
{"id":4136,"date":"2017-09-02T17:27:39","date_gmt":"2017-09-02T20:27:39","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=4136"},"modified":"2017-09-02T17:27:39","modified_gmt":"2017-09-02T20:27:39","slug":"exploits-causan-mas-5-millones-ciberataques","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/","title":{"rendered":"Exploits causan m\u00e1s de 5 millones de ciberataques"},"content":{"rendered":"<div>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4138 alignleft\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-400x274.jpg\" alt=\"\" width=\"400\" height=\"274\" srcset=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-400x274.jpg 400w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-300x205.jpg 300w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-260x178.jpg 260w, https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit.jpg 700w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><strong>\u00bf Sab\u00edas que un \u201cexploit\u201d es un tipo de malware que aprovecha errores en el software para infectar dispositivos con alg\u00fan tipo de c\u00f3digo malicioso?<\/strong> Actualmente no necesitan de ninguna interacci\u00f3n por parte del usuario, y pueden infectar dispositivos sin llegar a generar ning\u00fan tipo de sospecha. Este tipo de herramientas est\u00e1n siendo ampliamente utilizadas, tanto por los cibercriminales en sus intentos de robo de dinero de usuarios privados y empresas.<\/p>\n<\/div>\n<p style=\"text-align: justify;\"><strong>En apenas 3 meses, los productos de Kaspersky Lab han bloqueado m\u00e1s de cinco millones de ataques de exploits filtrados en archivos en la red<\/strong>. Fue a finales del trimestre cuando se alcanzaron los niveles m\u00e1s elevados, mostrando una vez m\u00e1s el constante aumento.<\/p>\n<p>Fuente: mundocontact.com<\/p>\n<h2>Recomendaciones<\/h2>\n<ul>\n<li>Aplicar <a href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/servicio-integral-siaas\/\">pol\u00edticas de seguridad en la organizaci\u00f3n<\/a><\/li>\n<li>Contar con un plan de resguardo de informaci\u00f3n<\/li>\n<li>Contar con un plan de recuperaci\u00f3n ante desastres<\/li>\n<li>Minimizar software de repositorios no verificados<\/li>\n<li>Charlas de<a href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/cursos-y-capacitacion\/charla-de-concientizacion-en-seguridad-informatica\/\"> concientizaci\u00f3n para colaboradores<\/a><\/li>\n<li>Prohibir utilizar permisos administrador en cuentas de usuarios<\/li>\n<li>Mantener actualizado los sistemas<\/li>\n<li>Implementar un sistema de monitoreo de redes y de seguridad (SIEM)<\/li>\n<li>Implementar un sistema IDS \u2013 sistema detecci\u00f3n de intrusos<\/li>\n<li>Auditar el negocio con servicios de<a href=\"https:\/\/www.talsoft-security.com\/site\/servicios\/seguridad-informatica\/testeo-de-seguridad-informatica\/\"> Hacking \u00e9tico externo e interno<\/a><\/li>\n<li>Mantener un sistema de control de vulnerabilidades<\/li>\n<li>Aplicar segmentaci\u00f3n en redes<\/li>\n<li>Implementar un sistema antivirus de pago corporativo<\/li>\n<\/ul>\n<p>[tw_video insert_type=&#8221;type_embed&#8221; video_m4v=&#8221;&#8221; video_thumb=&#8221;&#8221;]<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/5pQL023UlsE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\">[\/tw_video]<span id=\"mce_marker\" data-mce-type=\"bookmark\">?<\/span><\/iframe><\/p>\n<p><strong class=\"markup--strong markup--p-strong\">Si quieres saber m\u00e1s sobre como proteger Tu negocio frente ataques inform\u00e1ticos, vis\u00edtanos en nuestro sitio de <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.talsoft.com.ar\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"https:\/\/lateralview.co\/\"><strong class=\"markup--strong markup--p-strong\">Talsoft TS <\/strong><\/a><strong class=\"markup--strong markup--p-strong\">o subscr\u00edbete a nuestro <\/strong><a class=\"markup--anchor markup--p-anchor\" href=\"http:\/\/eepurl.com\/cq0c_j\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-href=\"http:\/\/lateralview.us1.list-manage2.com\/subscribe?u=1bb89edb08b35c2b3aae6f015&amp;id=31ad94f616\"><strong class=\"markup--strong markup--p-strong\">Newsletter<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bf Sab\u00edas que un \u201cexploit\u201d es un tipo de malware que aprovecha errores en el software para infectar dispositivos con alg\u00fan tipo de c\u00f3digo malicioso? Actualmente no necesitan de ninguna interacci\u00f3n por parte del usuario, y pueden infectar dispositivos sin llegar a generar ning\u00fan tipo de sospecha. Este tipo de herramientas est\u00e1n siendo ampliamente utilizadas, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-4136","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Exploits causan m\u00e1s de 5 millones de ciberataques<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Exploits causan m\u00e1s de 5 millones de ciberataques\",\"datePublished\":\"2017-09-02T20:27:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/\"},\"wordCount\":276,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-400x274.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Exploits causan m\u00e1s de 5 millones de ciberataques\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-400x274.jpg\",\"datePublished\":\"2017-09-02T20:27:39+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit.jpg\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit.jpg\",\"width\":700,\"height\":479},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Exploits causan m\u00e1s de 5 millones de ciberataques","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Exploits causan m\u00e1s de 5 millones de ciberataques","datePublished":"2017-09-02T20:27:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/"},"wordCount":276,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-400x274.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/","url":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Exploits causan m\u00e1s de 5 millones de ciberataques","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit-400x274.jpg","datePublished":"2017-09-02T20:27:39+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/exploits-causan-mas-5-millones-ciberataques\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit.jpg","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2017\/09\/exploit.jpg","width":700,"height":479},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/4136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=4136"}],"version-history":[{"count":5,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/4136\/revisions"}],"predecessor-version":[{"id":4142,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/4136\/revisions\/4142"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=4136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=4136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=4136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}