{"id":2297,"date":"2024-11-11T16:18:01","date_gmt":"2024-11-11T16:18:01","guid":{"rendered":"https:\/\/ctpatcertificacion.com\/?p=2297"},"modified":"2024-11-11T17:09:48","modified_gmt":"2024-11-11T17:09:48","slug":"top-cybersecurity-threats-tools-and-practices-nov-04-nov-10","status":"publish","type":"post","link":"https:\/\/ctpatcertificacion.com\/en\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/","title":{"rendered":"Top Cybersecurity Threats, Tools, and Practices (Nov 04 &#8211; Nov 10)"},"content":{"rendered":"<p id=\"ember56\" class=\"ember-view reader-text-block__paragraph\">\u26a0\ufe0f Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software\u2014turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn\u2019t fiction; it\u2019s the new cyber reality. Today\u2019s attackers have become so sophisticated that they\u2019re using our trusted tools as secret pathways, slipping past defenses without a \ud83d\udd0d trace.<\/p>\n<p id=\"ember57\" class=\"ember-view reader-text-block__paragraph\">For banks \ud83c\udfe6, this is especially alarming. Today\u2019s malware doesn\u2019t just steal codes; it targets the very trust that digital banking relies on. These threats are more advanced and smarter than ever, often staying a step ahead of defenses.<\/p>\n<p id=\"ember58\" class=\"ember-view reader-text-block__paragraph\">And it doesn\u2019t stop there. Critical systems that power our cities are at risk too. Hackers are hiding within the very tools that run these essential services, making them harder to detect and harder to stop. It\u2019s a high-stakes game of hide-and-seek, where each move raises the risk.<\/p>\n<p id=\"ember59\" class=\"ember-view reader-text-block__paragraph\">As these threats grow, let\u2019s dive into the most urgent security issues, vulnerabilities, and cyber trends this week.<\/p>\n<h2 id=\"ember60\" class=\"ember-view reader-text-block__heading-2\">\u26a1 Threat of the Week<\/h2>\n<p id=\"ember61\" class=\"ember-view reader-text-block__paragraph\"><strong>FBI Probes China-Linked Global Hacks: <\/strong>The FBI is urgently calling for public assistance in a <a class=\"app-aware-link\" href=\"https:\/\/thehackernews.com\/2024\/11\/fbi-seeks-public-help-to-identify.html\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">global investigation into sophisticated cyber attacks<\/a> targeting companies and government agencies. Chinese state-sponsored hacking groups\u2014identified as APT31, APT41, and Volt Typhoon\u2014have breached edge devices and computer networks worldwide.<\/p>\n<p id=\"ember62\" class=\"ember-view reader-text-block__paragraph\">Exploiting zero-day vulnerabilities in edge infrastructure appliances from vendors like Sophos, these threat actors have deployed custom malware to maintain persistent remote access and repurpose compromised devices as stealthy proxies. This tactic allows them to conduct surveillance, espionage, and potentially sabotage operations while remaining undetected.<\/p>\n<p id=\"ember63\" class=\"ember-view reader-text-block__paragraph\"><strong>Tips for Organizations:<\/strong><\/p>\n<ul>\n<li><strong>Update and Patch Systems:<\/strong> Immediately apply the latest security updates to all edge devices and firewalls, particularly those from Sophos, to mitigate known vulnerabilities like CVE-2020-12271, CVE-2020-15069, CVE-2020-29574, CVE-2022-1040, and CVE-2022-3236.<\/li>\n<li><strong>Monitor for Known Malware:<\/strong> Implement advanced security solutions capable of detecting malware such as Asnar\u00f6k, Gh0st RAT, and Pygmy Goat. Regularly scan your network for signs of these threats.<\/li>\n<li><strong>Enhance Network Security:<\/strong> Deploy intrusion detection and prevention systems to monitor for unusual network activity, including unexpected ICMP traffic that could indicate backdoor communications.<\/li>\n<\/ul>\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u26a0\ufe0f Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_joinchat":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) - CTPAT: Customs Trade Partnership Against Terrorism<\/title>\n<meta name=\"description\" content=\"Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ctpatcertificacion.com\/en\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)\" \/>\n<meta property=\"og:description\" content=\"Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ctpatcertificacion.com\/en\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/\" \/>\n<meta property=\"og:site_name\" content=\"CTPAT: Customs Trade Partnership Against Terrorism\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T16:18:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-11T17:09:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2024\/11\/1731324565094.png\" \/>\n\t<meta