{"id":23938,"date":"2024-01-04T15:58:33","date_gmt":"2024-01-04T15:58:33","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=23938"},"modified":"2024-01-25T19:47:17","modified_gmt":"2024-01-25T19:47:17","slug":"a-year-of-increasingly-sophisticated-security-incidents","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/","title":{"rendered":"A Year of Increasingly Sophisticated Security Incidents"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/graciela-martinez\">Graciela Mart\u00ednez<\/a>, Head of LACNIC CSIRT, and <a href=\"https:\/\/blog.lacnic.net\/en\/author\/guillermo-pereyra\">Guillermo Pereyra<\/a>, Security Analyst at LACNIC<\/p>\n\n\n\n<p>Last year, security incidents in the region have become increasingly advanced and sophisticated, exploiting new methods to deceive individuals and organizations. These conclusions can be derived from the reports generated by LACNIC CSIRT to understand the state of the Internet resources under our administration.<\/p>\n\n\n\n<p>Phishing and spam for malicious purposes, whether originating from or directed towards resources in the region, continue to be the most frequently reported incidents at our CSIRT.<\/p>\n\n\n\n<p>Data collected from collaborating organizations and our own sources indicate a clear evolution of <a href=\"https:\/\/csirt.lacnic.net\/en\/statistics\">statistics<\/a> towards these phishing and spam episodes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"904\" height=\"446\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/fig1-incidentes-de-seguridad-2023.png\" alt=\"\" class=\"wp-image-23930\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/fig1-incidentes-de-seguridad-2023.png 904w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/fig1-incidentes-de-seguridad-2023-300x148.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/fig1-incidentes-de-seguridad-2023-768x379.png 768w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/figure>\n\n\n\n<p>Why are attacks becoming more sophisticated? Attackers now gather intelligence and don&#8217;t always go directly for the organization. Their goal is often to exploit the supply chain and they attempt to attack an organization from the periphery, through a supplier, or a client.<\/p>\n\n\n\n<p>For instance, when an attacker successfully breaches a client (who typically has fewer defenses), they obtain valid credentials and use them to access your email accounts. Once the attacker has gained access to a legitimate account, they attempt to deceive the staff of the organization that is the ultimate target of the attack. In this regard, they have advanced toward a more sophisticated form of identity theft, as the malicious link is part of a legitimate email, which makes it more difficult to detect.<\/p>\n\n\n\n<p>Our primary recommendation is to reinforce the policies related to safeguarding information security, considering the risks to which it is exposed, and actively working on raising awareness among employees.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--23938\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/bit.ly\/4aWpEi3\">A Network of Sensors for Threat Detection<\/a><\/div><\/div><\/section>\n\n\n<p><strong>Malware<\/strong>. Reports from third parties regarding malware in their networks have also increased significantly in the region. Botnets are employed as malicious agents to attack the victim.<\/p>\n\n\n\n<p>Last year has also seen an increase in ransomware attacks on smaller organizations. This trend is closely associated with the goal of cybercrime, namely, economic gain.<\/p>\n\n\n\n<p>Cybercriminals now operate within organized structures akin to traditional criminal structures. As cybercrime evolved, it transitioned from attacking individuals to targeting organizations and, more recently, entire networks.<\/p>\n\n\n\n<p>A revealing fact is that, according to international statistics, ransom collection grew from an average of $8,100 to an average of $2.5 million in just a few years. This confirms cybercriminals\u2019 financial motivations for these attacks.<\/p>\n\n\n\n<p><strong>Spear phishing. <\/strong>Advanced cybercriminal techniques have led to targeted phishing attacks, commonly known as <em>spear phishing<\/em>. These are personalized cyberattacks directed at specific individuals or companies. They are typically implemented via spear phishing emails that appear legitimate to the recipient and persuade them to share sensitive data with the attacker.<\/p>\n\n\n\n<p>These attacks are much more successful than standard phishing attacks. By leveraging the information they obtain, attackers can use social engineering techniques to design custom attacks to deceive the target into believing they are receiving legitimate requests and emails. As a result, even the most ambitious targets within an organization, such as senior executives, may open email messages that appear harmless to them and fall victim to these attacks. This type of inadvertent errors allow cybercriminals to steal the data they need to launch an attack on their target network.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/csirt.lacnic.net\/en\/statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Statistics<\/a> on our website detail the mechanisms most commonly used by cybercriminals, as well as servers by RIR and by country.<\/p>\n\n\n\n<p>LACNIC CSIRT publishes a <a href=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-plan_gestion_incidentes_seguridad-en.