithin these organizations are not even aware that they are participating in criminal\nactivity.<br><br>The extreme segmentation and atomization of tasks public relations, human\nresources, software design, business intelligence, call centers mirror the structure\nof legitimate corporations. Individually, each role appears normal. Only by viewing\nthe full operation from a leadership level does the criminal nature of the\norganization become visible.<br><br>So, wait a second if they\u2019re better organized and ahead of us, is there anything\nwe can do? Or are we lost?<br>Yes. We absolutely can fight back.<br>There is no single solution, neither at the personal nor at the corporate level. There\nis no silver bullet.<br>Just as we protect our physical homes with multiple layers of security not a single\nmeasure alarms, bars, locks, safes, reinforced glass, smoke detectors,\ninsurance the cyber domain works the same way. Cyber defense must be\ndeployed on multiple fronts.<\/p>\n\n\n\n<p class=\"\">And how much does all this cost? A fortune, one might think.\n\nNo. Just like in the physical world, while it is possible to invest heavily in\nsophisticated security products, the most important protective measure a person or\norganization can adopt is surprisingly free.<br>Education in security.<br>Installing alarms without understanding the threats we face is irresponsible.\nAdopting protective measures without understanding the environment can easily\nbecome a waste of resources.<br>Installing alarms without understanding the threats we face is irresponsible.\nAdopting protective measures without understanding the environment can easily\nbecome a waste of resources.<br>Yes, it may sound pessimistic but reread this article. How many things could have\nbeen avoided?<\/p>\n\n\n\n<p class=\"\">Note: All dialogues quoted in this article were transcribed verbatim from audio\nevidence contained in the case file.<\/p>","protected":false},"excerpt":{"rendered":"<p>Es la noche del 16 de diciembre de 2025 en la Quinta de Olivos, Buenos Aires. Hogar del presidente Milei, aunque \u00e9l no se encuentre en este momento. En el medio del silencio suena una detonaci\u00f3n. El ruido se origin\u00f3 desde uno de los puestos de seguridad perimetral, donde se encuentra apostado de guardia el [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":7717,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-7711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"acf":{"bajada":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Urudata &gt; La ciber amenaza no viste canguro negro<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudata.com\/en\/la-ciber-amenaza-no-viste-canguro-negro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urudata &gt; La ciber amenaza no viste canguro negro\" \/>\n<meta property=\"og:description\" content=\"Es la noche del 16 de diciembre de 2025 en la Quinta de Olivos, Buenos Aires. Hogar del presidente Milei, aunque \u00e9l no se encuentre en este momento. En el medio del silencio suena una detonaci\u00f3n. El ruido se origin\u00f3 desde uno de los puestos de seguridad perimetral, donde se encuentra apostado de guardia el [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudata.com\/en\/la-ciber-amenaza-no-viste-canguro-negro\/\" \/>\n<meta property=\"og:site_name\" content=\"Urudata\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/urudatasa\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-10T21:14:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T11:57:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1408\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Claudio L\u00f3pez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudio L\u00f3pez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/\"},\"author\":{\"name\":\"Claudio L\u00f3pez\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/23ca11845398907d7f78447c291bd77f\"},\"headline\":\"La ciber amenaza no viste canguro negro\",\"datePublished\":\"2026-04-10T21:14:30+00:00\",\"dateModified\":\"2026-04-13T11:57:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/\"},\"wordCount\":1716,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/\",\"url\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/\",\"name\":\"Urudata > La ciber amenaza no viste canguro negro\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1\",\"datePublished\":\"2026-04-10T21:14:30+00:00\",\"dateModified\":\"2026-04-13T11:57:30+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/la-ciber-amenaza-no-viste-canguro-negro\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1\",\"width\":1408,\"height\":768},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#website\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"name\":\"Urudata\",\"description\":\"Integramos soluciones innovadoras\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudata.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#organization\",\"name\":\"Urudata\",\"url\":\"https:\\\/\\\/urudata.