{"id":13500,"date":"2019-03-28T11:17:52","date_gmt":"2019-03-28T11:17:52","guid":{"rendered":"https:\/\/www.apen.es\/?p=13500"},"modified":"2025-03-04T09:33:31","modified_gmt":"2025-03-04T09:33:31","slug":"los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/","title":{"rendered":"Cybercriminals are moving from ransomware to cryptojacking"},"content":{"rendered":"<p>According to IBM Security, ransomware is being used less by cybercriminals, who have opted to switch to a new technique that jeopardizes the&nbsp;<strong>cybersecurity<\/strong>&nbsp;In many companies, and for which it is a quick and profitable business, it is called cryptojacking.<br>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is cryptojacking?<\/strong><\/h3>\n\n\n\n<p>Cryptojacking, also known as malicious cryptocurrency mining, hides behind a computer or mobile device and uses all of the device&#039;s resources to mine various forms of digital currencies known as cryptocurrencies. It can take over web browsers and compromise many types of devices, such as PCs, laptops, smartphones, or network servers. Unlike other threats, this one is designed to remain hidden from the user.<br>It&#039;s a profitable and quick way to make money, which is why many cybercriminals use it. Furthermore, because it&#039;s done covertly, the risk of being identified is even lower than with cybercrimes like ransomware. The code is hidden and difficult to detect, but it&#039;s always advisable to keep an eye on our devices to detect anomalies such as our computer running slowly when visiting a particular website or our smartphone&#039;s battery life being unusually short.<br>This cyberattack exploits security flaws and vulnerabilities, such as lack of updates, weak encryption, etc. Therefore, cybersecurity becomes an essential element for protecting your computer systems.<br>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Protect your devices<\/strong><\/h3>\n\n\n\n<p>Businesses are always exposed to all kinds of cyberattacks, but if you keep viruses under control and follow these tips, you can always combat these problematic situations in the best way. In fact, the&nbsp;<strong>cybersecurity<\/strong>&nbsp;It is an increasingly important factor for any company, and workers are acquiring more and more knowledge in this sector.<br>The following tips will allow you to have greater control over cybersecurity on all your company&#039;s computer equipment.<br>\u2022 Use an ad blocker in your browser; this will prevent some viruses from installing on your computer.<br>\u2022 Keep up to date with software updates<br>\u2022 Do not install applications or software if they do not come from a secure source<br>\u2022 Keep your antivirus software updated<br>\u2022 Use a firewall to block connections you suspect are suspicious<br>\u2022 Contact a specialized company to handle IT maintenance and security, to get advice, or to hire specialized services.<br>&nbsp;<br>If you follow these steps, you&#039;re more likely to keep your computers free of viruses and cyberattacks.&nbsp;<strong>cybersecurity<\/strong>&nbsp;This should be one of the top priorities for any company if it doesn&#039;t want to be completely exposed to the malicious skills of cybercriminals who aim to steal information and\/or money quickly and in a way that is difficult to detect.<\/p>","protected":false},"excerpt":{"rendered":"<p>According to IBM Security, ransomware is being used less by cybercriminals, who have opted for\u2026<\/p>","protected":false},"author":4,"featured_media":13446,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[417,147],"tags":[263,419],"class_list":["post-13500","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad","category-ciberataques","tag-ciberseguridad","tag-cryptojacking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Los ciberdelincuentes pasan del ransomware al cryptojacking - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Seg\u00fan afirma IBM Security, el ransomware est\u00e1 siendo menos utilizado por parte de los ciberdelincuentes, los cuales han optado por pasarse a una nueva\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los ciberdelincuentes pasan del ransomware al cryptojacking - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Seg\u00fan afirma IBM Security, el ransomware est\u00e1 siendo menos utilizado por parte de los ciberdelincuentes, los cuales han optado por pasarse a una nueva\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-28T11:17:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T09:33:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Los ciberdelincuentes pasan del ransomware al cryptojacking\",\"datePublished\":\"2019-03-28T11:17:52+00:00\",\"dateModified\":\"2025-03-04T09:33:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/\"},\"wordCount\":509,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Post_cyber_seguridad.jpg\",\"keywords\":[\"ciberseguridad\",\"cryptojacking\"],\"articleSection\":[\"Actualidad\",\"Ciberataques\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/\",\"name\":\"Los ciberdelincuentes pasan del ransomware al cryptojacking - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Post_cyber_seguridad.jpg\",\"datePublished\":\"2019-03-28T11:17:52+00:00\",\"dateModified\":\"2025-03-04T09:33:31+00:00\",\"description\":\"Seg\u00fan afirma IBM Security, el ransomware est\u00e1 siendo menos utilizado por parte de los ciberdelincuentes, los cuales han optado por pasarse a una nueva\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Post_cyber_seguridad.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Post_cyber_seguridad.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los ciberdelincuentes pasan del ransomware al cryptojacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals move from ransomware to cryptojacking - Apen Inform\u00e1tica","description":"According to IBM Security, ransomware is being used less by cybercriminals, who have opted to move on to a new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/","og_locale":"en_US","og_type":"article","og_title":"Los ciberdelincuentes pasan del ransomware al cryptojacking - Apen Inform\u00e1tica","og_description":"Seg\u00fan afirma IBM Security, el ransomware est\u00e1 siendo menos utilizado por parte de los ciberdelincuentes, los cuales han optado por pasarse a una nueva","og_url":"https:\/\/www.apen.es\/en\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2019-03-28T11:17:52+00:00","article_modified_time":"2025-03-04T09:33:31+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Los ciberdelincuentes pasan del ransomware al cryptojacking","datePublished":"2019-03-28T11:17:52+00:00","dateModified":"2025-03-04T09:33:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/"},"wordCount":509,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg","keywords":["ciberseguridad","cryptojacking"],"articleSection":["Actualidad","Ciberataques"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/","url":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/","name":"Cybercriminals move from ransomware to cryptojacking - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg","datePublished":"2019-03-28T11:17:52+00:00","dateModified":"2025-03-04T09:33:31+00:00","description":"According to IBM Security, ransomware is being used less by cybercriminals, who have opted to move on to a new","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/los-ciberdelincuentes-pasan-del-ransomware-al-cryptojacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Los ciberdelincuentes pasan del ransomware al cryptojacking"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":417,"label":"Actualidad"},{"value":147,"label":"Ciberataques"}],"post_tag":[{"value":263,"label":"ciberseguridad"},{"value":419,"label":"cryptojacking"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2019\/03\/Post_cyber_seguridad.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":417,"name":"Actualidad","slug":"actualidad","term_group":0,"term_taxonomy_id":417,"taxonomy":"category","description":"","parent":0,"count":83,"filter":"raw","term_order":"0","cat_ID":417,"category_count":83,"category_description":"","cat_name":"Actualidad","category_nicename":"actualidad","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0}],"tag_info":[{"term_id":263,"name":"ciberseguridad","slug":"ciberseguridad","term_group":0,"term_taxonomy_id":263,"taxonomy":"post_tag","description":"","parent":0,"count":15,"filter":"raw","term_order":"0"},{"term_id":419,"name":"cryptojacking","slug":"cryptojacking","term_group":0,"term_taxonomy_id":419,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/13500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=13500"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/13500\/revisions"}],"predecessor-version":[{"id":54007,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/13500\/revisions\/54007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/13446"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=13500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=13500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=13500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}