{"id":6168,"date":"2016-12-22T16:47:04","date_gmt":"2016-12-22T16:47:04","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/2016dicen\/most-notable-threats"},"modified":"2023-07-28T18:34:58","modified_gmt":"2023-07-28T18:34:58","slug":"most-notable-threats","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/","title":{"rendered":"Most Notable Threats"},"content":{"rendered":"<p>According to LACNIC WARP, LACNIC&#8217;s computer security incident Warning, Advice and Reporting Point, Phishing, Ransomware and Denial-of-service Attacks by Botnets topped the list of computer threats detected this year in Latin America and the Caribbean.<br \/>\nLACNIC WARP records show that most reported attacks originated in resources corresponding to other regions, mainly North America followed by Europe.<br \/>\nGraciela Mart\u00ednez, Head of LACNIC WARP, noted that the number of reported attacks continues to grow. \u201cWe live in an interconnected world where more and more devices are connected; this means that attacks will continue to occur,\u201d said Mart\u00ednez.<br \/>\nThe security expert warned that more tools are available to attackers, the result of which is that attacks are becoming increasingly sophisticated.<br \/>\nThis year nobody was spared from attacks, as all kinds of organizations were targeted. According to Mart\u00ednez, \u201cWe used to think that only organizations that moved money online \u2014such as banks\u2014 would be targeted; now it is important to keep in mind that information is a very valuable asset and can also be the target of cybercrime.\u201d<br \/>\nImproving Security. LACNIC has worked hard to support various organizations across the region by training cybersecurity experts. LACNIC WARP has been promoting the creation of cybersecurity incident response teams in its sevice region.<br \/>\n\u201cSpecifically, this year we visited five countries: Dominican Republic, Ecuador, Bolivia, Uruguay and Belize. In the latter we offered training in English for the first time. A total of approximately 150 experts and professionals received training at these workshops,\u201d said the Head of LACNIC WARP.<br \/>\nThese training activities were very rewarding, as they helped raise awareness about the need to deal with security incident management in a dedicated way and also allowed creating closer ties to the local communities in the countries where the workshops took place.<br \/>\n\u201cThe success of each workshop motivates us to continue improving their content,\u201d Mart\u00ednez.<br \/>\nAgreement with FIRST. As part of the activities aimed at strenthening its strategy for improving cybersecurity, LACNIC signed an agreement with the Global Forum for Incident Response and Security Teams (FIRST). This alliance formalizes the activities LACNIC and FIRST have been carrying out jointly for some time and also creates an opportunity for bringing the members of our region closer to this global community. \u201cWe will be offering training and cooperating in the creation of response teams across the region,\u201d added Mart\u00ednez.<br \/>\nThe Head of LACNIC WARP observed that organizations can no longer \u201clook the other way\u201d when it comes security issues and that everyone is responsible for taking care of the Internet so \u201cit remains stable, open and secure.\u201d In this sense, she concluded by stressing that \u201ccreating response teams is not enough; it is also important to continue training cybersecurity experts.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to LACNIC WARP, LACNIC&#8217;s computer security incident Warning, Advice and Reporting Point, Phishing, Ransomware and Denial-of-service Attacks by Botnets topped the list of computer threats detected this year in Latin America and the Caribbean. LACNIC WARP records show that most reported attacks originated in resources corresponding to other regions, mainly North America followed by [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":13686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,471],"archivo":[787,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-6168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-warp-en","archivo-december-2016-edition","archivo-editions"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Most Notable Threats<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Most Notable Threats\" \/>\n<meta property=\"og:description\" content=\"According to LACNIC WARP, LACNIC&#8217;s computer security incident Warning, Advice and Reporting Point, Phishing, Ransomware and Denial-of-service Attacks by Botnets topped the list of computer threats detected this year in Latin America and the Caribbean. LACNIC WARP records show that most reported attacks originated in resources corresponding to other regions, mainly North America followed by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-22T16:47:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-28T18:34:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Most Notable Threats\",\"datePublished\":\"2016-12-22T16:47:04+00:00\",\"dateModified\":\"2023-07-28T18:34:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\"},\"wordCount\":457,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png\",\"keywords\":[\"Cibersecurity\",\"WARP\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\",\"name\":\"LACNIC Blog | Most Notable Threats\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png\",\"datePublished\":\"2016-12-22T16:47:04+00:00\",\"dateModified\":\"2023-07-28T18:34:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Most Notable Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Most Notable Threats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Most Notable Threats","og_description":"According to LACNIC WARP, LACNIC&#8217;s computer security incident Warning, Advice and Reporting Point, Phishing, Ransomware and Denial-of-service Attacks by Botnets topped the list of computer threats detected this year in Latin America and the Caribbean. LACNIC WARP records show that most reported attacks originated in resources corresponding to other regions, mainly North America followed by [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2016-12-22T16:47:04+00:00","article_modified_time":"2023-07-28T18:34:58+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Most Notable Threats","datePublished":"2016-12-22T16:47:04+00:00","dateModified":"2023-07-28T18:34:58+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/"},"wordCount":457,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png","keywords":["Cibersecurity","WARP"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/","url":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/","name":"LACNIC Blog | Most Notable Threats","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png","datePublished":"2016-12-22T16:47:04+00:00","dateModified":"2023-07-28T18:34:58+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/most-notable-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/most-notable-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Most Notable Threats"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/07\/ciberseguridad-julio-2020.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":6063,"post_title":"Las principales amenazas","slug":"las-principales-amenazas","href":"https:\/\/blog.lacnic.net\/las-principales-amenazas\/"},{"locale":"pt_BR","id":6112,"post_title":"As amea\u00e7as principais","slug":"as-ameacas-principais","href":"https:\/\/blog.lacnic.net\/pt-br\/as-ameacas-principais\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/6168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=6168"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/6168\/revisions"}],"predecessor-version":[{"id":21865,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/6168\/revisions\/21865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/13686"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=6168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=6168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=6168"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=6168"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=6168"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=6168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}