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudata.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logoUrudata.png?fit=512%2C123&ssl=1\",\"width\":512,\"height\":123,\"caption\":\"Urudata\"},\"image\":{\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/urudatasa\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudata.com\\\/#\\\/schema\\\/person\\\/23ca11845398907d7f78447c291bd77f\",\"name\":\"Claudio L\u00f3pez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g\",\"caption\":\"Claudio L\u00f3pez\"},\"description\":\"Consultor Ciberseguridad\",\"url\":\"https:\\\/\\\/urudata.com\\\/en\\\/author\\\/claudiolopez\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Urudata > La ciber amenaza no viste canguro negro","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudata.com\/en\/la-ciber-amenaza-no-viste-canguro-negro\/","og_locale":"en_US","og_type":"article","og_title":"Urudata > La ciber amenaza no viste canguro negro","og_description":"Es la noche del 16 de diciembre de 2025 en la Quinta de Olivos, Buenos Aires. Hogar del presidente Milei, aunque \u00e9l no se encuentre en este momento. En el medio del silencio suena una detonaci\u00f3n. El ruido se origin\u00f3 desde uno de los puestos de seguridad perimetral, donde se encuentra apostado de guardia el [&hellip;]","og_url":"https:\/\/urudata.com\/en\/la-ciber-amenaza-no-viste-canguro-negro\/","og_site_name":"Urudata","article_publisher":"https:\/\/www.facebook.com\/urudatasa","article_published_time":"2026-04-10T21:14:30+00:00","article_modified_time":"2026-04-13T11:57:30+00:00","og_image":[{"width":1408,"height":768,"url":"https:\/\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg","type":"image\/jpeg"}],"author":"Claudio L\u00f3pez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claudio L\u00f3pez","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/#article","isPartOf":{"@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/"},"author":{"name":"Claudio L\u00f3pez","@id":"https:\/\/urudata.com\/#\/schema\/person\/23ca11845398907d7f78447c291bd77f"},"headline":"La ciber amenaza no viste canguro negro","datePublished":"2026-04-10T21:14:30+00:00","dateModified":"2026-04-13T11:57:30+00:00","mainEntityOfPage":{"@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/"},"wordCount":1716,"commentCount":0,"publisher":{"@id":"https:\/\/urudata.com\/#organization"},"image":{"@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1","articleSection":["Ciberseguridad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/","url":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/","name":"Urudata > La ciber amenaza no viste canguro negro","isPartOf":{"@id":"https:\/\/urudata.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/#primaryimage"},"image":{"@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1","datePublished":"2026-04-10T21:14:30+00:00","dateModified":"2026-04-13T11:57:30+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/la-ciber-amenaza-no-viste-canguro-negro\/#primaryimage","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1","width":1408,"height":768},{"@type":"WebSite","@id":"https:\/\/urudata.com\/#website","url":"https:\/\/urudata.com\/","name":"Urudata","description":"Integramos soluciones innovadoras","publisher":{"@id":"https:\/\/urudata.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudata.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudata.com\/#organization","name":"Urudata","url":"https:\/\/urudata.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2023\/05\/logoUrudata.png?fit=512%2C123&ssl=1","width":512,"height":123,"caption":"Urudata"},"image":{"@id":"https:\/\/urudata.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/urudatasa"]},{"@type":"Person","@id":"https:\/\/urudata.com\/#\/schema\/person\/23ca11845398907d7f78447c291bd77f","name":"Claudio L\u00f3pez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a541ab0ff5e1ad2cbd5191e3b73170efece5b498d3151262839f16ab21554291?s=96&d=simple_local_avatar&r=g","caption":"Claudio L\u00f3pez"},"description":"Cybersecurity Consultant","url":"https:\/\/urudata.com\/en\/author\/claudiolopez\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudata.com\/wp-content\/uploads\/2026\/04\/WhatsApp-Image-2026-04-10-at-10.39.54-AM.jpeg?fit=1408%2C768&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/7711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/comments?post=7711"}],"version-history":[{"count":7,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/7711\/revisions"}],"predecessor-version":[{"id":7722,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/posts\/7711\/revisions\/7722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media\/7717"}],"wp:attachment":[{"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/media?parent=7711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/categories?post=7711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudata.com\/en\/wp-json\/wp\/v2\/tags?post=7711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}