{"id":4737,"date":"2016-05-03T13:45:24","date_gmt":"2016-05-03T16:45:24","guid":{"rendered":"https:\/\/ostec.blog\/seguridad-perimetral\/ransomware-como-se-proteger"},"modified":"2020-10-02T14:43:31","modified_gmt":"2020-10-02T17:43:31","slug":"ransomware-como-se-proteger","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/","title":{"rendered":"Ransomware: Entienda qu\u00e9 es"},"content":{"rendered":"<p>[vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb angled_section=\u00bbno\u00bb text_align=\u00bbleft\u00bb background_image_as_pattern=\u00bbwithout_pattern\u00bb css_animation=\u00bb\u00bb css=\u00bb.vc_custom_1508845521395{padding-top: 25px !important;padding-bottom: 25px !important;}\u00bb][vc_column][vc_column_text]Una variante de malware viene quitando el sue\u00f1o a diversos administradores de red en los \u00faltimos a\u00f1os; profesionales de seguridad y due\u00f1os de empresas con poca experiencia en tecnolog\u00eda. Se trata de una amenaza no tan nueva en el escenario mundial, pero que en los \u00faltimos 2 a\u00f1os ha venido a varias empresas de Latinoamerica.<\/p>\n<p>El <strong>ransomware<\/strong> es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos. Esto se debe a que la naturaleza de esta amenaza encripta archivos y carpetas en los sistemas operativos de los usuarios, impidiendo el acceso a ellos, mientras que el rescate solicitado no se paga.<\/p>\n<p>De esta forma, a trav\u00e9s de una estrategia de uso de encriptaci\u00f3n bastante fuerte, los datos que se utilizan por ciertas aplicaciones, como una base de datos, un archivo de configuraci\u00f3n, o incluso archivos comunes como documentos, hojas de c\u00e1lculo y etc, se cifran y se impiden de ser le\u00eddos.<\/p>\n<p>Para liberar los datos, los atacantes exigen el pago de ciertos montos, generalmente pagados en moneda virtual bitcoin, cuya rastreabilidad es altamente compleja, protegiendo el anonimato as\u00ed como alentando a personas mal intencionadas a realizar, o incluso contratar, el ataque como servicio (RaaS &#8211; <strong>Ransomware<\/strong> as a Service) en Deepweb.<\/p>\n<p>En las ocurrencias de secuestro de base de datos (<strong>Ransomware<\/strong>), no se recomienda la efectividad del pago solicitado por el atacante, ya que no hay ninguna garant\u00eda que de hecho los datos ser\u00e1n liberados. La mejor manera es crear un conjunto b\u00e1sico de medidas que minimicen, no s\u00f3lo el ataque, pero especialmente su reflejo dentro de las organizaciones.<\/p>\n<p>Creamos un e-book com <a href=\"http:\/\/conteudo.ostec.com.br\/ransomware-como-evitar\"><strong>5 consejos fundamentales para evitar la ocurrencia de este tipo de siniestro en las organizaciones<\/strong><\/a>. En este e-book usted va a conocer un poco m\u00e1s sobre <strong>Ransomware<\/strong> y tambi\u00e9n verificar c\u00f3mo su empresa puede construir una estructura para minimizar la posibilidad de ocurrencia de este tipo de ataque.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb angled_section=\u00bbno\u00bb text_align=\u00bbleft\u00bb background_image_as_pattern=\u00bbwithout_pattern\u00bb css_animation=\u00bb\u00bb css=\u00bb.vc_custom_1508846307282{padding-top: 25px !important;padding-bottom: 25px !important;}\u00bb][vc_column][vc_row_inner row_type=\u00bbrow\u00bb type=\u00bbfull_width\u00bb text_align=\u00bbleft\u00bb css_animation=\u00bb\u00bb][vc_column_inner width=\u00bb1\/3&#8243;][masonry_blog order_by=\u00bbdate\u00bb order=\u00bbASC\u00bb title_tag=\u00bbh3&#8243; number_of_posts=\u00bb1&#8243; category=\u00bbperdida-informacion\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][masonry_blog order_by=\u00bbdate\u00bb order=\u00bbASC\u00bb title_tag=\u00bbh3&#8243; number_of_posts=\u00bb1&#8243; category=\u00bbreconocimiento-problema\u00bb][\/vc_column_inner][vc_column_inner width=\u00bb1\/3&#8243;][masonry_blog order_by=\u00bbdate\u00bb order=\u00bbASC\u00bb title_tag=\u00bbh3&#8243; number_of_posts=\u00bb1&#8243; category=\u00bbconsideracion-de-solucion\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row row_type=\u00bbrow\u00bb use_row_as_full_screen_section=\u00bbno\u00bb type=\u00bbfull_width\u00bb angled_section=\u00bbno\u00bb text_align=\u00bbleft\u00bb background_image_as_pattern=\u00bbwithout_pattern\u00bb css_animation=\u00bb\u00bb css=\u00bb.vc_custom_1508845521395{padding-top: 