{"id":19468,"date":"2022-10-20T09:51:57","date_gmt":"2022-10-20T12:51:57","guid":{"rendered":"https:\/\/ostec.blog\/?p=19468"},"modified":"2022-10-20T09:51:57","modified_gmt":"2022-10-20T12:51:57","slug":"la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/","title":{"rendered":"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores"},"content":{"rendered":"<p>Google Project Zero observ\u00f3 un total de 18 vulnerabilidades de d\u00eda cero explotadas en la primera mitad de 2022, de las cuales al menos la mitad existe porque los errores anteriores no se abordaron adecuadamente.<\/p>\n<p>Seg\u00fan Maddie Stone, investigadora de Google Project Zero, <a href=\"https:\/\/googleprojectzero.blogspot.com\/2022\/06\/2022-0-day-in-wild-exploitationso-far.html\">9de los d\u00edas cero vistos hasta ahora <\/a> (este a\u00f1o) podr\u00edan haberse evitado si las organizaciones hubieran aplicado parches m\u00e1s completos.<\/p>\n<p>El m\u00e1s reciente de estos problemas es la vulnerabilidad de Follina en la plataforma Windows. Rastreada como <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-30190\">CVE-2022-30190<\/a>, es una variante de una vulnerabilidad de d\u00eda cero de MSHTML, rastreada como <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-40444\">CVE-2021-40444<\/a>.<br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-21882\">CVE-2022-21882<\/a> es otra vulnerabilidad de Windows, rastreada como <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-1732\">CVE-2021-1732<\/a>, que es una variante de d\u00eda cero explotada en la naturaleza que se abord\u00f3 incorrectamente el a\u00f1o pasado.<\/p>\n<p>Un error de iOS IOMobileFrameBuffer, rastreado como <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22587\">CVE-2022-22587<\/a>, y una falla del motor Chrome v8, rastreada como <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-1096\">CVE-2022-1096<\/a>, son otras variantes de fallas de seguridad sin explotaci\u00f3n de dos d\u00edas que se encontraron en 2021. Respectivamente: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30983\">CVE-2021-30983<\/a> y <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30551\">CVE-2021-30551<\/a>.<\/p>\n<p>Otros d\u00edas cero de 2022 que son variantes de defectos de seguridad mal manejados son <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-1364\">CVE-2022-1364<\/a>  <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-22620\">CVE-2022-22620<\/a> (WebKit), <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-39793\">CVE-2021-39793<\/a> (Google Pixel), <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-26134\">CVE-2022-26134<\/a> (Atlassian Confluence) y <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-26925\">CVE-2022-26925<\/a> (error de Windows llamado PetitPotam).<\/p>\n<p>Seg\u00fan Stone:<\/p>\n<blockquote><p> \u201cEn el caso de los errores de Windows win32 (CVE-2022-21882) y el interceptor de acceso a la propiedad de Chromium (CVE-2022-1096), el flujo de ejecuci\u00f3n al que condujo la explotaci\u00f3n de la prueba de concepto se ha solucionado, pero la causa ra\u00edz del problema no se resolvi\u00f3: los atacantes pudieron regresar y desencadenar la vulnerabilidad original a trav\u00e9s de un camino diferente\u201d. <\/p><\/blockquote>\n<p>Los problemas con WebKit y PetitPotam surgieron porque, si bien se corrigieron las vulnerabilidades originales, se revirtieron en alg\u00fan momento, lo que permiti\u00f3 a los atacantes explotar los mismos errores nuevamente.<\/p>\n<p>Las recomendaciones para garantizar que las vulnerabilidades se parcheen de manera correcta y completa incluyen analizar su causa ra\u00edz y c\u00f3mo se introdujeron, analizar vulnerabilidades similares al problema de seguridad en cuesti\u00f3n y analizar las t\u00e9cnicas de explotaci\u00f3n empleadas y el parche.<\/p>\n<p>Compartir estos an\u00e1lisis de forma transparente tambi\u00e9n ayuda a la industria en su conjunto. Esto permite a los desarrolladores y profesionales de la seguridad comprender mejor lo que los atacantes ya saben sobre estos errores. Lo que se espera es conducir a mejores soluciones y seguridad en general.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Project Zero observ\u00f3 un total de 18 vulnerabilidades de d\u00eda cero explotadas en la primera mitad de 2022, de las cuales al menos la mitad existe porque los errores anteriores no se abordaron adecuadamente. Seg\u00fan Maddie Stone, investigadora de Google Project Zero, 9de los d\u00edas cero vistos hasta ahora (este a\u00f1o) podr\u00edan haberse evitado [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":18908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019,1025],"tags":[],"class_list":["post-19468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","category-noticias-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Google Project Zero observ\u00f3 un total de 18 vulnerabilidades de d\u00eda cero explotadas en la primera mitad de 2022, de las cuales al menos la mitad existe porque los errores anteriores no se abordaron adecuadamente. Seg\u00fan Maddie Stone, investigadora de Google Project Zero, 9de los d\u00edas cero vistos hasta ahora (este a\u00f1o) podr\u00edan haberse evitado [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T12:51:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores\",\"datePublished\":\"2022-10-20T12:51:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\"},\"wordCount\":429,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg\",\"articleSection\":[\"Gen\u00e9rico\",\"Not\u00edcias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\",\"name\":\"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg\",\"datePublished\":\"2022-10-20T12:51:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg\",\"width\":928,\"height\":534,\"caption\":\"metade vulnerabilidades e bugs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/","og_locale":"es_ES","og_type":"article","og_title":"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Google Project Zero observ\u00f3 un total de 18 vulnerabilidades de d\u00eda cero explotadas en la primera mitad de 2022, de las cuales al menos la mitad existe porque los errores anteriores no se abordaron adecuadamente. Seg\u00fan Maddie Stone, investigadora de Google Project Zero, 9de los d\u00edas cero vistos hasta ahora (este a\u00f1o) podr\u00edan haberse evitado [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2022-10-20T12:51:57+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores","datePublished":"2022-10-20T12:51:57+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/"},"wordCount":429,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg","articleSection":["Gen\u00e9rico","Not\u00edcias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/","url":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/","name":"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg","datePublished":"2022-10-20T12:51:57+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/07\/metade-vulnerabilidades.jpg","width":928,"height":534,"caption":"metade vulnerabilidades e bugs"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/la-mitad-de-las-vulnerabilidades-de-dia-cero-del-2022-son-variantes-de-fallas-anteriores\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"La mitad de las vulnerabilidades de d\u00eda cero del 2022 son variantes de fallas anteriores"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/19468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=19468"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/19468\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/18908"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=19468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=19468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=19468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}