{"id":1081,"date":"2024-05-07T19:26:11","date_gmt":"2024-05-07T19:26:11","guid":{"rendered":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/?p=1081"},"modified":"2024-05-28T19:06:28","modified_gmt":"2024-05-28T19:06:28","slug":"hello-world-2","status":"publish","type":"post","link":"https:\/\/urudataciberseguridad.com\/en\/hello-world-2\/","title":{"rendered":"Paradise Under Siege"},"content":{"rendered":"<p class=\"\">It is early Sunday morning at Costa Rica\u2019s Ministry of Finance. The on-duty IT staff are likely to carry out equipment inventory tasks. In just over two weeks, the current president, Carlos Alvarado, will hand over power to his successor, Rodrigo Chaves, which will likely trigger changes in the leadership of the institution.<\/p>\n\n\n\n<p class=\"\">Once the shift ends just a few minutes away the on-duty staff will be able to go home and enjoy an Easter Sunday with their families.<\/p>\n\n\n\n<p class=\"\">They are unaware that something is unfolding behind the scenes.<\/p>\n\n\n\n<p class=\"\">At a certain moment, one of the operators notices that the files he had been working on for days can no longer be opened.<\/p>\n\n\n\n<p class=\"\">He restarts the machine. Same result or worse: the system now appears to be speaking another language, and nothing responds.<\/p>\n\n\n\n<p class=\"\">He calls a colleague on a higher floor and explains the situation. To his shock, the colleague is experiencing the same issue. It can\u2019t be a coincidence. What is going on? Unless\u2026 this is not an error, but the result of something much larger.<\/p>\n\n\n\n<p class=\"\">On Sunday, April 17, 2022, the cybercrime syndicate CONTI launched a massive cyberattack against Costa Rica\u2019s government digital infrastructure, spreading ransomware across the state for weeks, encrypting all information and systems.<\/p>\n\n\n\n<p class=\"\">Its first victim was the Ministry of Finance, causing immediate paralysis of critical government functions, including payroll for public employees and tax processing.<\/p>\n\n\n\n<p class=\"\">The entire nation was affected. The motive? Unknown.<\/p>\n\n\n\n<p class=\"\">After ransomware attacks, the only file immediately accessible is the ransom note.<\/p>\n\n\n\n<p class=\"\">It contains instructions describing the attack, the identity of the attackers, and payment procedures for those wishing to recover their encrypted data.<\/p>\n\n\n\n<p class=\"\">The ransom demand: 10 million dollars.<\/p>\n\n\n\n<p class=\"\">President Alvarado refused to pay.<\/p>\n\n\n\n<p class=\"\">CONTI\u2019s response was swift. One after another, various government entities were struck: Ministry of Science and Technology, National Meteorological Institute, Radiographic Institute, Ministry of Labor, Social Development Fund, Social Security Administration, and other government agencies\u2026 like falling dominoes.<\/p>\n\n\n\n<p class=\"\">The objective was clear: create a nationwide digital blackout.<\/p>\n\n\n\n<p class=\"\">\u201cHello, we are CONTI, and you can find us inside your networks,\u201d was the message displayed on the government\u2019s own hacked website.<\/p>\n\n\n\n<p class=\"\">But why? What motivated the largest criminal syndicate at the time to attack a nation with no international conflicts?&nbsp;<\/p>\n\n\n\n<p class=\"\">Whatever the motive, it likely wasn\u2019t just economic there are wealthier nations, involved in far larger geopolitical tension, that would be much more attractive targets. There had to be something else.<\/p>\n\n\n\n<p class=\"\">Recovery efforts continued.<\/p>\n\n\n\n<p class=\"\">But worse was yet to come the apex predator was waiting.<\/p>\n\n\n\n<p class=\"\">In the cybercrime world, there is a sort of criminal code. Victims can be of any type except certain protected categories such as hospitals, public schools, nonprofit organizations, NGOs, etc.<\/p>\n\n\n\n<p class=\"\">If attackers discover they are affecting an organization in these categories, the attack is supposed to stop immediately.<\/p>\n\n\n\n<p class=\"\">Is this true? One could debate its accuracy. But there is at least one organization that does not follow this ethical code. The Attila of cyberspace, nothing survives where it passes.<\/p>\n\n\n\n<p class=\"\">That group is Hive. And Hive, to everyone\u2019s horror, entered the scene and conducted massive attacks on Costa Rica\u2019s healthcare system, disabling national medical history systems, drug delivery systems, and more.<\/p>\n\n\n\n<p class=\"\">A coordinated attack by multiple cybercrime syndicates on a shared national target, seeking widespread social chaos without an obvious motive, something never seen before. A cyber event unimaginable in the physical world (criminals working hand-in-hand).