{"id":30105,"date":"2025-06-23T15:21:29","date_gmt":"2025-06-23T15:21:29","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=30105"},"modified":"2025-07-16T16:49:22","modified_gmt":"2025-07-16T16:49:22","slug":"cybersecurity-in-latin-america","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/","title":{"rendered":"Facing Today\u2019s Cybersecurity Threats in Latin America and the Caribbean"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/graciela-martinez\/\">Graciela Mart\u00ednez<\/a>, Head of LACNIC CSIRT<\/p>\n\n\n\n<p>Cybersecurity, defined as the collective effort to secure cyberspace and prevent cyber threats, is now more complex than ever. Protecting our systems, data, and infrastructure is no longer optional; it is an absolute necessity.<\/p>\n\n\n\n<p style=\"\n    padding: 0;\n\"><\/p><p style=\"\n    padding: 0;\n\"><\/p><p style=\"\n    padding: 0;\n\"><\/p><p style=\"\n    padding: 0;\n\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Six Key Challenges to Achieving Effective Cyber Protection<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>Several factors are making it increasingly difficult to ensure strong and effective cybersecurity. Among the most significant are:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Lack of Skilled Personnel. <\/strong>Many organizations still lack teams with the expertise and technical skills required to properly manage cyber risks and respond to incidents.<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Emerging Technologies. <\/strong>The rise of artificial intelligence and other emerging tools is creating new opportunities\u2014not only for innovation, but also for more advanced and targeted cyberattacks.<\/li>\n\n\n\n<li><strong>Complex and Inconsistent Regulations. <\/strong>While regulations play a key role in managing risks, keeping up with diverse and evolving legal frameworks is no easy task. Inconsistent regulations across jurisdictions make it difficult to manage security incidents efficiently.<\/li>\n\n\n\n<li><strong>Supply Chain Interdependence. <\/strong>An increasing number of digital products rely on components from multiple third-party providers. A single vulnerability in one of them can compromise the entire system. This is a major concern for organizations, as these are external factors beyond their direct control.<\/li>\n\n\n\n<li><strong>More Sophisticated Cybercrime. <\/strong>Cyberattacks are becoming increasingly complex, often enhanced by the use of artificial intelligence. They range from advanced financial fraud and identity theft to the exfiltration of sensitive data. Security teams face an ongoing challenge in detecting and analyzing these evolving threats, as they must constantly adapt to shifting patterns and increasingly evasive techniques.<\/li>\n\n\n\n<li><strong>Geopolitical Tensions. <\/strong>International relations also influence cybersecurity: they hinder cooperation, impose technological restrictions, and shift national priorities\u2014factors that directly affect cybersecurity strategies.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>The Rising Cost of Cybercrime <\/strong><strong><\/strong><\/h2>\n\n\n\n<p>In the last five years, <strong>the global financial impact of cybercrime has tripled.<\/strong> Yet many organizations remain underprepared in the face of escalating cyber threats. In Latin America and the Caribbean, <strong>only 2 out of 10 organizations<\/strong> consider themselves truly prepared to respond effectively to a cyberattack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Most Common Cyber Threats <\/strong><strong><\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025-1024x576.png\" alt=\"\" class=\"wp-image-30098\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025-1024x576.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025-300x169.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025-587x330.png 587w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025-768x432.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025-1536x864.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/fig1-ciberseguridad-amenazas-2025.png 1692w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Cyber threats target both on-premises and cloud infrastructure alike\u2014no environment is exempt from risk. According to Statista and incident data from LACNIC\u2019s CSIRT, the most frequently reported threats this year include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing (involved in 74% of reported cases)<\/strong><br>Phishing is a social engineering technique used by attackers to deceive users into sharing sensitive information\u2014such as login credentials, credit card details, or banking data. These messages often arrive via email, messaging apps, or social networks, and are crafted to appear as if they come from trusted sources, like banks, online platforms, or even personal contacts. The aim is to persuade the recipient to click on a malicious link or download a file that compromises the security of their device.<\/li>\n\n\n\n<li><strong>Credential Theft<\/strong><br>This occurs when attackers gain unauthorized access to usernames and passwords. Stolen credentials may be used to breach personal or corporate accounts and are often sold on underground markets. They are commonly obtained through phishing, keyloggers, poorly secured databases, or the reuse of weak passwords across different services.<\/li>\n\n\n\n<li><strong>Ransomware<\/strong><br>Ransomware is malicious software that, once installed, encrypts a user\u2019s or an organization\u2019s files, making them inaccessible. Attackers then demand a ransom\u2014usually in cryptocurrency\u2014in exchange for the decryption key. This type of malware spreads through infected attachments, malicious links, or unpatched vulnerabilities. It can have serious consequences, particularly for organizations that rely on constant access to their data and systems.