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Security Incident Management Plan<\/a> to help organizations prepare to handle security incidents. The purpose of this guide is for readers to understand the basic definitions needed for each stage from a management point of view. A proactive approach involves understanding the importance of being prepared and taking the necessary steps to do it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Graciela Mart\u00ednez, Head of LACNIC CSIRT, and Guillermo Pereyra, Security Analyst at LACNIC Last year, security incidents in the region have become increasingly advanced and sophisticated, exploiting new methods to deceive individuals and organizations. These conclusions can be derived from the reports generated by LACNIC CSIRT to understand the state of the Internet resources [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":23934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1242,1245],"tipo_autor":[],"class_list":["post-23938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-graciela-martinez-en","taxonomy-authors-guillermo-pereyra-en"],"acf":{"author":"Graciela Mart\u00ednez, Head of LACNIC CSIRT, and Guillermo Pereyra, Security Analyst at LACNIC","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | A Year of Increasingly Sophisticated Security Incidents<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | A Year of Increasingly Sophisticated Security Incidents\" \/>\n<meta property=\"og:description\" content=\"By Graciela Mart\u00ednez, Head of LACNIC CSIRT, and Guillermo Pereyra, Security Analyst at LACNIC Last year, security incidents in the region have become increasingly advanced and sophisticated, exploiting new methods to deceive individuals and organizations. These conclusions can be derived from the reports generated by LACNIC CSIRT to understand the state of the Internet resources [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-04T15:58:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-25T19:47:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"A Year of Increasingly Sophisticated Security Incidents\",\"datePublished\":\"2024-01-04T15:58:33+00:00\",\"dateModified\":\"2024-01-25T19:47:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\",\"name\":\"LACNIC Blog | A Year of Increasingly Sophisticated Security Incidents\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png\",\"datePublished\":\"2024-01-04T15:58:33+00:00\",\"dateModified\":\"2024-01-25T19:47:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Year of Increasingly Sophisticated Security Incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | A Year of Increasingly Sophisticated Security Incidents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | A Year of Increasingly Sophisticated Security Incidents","og_description":"By Graciela Mart\u00ednez, Head of LACNIC CSIRT, and Guillermo Pereyra, Security Analyst at LACNIC Last year, security incidents in the region have become increasingly advanced and sophisticated, exploiting new methods to deceive individuals and organizations. These conclusions can be derived from the reports generated by LACNIC CSIRT to understand the state of the Internet resources [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-01-04T15:58:33+00:00","article_modified_time":"2024-01-25T19:47:17+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"A Year of Increasingly Sophisticated Security Incidents","datePublished":"2024-01-04T15:58:33+00:00","dateModified":"2024-01-25T19:47:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/","url":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/","name":"LACNIC Blog | A Year of Increasingly Sophisticated Security Incidents","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png","datePublished":"2024-01-04T15:58:33+00:00","dateModified":"2024-01-25T19:47:17+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"A Year of Increasingly Sophisticated Security Incidents"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/01\/csirt-incidentes-seguridad-2023.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":23927,"post_title":"Un a\u00f1o con incidentes de seguridad cada vez m\u00e1s sofisticados","slug":"un-ano-con-incidentes-de-seguridad-cada-vez-mas-sofisticados","href":"https:\/\/blog.lacnic.net\/un-ano-con-incidentes-de-seguridad-cada-vez-mas-sofisticados\/"},{"locale":"pt_BR","id":23948,"post_title":"Um ano com incidentes de seguran\u00e7a cada vez mais sofisticados","slug":"um-ano-com-incidentes-de-seguranca-cada-vez-mais-sofisticados","href":"https:\/\/blog.lacnic.net\/pt-br\/um-ano-com-incidentes-de-seguranca-cada-vez-mais-sofisticados\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/23938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=23938"}],"version-history":[{"count":7,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/23938\/revisions"}],"predecessor-version":[{"id":24364,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/23938\/revisions\/24364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/23934"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=23938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=23938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=23938"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=23938"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=23938"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=23938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}