property=\"og:image:width\" content=\"675\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"LM Consultores\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"LM Consultores\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/\"},\"author\":{\"name\":\"LM Consultores\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#\\\/schema\\\/person\\\/3ecf88bd6d99c3903423edd2f9fa430a\"},\"headline\":\"Top Cybersecurity Threats, Tools, and Practices (Nov 04 &#8211; Nov 10)\",\"datePublished\":\"2024-11-11T16:18:01+00:00\",\"dateModified\":\"2024-11-11T17:09:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/\"},\"wordCount\":378,\"publisher\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ctpatcertificacion.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/1731324565094.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/\",\"url\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/\",\"name\":\"Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) - CTPAT: Customs Trade Partnership Against Terrorism\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ctpatcertificacion.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/1731324565094.png\",\"datePublished\":\"2024-11-11T16:18:01+00:00\",\"dateModified\":\"2024-11-11T17:09:48+00:00\",\"description\":\"Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ctpatcertificacion.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/1731324565094.png\",\"contentUrl\":\"https:\\\/\\\/ctpatcertificacion.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/1731324565094.png\",\"width\":675,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/ctpatcertificacion.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Cybersecurity Threats, Tools, and Practices (Nov 04 &#8211; Nov 10)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#website\",\"url\":\"https:\\\/\\\/ctpatcertificacion.com\\\/\",\"name\":\"Consultor\u00eda CTPAT en M\u00e9xico | Certificaci\u00f3n, Validaci\u00f3n y Capacitaci\u00f3n | LM Consultores\",\"description\":\"CTPAT (Customs-Trade Partnership Against Terrorism) es una iniciativa entre el gobierno de los Estados Unidos y la iniciativa privada con la finalidad de garantizar la seguridad en las distintas \u00e1reas de la cadena de suministro y protegerla en contra del terrorismo.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ctpatcertificacion.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#organization\",\"name\":\"LM Consultores\",\"url\":\"https:\\\/\\\/ctpatcertificacion.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#local-main-organization-logo\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\"],\"opens\":\"06:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/#\\\/schema\\\/person\\\/3ecf88bd6d99c3903423edd2f9fa430a\",\"name\":\"LM Consultores\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bf229acdf12f1f7ca7fed885bc81ede009572dfd7f7bda7512dd38d63e767b6e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bf229acdf12f1f7ca7fed885bc81ede009572dfd7f7bda7512dd38d63e767b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bf229acdf12f1f7ca7fed885bc81ede009572dfd7f7bda7512dd38d63e767b6e?s=96&d=mm&r=g\",\"caption\":\"LM Consultores\"},\"url\":\"https:\\\/\\\/ctpatcertificacion.com\\\/en\\\/author\\\/lm-consultores\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ctpatcertificacion.com\\\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/ctpatcertificacion.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/ctpat-logo-arriba.png\",\"contentUrl\":\"https:\\\/\\\/ctpatcertificacion.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/ctpat-logo-arriba.png\",\"width\":600,\"height\":600,\"caption\":\"LM Consultores\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) - CTPAT: Customs Trade Partnership Against Terrorism","description":"Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ctpatcertificacion.com\/en\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/","og_locale":"en_US","og_type":"article","og_title":"Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)","og_description":"Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software","og_url":"https:\/\/ctpatcertificacion.com\/en\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/","og_site_name":"CTPAT: Customs Trade Partnership Against Terrorism","article_published_time":"2024-11-11T16:18:01+00:00","article_modified_time":"2024-11-11T17:09:48+00:00","og_image":[{"width":675,"height":380,"url":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2024\/11\/1731324565094.png","type":"image\/png"}],"author":"LM Consultores","twitter_card":"summary_large_image","twitter_misc":{"Written by":"LM Consultores","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#article","isPartOf":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/"},"author":{"name":"LM Consultores","@id":"https:\/\/ctpatcertificacion.com\/#\/schema\/person\/3ecf88bd6d99c3903423edd2f9fa430a"},"headline":"Top Cybersecurity Threats, Tools, and Practices (Nov 04 &#8211; Nov 10)","datePublished":"2024-11-11T16:18:01+00:00","dateModified":"2024-11-11T17:09:48+00:00","mainEntityOfPage":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/"},"wordCount":378,"publisher":{"@id":"https:\/\/ctpatcertificacion.com\/#organization"},"image":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#primaryimage"},"thumbnailUrl":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2024\/11\/1731324565094.