25px !important;padding-bottom: 25px !important;}\u00bb][vc_column][vc_column_text]Una variante de malware viene quitando el sue\u00f1o a diversos administradores de red en los \u00faltimos a\u00f1os; profesionales de seguridad y due\u00f1os de empresas con poca experiencia en tecnolog\u00eda. Se trata de una amenaza no tan nueva en el escenario mundial, pero que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12847,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[395],"tags":[],"class_list":["post-4737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-perimetral"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware: Entienda qu\u00e9 es - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"description\" content=\"El ransomware es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Entienda qu\u00e9 es - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"El ransomware es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-03T16:45:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T17:43:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"Ransomware: Entienda qu\u00e9 es\",\"datePublished\":\"2016-05-03T16:45:24+00:00\",\"dateModified\":\"2020-10-02T17:43:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\"},\"wordCount\":521,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"articleSection\":[\"Seguridad perimetral\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\",\"url\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\",\"name\":\"Ransomware: Entienda qu\u00e9 es - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"datePublished\":\"2016-05-03T16:45:24+00:00\",\"dateModified\":\"2020-10-02T17:43:31+00:00\",\"description\":\"El ransomware es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos.\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg\",\"width\":928,\"height\":534,\"caption\":\"Caveira feita com palaras utilizadas em linguagem de programa\u00e7\u00e3o. A caveira representa um ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Entienda qu\u00e9 es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/es\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Entienda qu\u00e9 es - OSTEC | Seguran\u00e7a digital de resultados","description":"El ransomware es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/","og_locale":"es_ES","og_type":"article","og_title":"Ransomware: Entienda qu\u00e9 es - OSTEC | Seguran\u00e7a digital de resultados","og_description":"El ransomware es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos.","og_url":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2016-05-03T16:45:24+00:00","article_modified_time":"2020-10-02T17:43:31+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"Ransomware: Entienda qu\u00e9 es","datePublished":"2016-05-03T16:45:24+00:00","dateModified":"2020-10-02T17:43:31+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/"},"wordCount":521,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","articleSection":["Seguridad perimetral"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/","url":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/","name":"Ransomware: Entienda qu\u00e9 es - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","datePublished":"2016-05-03T16:45:24+00:00","dateModified":"2020-10-02T17:43:31+00:00","description":"El ransomware es un tipo de malware que tiene como finalidad el secuestro de datos objetivando la solicitud de rescate para liberaci\u00f3n de los mismos.","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/05\/Caveira-digital.jpg","width":928,"height":534,"caption":"Caveira feita com palaras utilizadas em linguagem de programa\u00e7\u00e3o. A caveira representa um ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/ransomware-como-se-proteger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Entienda qu\u00e9 es"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/es\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/4737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=4737"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/4737\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/12847"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=4737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=4737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=4737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}