<\/li>\n\n\n\n<li><strong>Info Stealers<\/strong><br><a href=\"https:\/\/blog.lacnic.net\/en\/most-common-infostealers-in-our-region\/\"><strong>As covered in a previous blog post<\/strong><\/a>, info stealers are a type of malware that infiltrate systems to steal passwords, tokens, and other credentials\u2014then self-destruct, leaving minimal traces behind. These stolen credentials are often sold on illicit markets and later used to carry out fraud schemes, increasingly supported by artificial intelligence.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>What Can We Do to Strengthen Cybersecurity?<\/strong><strong><\/strong><\/h2>\n\n\n\n<p>Cybersecurity is no longer the sole responsibility of IT departments. Today, it requires a <a href=\"https:\/\/campus.lacnic.net\/en\/courses\/\">comprehensive approach<\/a>\u2014one that combines ongoing training, proper risk mapping, sustained investment, organizational awareness, and international cooperation.<\/p>\n\n\n\n<p>Building digital resilience requires a focus on prevention, well-prepared incident response teams, and the ability to keep pace with a constantly evolving threat landscape.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Graciela Mart\u00ednez, Head of LACNIC CSIRT Cybersecurity, defined as the collective effort to secure cyberspace and prevent cyber threats, is now more complex than ever. Protecting our systems, data, and infrastructure is no longer optional; it is an absolute necessity. Six Key Challenges to Achieving Effective Cyber Protection Several factors are making it increasingly [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":30102,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1242],"tipo_autor":[],"class_list":["post-30105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-graciela-martinez-en"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in Latin America: Key Threats and Responses<\/title>\n<meta name=\"description\" content=\"Learn about the main cybersecurity threats in Latin America and how organizations can prepare to address them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in Latin America: Key Threats and Responses\" \/>\n<meta property=\"og:description\" content=\"Learn about the main cybersecurity threats in Latin America and how organizations can prepare to address them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-23T15:21:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T16:49:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Facing Today\u2019s Cybersecurity Threats in Latin America and the Caribbean\",\"datePublished\":\"2025-06-23T15:21:29+00:00\",\"dateModified\":\"2025-07-16T16:49:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\"},\"wordCount\":696,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\",\"name\":\"Cybersecurity in Latin America: Key Threats and Responses\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png\",\"datePublished\":\"2025-06-23T15:21:29+00:00\",\"dateModified\":\"2025-07-16T16:49:22+00:00\",\"description\":\"Learn about the main cybersecurity threats in Latin America and how organizations can prepare to address them.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Facing Today\u2019s Cybersecurity Threats in Latin America and the Caribbean\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in Latin America: Key Threats and Responses","description":"Learn about the main cybersecurity threats in Latin America and how organizations can prepare to address them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in Latin America: Key Threats and Responses","og_description":"Learn about the main cybersecurity threats in Latin America and how organizations can prepare to address them.","og_url":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-06-23T15:21:29+00:00","article_modified_time":"2025-07-16T16:49:22+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Facing Today\u2019s Cybersecurity Threats in Latin America and the Caribbean","datePublished":"2025-06-23T15:21:29+00:00","dateModified":"2025-07-16T16:49:22+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/"},"wordCount":696,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/","url":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/","name":"Cybersecurity in Latin America: Key Threats and Responses","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png","datePublished":"2025-06-23T15:21:29+00:00","dateModified":"2025-07-16T16:49:22+00:00","description":"Learn about the main cybersecurity threats in Latin America and how organizations can prepare to address them.","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/cybersecurity-in-latin-america\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Facing Today\u2019s Cybersecurity Threats in Latin America and the Caribbean"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/06\/ciberseguridad-amenazas-2025.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":30095,"post_title":"Estado actual de la ciberseguridad: principales amenazas y c\u00f3mo enfrentarlas en LAC","slug":"ciberseguridad-en-america-latina","href":"https:\/\/blog.lacnic.net\/ciberseguridad-en-america-latina\/"},{"locale":"pt_BR","id":30109,"post_title":"Estado atual da ciberseguran\u00e7a: principais amea\u00e7as e como enfrent\u00e1-las na Am\u00e9rica Latina e Caribe","slug":"ciberseguranca-ameacas","href":"https:\/\/blog.lacnic.net\/pt-br\/ciberseguranca-ameacas\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/30105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=30105"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/30105\/revisions"}],"predecessor-version":[{"id":30305,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/30105\/revisions\/30305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/30102"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=30105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=30105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=30105"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=30105"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=30105"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=30105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}