{"id":2576,"date":"2024-05-16T18:36:13","date_gmt":"2024-05-16T18:36:13","guid":{"rendered":"http:\/\/emq.qck.mybluehost.me\/website_42b9569b\/?p=2576"},"modified":"2024-05-28T19:23:27","modified_gmt":"2024-05-28T19:23:27","slug":"hello-world-2-2-2-2","status":"publish","type":"post","link":"https:\/\/urudataciberseguridad.com\/en\/hello-world-2-2-2-2\/","title":{"rendered":"Cybercrime: Never Step Back, Never Surrender"},"content":{"rendered":"<p class=\"\">\u201cThe bad guys are getting very good, and they\u2019re improving...\u201d said the FBI cybercrime director in November 2023. Cybercrime has evolved and at a faster rate than the organizations tasked with stopping it. The reasons are many.\nCybercrime offers several advantages to offenders:\n<br>\nThe ability to commit crimes without being physically exposed\n<br>\nThe possibility of remaining (almost) completely anonymous\n<br>\nThe increasing digitalization of assets\u2014especially financial ones\n<br>\nGlobal legal gaps that make prosecution difficult<\/p>\n\n\n\n<p class=\"\">Cybercrime began in the 1980s, driven by curiosity and the desire to have fun. Entering the new millennium, these actors shifted their goals toward something more tangible: money.\nBy 2010, following the model of organized crime in the physical world, cybercriminals began forming international criminal syndicates. The stereotypical hooded hacker if they ever truly existed gave way to business-style professionals operating in large organizations whose business model focused on illegally obtaining financial assets.<\/p>\n\n\n\n<p class=\"\">A smaller group maintained the spirit of early hackers, motivated by ideology, giving rise to hacktivism movements such as Anonymous and Snowden.<\/p>\n\n\n\n<p class=\"\">In the 2020s, cybercrime evolved again. Motivated not only by the global pandemic which forced most transactions into the digital realm but also by the escalation of armed conflicts around the world, cybercriminals aligned themselves with different geopolitical interests.<\/p>\n\n\n\n<p class=\"\">Armed conflicts provide the perfect environment for criminal activity. The same applies in cyberspace. For the first time, financially motivated actors and ideological actors found common ground under a new operational structure: State-aligned cyber groups such as Killnet, CONTI, and Lockbit.<\/p>\n\n\n\n<p class=\"\">Era solo darle un peque\u00f1o giro al modelo de negocio: ya no busco aleatoriamente a m\u00ed v\u00edctima, sino que lo hago alineado a determinados intereses geopol\u00edticos. \u00bfQu\u00e9 ganaron con esta postura? Mucho, ya que los nuevos \u201caliados\u201d no van a perseguirlos (\u201cel enemigo de mi enemigo es mi amigo\u201d) y las v\u00edctimas ven el ciberataque como una acci\u00f3n deliberada guiada por estos intereses. \u00bfEstamos ante ataques de falsa bandera? Probablemente. Negocio redondo para la ciberdelincuencia.<\/p>\n\n\n\n<p class=\"\">The business model shifted slightly:\nThey no longer select random victims they attacked in alignment with geopolitical objectives.\n<br>\nWhat did they gain?\n<br>\nA lot. Their new \u201callies\u201d would not pursue them (\u201cthe enemy of my enemy is my friend\u201d) and victims interpreted attacks as politically directed, not purely criminal. Some may even be false-flag operations.\n<br>\nA perfect business model for cybercriminals.\nIs there a light at the end of the tunnel?\nUnfortunately, no not today. Hope does not match reality.<\/p>\n\n\n\n<p class=\"\">What can Uruguayan companies do in this environment?\nWe do have one advantage: time. If we can slow attackers down, they are likely to move on to easier victims.\nFor that reason, it is appropriate to quote the movie title:\n\u201cNever retreat, never surrender.\u201d<\/p>","protected":false},"excerpt":{"rendered":"<p>\u201cLos malos est\u00e1n haci\u00e9ndose muy buenos, y est\u00e1n mejorando&#8230;\u201d esto formulaba el director de cibercrimen del FBI el pasado noviembre de 2023. La ciberdelincuencia ha evolucionado y lo ha hecho a un nivel mayor que las fuerzas que deben combatirlo. \u00bfLa causa? Varias.<\/p>","protected":false},"author":1,"featured_media":3230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s - Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urudataciberseguridad.com\/en\/hello-world-2-2-2-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s - Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"\u201cLos malos est\u00e1n haci\u00e9ndose muy buenos, y est\u00e1n mejorando...\u201d esto formulaba el director de cibercrimen del FBI el pasado noviembre de 2023. La ciberdelincuencia ha evolucionado y lo ha hecho a un nivel mayor que las fuerzas que deben combatirlo. \u00bfLa causa? Varias.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urudataciberseguridad.com\/en\/hello-world-2-2-2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Ciberseguridad\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T18:36:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T19:23:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1132\" \/>\n\t<meta property=\"og:image:height\" content=\"722\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"lprado\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"lprado\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/\"},\"author\":{\"name\":\"lprado\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/person\\\/bb31f009c03518a4be2e245158973a59\"},\"headline\":\"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s\",\"datePublished\":\"2024-05-16T18:36:13+00:00\",\"dateModified\":\"2024-05-28T19:23:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/\"},\"wordCount\":539,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/\",\"name\":\"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s - Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1\",\"datePublished\":\"2024-05-16T18:36:13+00:00\",\"dateModified\":\"2024-05-28T19:23:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1\",\"width\":1132,\"height\":722},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/hello-world-2-2-2-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#website\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"name\":\"Ciberseguridad\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urudataciberseguridad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#organization\",\"name\":\"Ciberseguridad\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"contentUrl\":\"https:\\\/\\\/urudataciberseguridad.