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/","url":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/","name":"Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) - CTPAT: Customs Trade Partnership Against Terrorism","isPartOf":{"@id":"https:\/\/ctpatcertificacion.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#primaryimage"},"image":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#primaryimage"},"thumbnailUrl":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2024\/11\/1731324565094.png","datePublished":"2024-11-11T16:18:01+00:00","dateModified":"2024-11-11T17:09:48+00:00","description":"Imagine this: the very tools you trust to protect you online\u2014your two-factor authentication, your car\u2019s tech system, even your security software","breadcrumb":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#primaryimage","url":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2024\/11\/1731324565094.png","contentUrl":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2024\/11\/1731324565094.png","width":675,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ctpatcertificacion.com\/"},{"@type":"ListItem","position":2,"name":"Top Cybersecurity Threats, Tools, and Practices (Nov 04 &#8211; Nov 10)"}]},{"@type":"WebSite","@id":"https:\/\/ctpatcertificacion.com\/#website","url":"https:\/\/ctpatcertificacion.com\/","name":"Consultor\u00eda CTPAT en M\u00e9xico | Certificaci\u00f3n, Validaci\u00f3n y Capacitaci\u00f3n | LM Consultores","description":"CTPAT (Customs-Trade Partnership Against Terrorism) es una iniciativa entre el gobierno de los Estados Unidos y la iniciativa privada con la finalidad de garantizar la seguridad en las distintas \u00e1reas de la cadena de suministro y protegerla en contra del terrorismo.","publisher":{"@id":"https:\/\/ctpatcertificacion.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ctpatcertificacion.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Organization","Place"],"@id":"https:\/\/ctpatcertificacion.com\/#organization","name":"LM Consultores","url":"https:\/\/ctpatcertificacion.com\/","logo":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#local-main-organization-logo"},"image":{"@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#local-main-organization-logo"},"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday"],"opens":"06:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Sunday"],"opens":"00:00","closes":"00:00"}]},{"@type":"Person","@id":"https:\/\/ctpatcertificacion.com\/#\/schema\/person\/3ecf88bd6d99c3903423edd2f9fa430a","name":"LM Consultores","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bf229acdf12f1f7ca7fed885bc81ede009572dfd7f7bda7512dd38d63e767b6e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bf229acdf12f1f7ca7fed885bc81ede009572dfd7f7bda7512dd38d63e767b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf229acdf12f1f7ca7fed885bc81ede009572dfd7f7bda7512dd38d63e767b6e?s=96&d=mm&r=g","caption":"LM Consultores"},"url":"https:\/\/ctpatcertificacion.com\/en\/author\/lm-consultores\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ctpatcertificacion.com\/top-cybersecurity-threats-tools-and-practices-nov-04-nov-10\/#local-main-organization-logo","url":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2022\/03\/ctpat-logo-arriba.png","contentUrl":"https:\/\/ctpatcertificacion.com\/wp-content\/uploads\/2022\/03\/ctpat-logo-arriba.png","width":600,"height":600,"caption":"LM Consultores"}]}},"_links":{"self":[{"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/posts\/2297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/comments?post=2297"}],"version-history":[{"count":0,"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/posts\/2297\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/media\/2299"}],"wp:attachment":[{"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/media?parent=2297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/categories?post=2297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ctpatcertificacion.com\/en\/wp-json\/wp\/v2\/tags?post=2297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}