<\/p>\n\n\n\n<p class=\"\">Rodrigo Chaves took office and made a shocking public declaration: \u201cWe are at war.\u201d<\/p>\n\n\n\n<p class=\"\">Yes, at war against an anonymous, multinational adversary with possible presence inside the country. At war without a single bullet being fired.<\/p>\n\n\n\n<p class=\"\">Days passed and, slowly but steadily, thanks to support from nations, international agencies, and private companies, systems were restored.<\/p>\n\n\n\n<p class=\"\">Uncertainty remained: Why would multiple cybercrime syndicates coordinate such a massive attack on Costa Rica a small, stable, neutral nation that advocates peace in global affairs, much like Uruguay?<\/p>\n\n\n\n<p class=\"\">What was the motive?<\/p>\n\n\n\n<p class=\"\">Finally, the answer arrived. On CONTI\u2019s own website, the group published:\n\u201cThe attack on Costa Rica is only a rehearsal for a global attack on an entire nation.\u201d<\/p>\n\n\n\n<p class=\"\">It was nothing personal. Costa Rica was simply the result of a roll of the dice a test of how coordinated cyberattacks could digitally shut down a country.<\/p>\n\n\n\n<p class=\"\">What lessons does this attack leave for our nation? Many.\nFirst: You do not need to be on the front lines of geopolitical conflict to become the victim of a massive attack with devastating consequences.\nSecond, and equally important: For a disaster of this scale, no organization, whether a company, institution, or country can recover alone. Collaboration between peers, public and private, nationally and especially internationally, is essential to overcome events like those experienced in the Central American paradise.<\/p>","protected":false},"excerpt":{"rendered":"<p>It is early Sunday morning at Costa Rica\u2019s Ministry of Finance. The on-duty IT staff are likely to carry out equipment inventory tasks. In just over two weeks, the current president, Carlos Alvarado, will hand over power to his successor, Rodrigo Chaves, which will likely trigger changes in the leadership of the institution.<\/p>","protected":false},"author":1,"featured_media":3243,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1081","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>El Para\u00edso bajo asedio - Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudataciberseguridad.com\/en\/hello-world-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El Para\u00edso bajo asedio - Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Domingo de madrugada en el Ministerio de Hacienda de Costa Rica. El personal de guardia de inform\u00e1tica se encuentra seguramente efectuando los inventarios de equipamiento. Es que en poco m\u00e1s de dos semanas el actual presidente del pa\u00eds, Carlos Alvarado, entregar\u00e1 la presidencia a su sucesor Rodrigo Chaves y esto posiblemente generar\u00e1 cambios en las autoridades del organismo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudataciberseguridad.com\/en\/hello-world-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Ciberseguridad\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-07T19:26:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T19:06:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"827\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"lprado\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"lprado\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/\"},\"author\":{\"name\":\"lprado\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/person\\\/bb31f009c03518a4be2e245158973a59\"},\"headline\":\"El Para\u00edso bajo asedio\",\"datePublished\":\"2024-05-07T19:26:11+00:00\",\"dateModified\":\"2024-05-28T19:06:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/\"},\"wordCount\":1090,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/4.jpg?fit=1140%2C827&ssl=1\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/\",\"name\":\"El Para\u00edso bajo asedio - Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/4.jpg?fit=1140%2C827&ssl=1\",\"datePublished\":\"2024-05-07T19:26:11+00:00\",\"dateModified\":\"2024-05-28T19:06:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/4.jpg?fit=1140%2C827&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/4.jpg?fit=1140%2C827&ssl=1\",\"width\":1140,\"height\":827,\"caption\":\"El Para\u00edso bajo asedio\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"El Para\u00edso bajo