{"id":20434,"date":"2024-07-01T09:09:28","date_gmt":"2024-07-01T12:09:28","guid":{"rendered":"https:\/\/ostec.blog\/?p=20434"},"modified":"2024-07-01T09:09:28","modified_gmt":"2024-07-01T12:09:28","slug":"cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/","title":{"rendered":"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware"},"content":{"rendered":"<p>La reciente identificaci\u00f3n de CVE-2024-4577 ha puesto de manifiesto la existencia de importantes vulnerabilidades en PHP que afectan a los servidores Windows. Esta vulnerabilidad se ha convertido r\u00e1pidamente en el centro de atenci\u00f3n de los expertos en ciberseguridad y de los ciberdelincuentes, resaltando la urgencia de adoptar medidas de mitigaci\u00f3n y correcci\u00f3n inmediatas. <\/p>\n<p>La CVE-2024-4577 es una vulnerabilidad que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de inyecci\u00f3n de argumentos PHP-CGI. La CVE tiene una puntuaci\u00f3n de <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/cve-y-cvss-para-la-clasificacion-de-vulnerabilidades-de-seguridad-digital\/\">CVSS <\/a>de 9.8, y est\u00e1 clasificada como \u201cCr\u00edtica\u201d\u200b. <\/p>\n<h2>Mecanismos t\u00e9cnicos de la vulnerabilidad<\/h2>\n<p>La vulnerabilidad tiene su origen en una validaci\u00f3n de entrada inadecuada dentro del CGI (Common Gateway Interface) de PHP. La causa principal de este comportamiento es que la implementaci\u00f3n de PHP no tiene en cuenta un comportamiento de \u00abemparejamiento\u00bb que Windows realiza para convertir caracteres de formato Unicode a lo m\u00e1s parecido posible a caracteres ANSI.  <\/p>\n<p>Debido a este comportamiento, cuando un atacante env\u00eda peticiones HTTP especialmente manipuladas, \u00e9stas pueden ser malinterpretadas y suministradas al m\u00f3dulo PHP-CGI, que acaba entendiendo estos caracteres como opciones PHP y ejecutando un binario o comando espec\u00edfico, lo que permite explotar la vulnerabilidad. <\/p>\n<h2>Explotaci\u00f3n por grupos de Ransomware<\/h2>\n<p>Pocos d\u00edas despu\u00e9s de la divulgaci\u00f3n p\u00fablica de CVE-2024-4577, grupos de ransomware, principalmente el grupo TellYouThePass, comenzaron a explotar esta vulnerabilidad para lanzar ataques. Estos ataques suelen consistir en insertar cargas \u00fatiles maliciosas en servidores vulnerables, lo que provoca la instalaci\u00f3n de web shells y el posterior despliegue de <a href=\"https:\/\/ostec.blog\/es\/generico\/ransomwares-crecen-en-ritmo-alarmante\/\">ransomware<\/a>. La r\u00e1pida explotaci\u00f3n de esta vulnerabilidad pone de manifiesto la agilidad y disposici\u00f3n de los ciberdelincuentes para sacar partido de los fallos reci\u00e9n descubiertos. <\/p>\n<h2>Medidas inmediatas y de mitigaci\u00f3n<\/h2>\n<p>Debido a la alta gravedad de CVE-2024-4577, es importante actuar de inmediato. PHP ha publicado parches para solucionar esta vulnerabilidad en las versiones 8.1.29, 8.2.20 y 8.3.8. Se recomienda que los administradores y desarrolladores actualicen sus instalaciones de PHP a estas versiones para reducir el riesgo de explotaci\u00f3n. Adem\u00e1s, la implantaci\u00f3n de firewalls de aplicaciones web (WAF) y sistemas de detecci\u00f3n de intrusos (IDS) puede proporcionar una capa adicional de defensa contra posibles ataques. <\/p>\n<h2>Otras implicaciones<\/h2>\n<p>El incidente CVE-2024-4577 sirve para recordar la continua evoluci\u00f3n de las amenazas a la ciberseguridad. La r\u00e1pida explotaci\u00f3n por parte de grupos de ransomware demuestra la necesidad de medidas de seguridad proactivas, actualizaciones oportunas y estrategias globales de gesti\u00f3n de vulnerabilidades.  <\/p>\n<p>A medida que las ciberamenazas se vuelven cada vez m\u00e1s sofisticadas, mantener posturas de seguridad s\u00f3lidas y estar informado sobre las \u00faltimas vulnerabilidades y parches es clave para que las organizaciones protejan sus activos digitales. <\/p>\n<p>Para obtener informaci\u00f3n detallada y descargar parches, consulte <a href=\"https:\/\/www.php.net\/ChangeLog-8.php\">changelogs oficiales del PHP<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>La reciente identificaci\u00f3n de CVE-2024-4577 ha puesto de manifiesto la existencia de importantes vulnerabilidades en PHP que afectan a los servidores Windows. Esta vulnerabilidad se ha convertido r\u00e1pidamente en el centro de atenci\u00f3n de los expertos en ciberseguridad y de los ciberdelincuentes, resaltando la urgencia de adoptar medidas de mitigaci\u00f3n y correcci\u00f3n inmediatas. La CVE-2024-4577 [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":20431,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[1778],"class_list":["post-20434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","tag-cve-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"La reciente identificaci\u00f3n de CVE-2024-4577 ha puesto de manifiesto la existencia de importantes vulnerabilidades en PHP que afectan a los servidores Windows. Esta vulnerabilidad se ha convertido r\u00e1pidamente en el centro de atenci\u00f3n de los expertos en ciberseguridad y de los ciberdelincuentes, resaltando la urgencia de adoptar medidas de mitigaci\u00f3n y correcci\u00f3n inmediatas. La CVE-2024-4577 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-01T12:09:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware\",\"datePublished\":\"2024-07-01T12:09:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\"},\"wordCount\":490,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg\",\"keywords\":[\"cve\"],\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\",\"name\":\"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg\",\"datePublished\":\"2024-07-01T12:09:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg\",\"width\":928,\"height\":534,\"caption\":\"CVE-2024-4577 - imagem de sistema hackeado\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/","og_locale":"es_ES","og_type":"article","og_title":"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware - OSTEC | Seguran\u00e7a digital de resultados","og_description":"La reciente identificaci\u00f3n de CVE-2024-4577 ha puesto de manifiesto la existencia de importantes vulnerabilidades en PHP que afectan a los servidores Windows. Esta vulnerabilidad se ha convertido r\u00e1pidamente en el centro de atenci\u00f3n de los expertos en ciberseguridad y de los ciberdelincuentes, resaltando la urgencia de adoptar medidas de mitigaci\u00f3n y correcci\u00f3n inmediatas. La CVE-2024-4577 [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2024-07-01T12:09:28+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware","datePublished":"2024-07-01T12:09:28+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/"},"wordCount":490,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg","keywords":["cve"],"articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/","url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/","name":"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg","datePublished":"2024-07-01T12:09:28+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/06\/CVE-2024-4577.jpg","width":928,"height":534,"caption":"CVE-2024-4577 - imagem de sistema hackeado"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-4577-vulnerabilidad-critica-en-php-utilizada-en-ataques-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-4577: vulnerabilidad cr\u00edtica en PHP, utilizada en ataques Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=20434"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20434\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/20431"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=20434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=20434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=20434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}