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logoUrudata.svg\",\"width\":185,\"height\":27,\"caption\":\"Ciberseguridad\"},\"image\":{\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/urudataciberseguridad.com\\\/#\\\/schema\\\/person\\\/bb31f009c03518a4be2e245158973a59\",\"name\":\"lprado\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g\",\"caption\":\"lprado\"},\"url\":\"https:\\\/\\\/urudataciberseguridad.com\\\/en\\\/author\\\/lprado\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s - Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urudataciberseguridad.com\/en\/hello-world-2-2-2-2\/","og_locale":"en_US","og_type":"article","og_title":"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s - Ciberseguridad","og_description":"\u201cLos malos est\u00e1n haci\u00e9ndose muy buenos, y est\u00e1n mejorando...\u201d esto formulaba el director de cibercrimen del FBI el pasado noviembre de 2023. La ciberdelincuencia ha evolucionado y lo ha hecho a un nivel mayor que las fuerzas que deben combatirlo. \u00bfLa causa? Varias.","og_url":"https:\/\/urudataciberseguridad.com\/en\/hello-world-2-2-2-2\/","og_site_name":"Ciberseguridad","article_published_time":"2024-05-16T18:36:13+00:00","article_modified_time":"2024-05-28T19:23:27+00:00","og_image":[{"width":1132,"height":722,"url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png","type":"image\/png"}],"author":"lprado","twitter_card":"summary_large_image","twitter_misc":{"Written by":"lprado","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#article","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/"},"author":{"name":"lprado","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/person\/bb31f009c03518a4be2e245158973a59"},"headline":"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s","datePublished":"2024-05-16T18:36:13+00:00","dateModified":"2024-05-28T19:23:27+00:00","mainEntityOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/"},"wordCount":539,"commentCount":0,"publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1","articleSection":["Ciberseguridad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/","url":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/","name":"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s - Ciberseguridad","isPartOf":{"@id":"https:\/\/urudataciberseguridad.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#primaryimage"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1","datePublished":"2024-05-16T18:36:13+00:00","dateModified":"2024-05-28T19:23:27+00:00","breadcrumb":{"@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#primaryimage","url":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1","contentUrl":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1","width":1132,"height":722},{"@type":"BreadcrumbList","@id":"https:\/\/urudataciberseguridad.com\/hello-world-2-2-2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/urudataciberseguridad.com\/"},{"@type":"ListItem","position":2,"name":"Ciberdelincuencia: retroceder nunca, rendirse jam\u00e1s"}]},{"@type":"WebSite","@id":"https:\/\/urudataciberseguridad.com\/#website","url":"https:\/\/urudataciberseguridad.com\/","name":"Ciberseguridad","description":"","publisher":{"@id":"https:\/\/urudataciberseguridad.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urudataciberseguridad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/urudataciberseguridad.com\/#organization","name":"Ciberseguridad","url":"https:\/\/urudataciberseguridad.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/","url":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","contentUrl":"https:\/\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/04\/logoUrudata.svg","width":185,"height":27,"caption":"Ciberseguridad"},"image":{"@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/urudataciberseguridad.com\/#\/schema\/person\/bb31f009c03518a4be2e245158973a59","name":"lprado","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c71bd09dbede032076c07f9321c15b589ff77c8a0d10e87cf60b1be9be0dec18?s=96&d=mm&r=g","caption":"lprado"},"url":"https:\/\/urudataciberseguridad.com\/en\/author\/lprado\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/urudataciberseguridad.com\/wp-content\/uploads\/2024\/05\/Captura-de-pantalla-2024-05-28-142637.png?fit=1132%2C722&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/2576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/comments?post=2576"}],"version-history":[{"count":5,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/2576\/revisions"}],"predecessor-version":[{"id":3255,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/posts\/2576\/revisions\/3255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media\/3230"}],"wp:attachment":[{"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/media?parent=2576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/categories?post=2576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/urudataciberseguridad.com\/en\/wp-json\/wp\/v2\/tags?post=2576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}