asedio\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"name\":\"Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudataciberseguridad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\",\"name\":\"Ciberseguridad\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"contentUrl\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"width\":185,\"height\":27,\"caption\":\"Ciberseguridad\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/person\\\/bb31f009c03518a4be2e245158973a59\",\"name\":\"lprado\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"caption\":\"lprado\"},\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/en\\\/author\\\/lprado\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El Para\u00edso bajo asedio - Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudataciberseguridad.com\/en\/hello-world-2\/","og_locale":"en_US","og_type":"article","og_title":"El Para\u00edso bajo asedio - Ciberseguridad","og_description":"Domingo de madrugada en el Ministerio de Hacienda de Costa Rica. El personal de guardia de inform\u00e1tica se encuentra seguramente efectuando los inventarios de equipamiento. Es que en poco m\u00e1s de dos semanas el actual presidente del pa\u00eds, Carlos Alvarado, entregar\u00e1 la presidencia a su sucesor Rodrigo Chaves y esto posiblemente generar\u00e1 cambios en las autoridades del organismo.","og_url":"https:\/\/urudataciberseguridad.com\/en\/hello-world-2\/","og_site_name":"Ciberseguridad","article_published_time":"2024-05-07T19:26:11+00:00","article_modified_time":"2024-05-28T19:06:28+00:00","og_image":[{"width":1140,"height":827,"url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg","type":"image\/jpeg"}],"author":"lprado","twitter_card":"summary_large_image","twitter_misc":{"Written by":"lprado","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#article","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/"},"author":{"name":"lprado","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/person\/bb31f009c03518a4be2e245158973a59"},"headline":"El Para\u00edso bajo asedio","datePublished":"2024-05-07T19:26:11+00:00","dateModified":"2024-05-28T19:06:28+00:00","mainEntityOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/"},"wordCount":1090,"commentCount":0,"publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg?fit=1140%2C827&ssl=1","articleSection":["Ciberseguridad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/urudataciberseguridad.com\/hello-world-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/","url":"https:\/\/urudataciberseguridad.com\/hello-world-2\/","name":"El Para\u00edso bajo asedio - Ciberseguridad","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#primaryimage"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg?fit=1140%2C827&ssl=1","datePublished":"2024-05-07T19:26:11+00:00","dateModified":"2024-05-28T19:06:28+00:00","breadcrumb":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudataciberseguridad.com\/hello-world-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#primaryimage","url":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg?fit=1140%2C827&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg?fit=1140%2C827&ssl=1","width":1140,"height":827,"caption":"El Para\u00edso bajo asedio"},{"@type":"BreadcrumbList","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/urudataciberseguridad.com\/"},{"@type":"ListItem","position":2,"name":"El Para\u00edso bajo asedio"}]},{"@type":"WebSite","@id":"https:\/\/urudataciberseguridad.com\/#website","url":"https:\/\/urudataciberseguridad.com\/","name":"Ciberseguridad","description":"","publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudataciberseguridad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudataciberseguridad.com\/#organization","name":"Ciberseguridad","url":"https:\/\/urudataciberseguridad.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/","url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","contentUrl":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","width":185,"height":27,"caption":"Ciberseguridad"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/person\/bb31f009c03518a4be2e245158973a59","name":"lprado","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","caption":"lprado"},"url":"https:\/\/urudataciberseguridad.com\/en\/author\/lprado\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/4.jpg?fit=1140%2C827&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/1081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/comments?post=1081"}],"version-history":[{"count":5,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/1081\/revisions"}],"predecessor-version":[{"id":3246,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/1081\/revisions\/3246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media\/3243"}],"wp:attachment":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media?parent=1081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/categories?post=1081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/tags?post=1081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}