
{"id":497,"date":"2009-03-12T11:29:11","date_gmt":"2009-03-12T14:29:11","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=497"},"modified":"2009-03-12T11:29:11","modified_gmt":"2009-03-12T14:29:11","slug":"los-precios-del-crimware-ruso","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/","title":{"rendered":"Los precios del Crimware ruso"},"content":{"rendered":"<div style=\"text-align: justify;\"><span style=\"font-family: arial;\">Al ver la cantidad de dominios rusos creados para diseminar malware, y la gran variedad de aplicaciones dise\u00c3\u00b1adas desde aquellas tierras para cometer diferentes tipos de delitos que buscan quedarse con la mercanc\u00c3\u00ada m\u00c3\u00a1s valiosa: la informaci\u00c3\u00b3n; imagino a Rusia como si fuese algo parecido al mundo que describe Gibson en Neuromante donde viejas callejuelas oscuras son utilizadas para la venta y alquiler clandestino de todo tipo de programas dise\u00c3\u00b1ados para romper las protecciones de seguridad.<\/span><span style=\"font-family: arial;\"><\/p>\n<p>Los delincuentes inform\u00c3\u00a1ticos y el mercado negro de crimware parecer\u00c3\u00ada estar a la orden del d\u00c3\u00ada en Rusia. Con lo cual, quiero reflejar algunos n\u00c3\u00bameros que dan una idea de lo que puede llegar a costar preparar ataques a trav\u00c3\u00a9s de un importante n\u00c3\u00bamero de \u00e2\u20ac\u0153recursos\u00e2\u20ac\u009d disponibles, como dir\u00c3\u00ada un mercenario, al mejor postor.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>Sploit 25<\/span><span style=\"font-family: arial;\"><br \/>\nEs un crimware que contiene diferentes exploit para vulnerabilidades en Internet Explorer 6 y 7, y en archivo PDF. Existe una versi\u00c3\u00b3n Lite cuyo valor es de <span style=\"font-weight: bold;\">U$S 1500<\/span> y <span style=\"font-weight: bold;\">U$S 2500<\/span> la versi\u00c3\u00b3n Pro.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>Unique Sploits Pack<\/span><span style=\"font-family: arial;\"><br \/>\nOtro crimware que contiene varios exploits para diferentes vulnerabilidades. Su valor es de <span style=\"font-weight: bold;\">U$S 600<\/span>. Por <span style=\"font-weight: bold;\">U$S 100<\/span> se accede a las actualizaciones y por <span style=\"font-weight: bold;\">U$S 50<\/span> al un m\u00c3\u00b3dulo de cifrado.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>Neon Exploit System<\/span><span style=\"font-family: arial;\"><br \/>\nUn conjunto de exploits dise\u00c3\u00b1ados para explotar las vulnerabilidades en plataformas Microsoft y diferentes aplicativos de uso masivo. El valor de este crimware es de <span style=\"font-weight: bold;\">U$S 500<\/span>.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>XS[S]hkatulka<\/span><span style=\"font-family: arial;\"><br \/>\nConjunto de script dise\u00c3\u00b1ados para romper contrase\u00c3\u00b1as de webmails a trav\u00c3\u00a9s de XSS. Seg\u00c3\u00ban sus creadores, la aplicaci\u00c3\u00b3n \u00e2\u20ac\u0153es ideal para comenzar a ganar dinero mediante la prestaci\u00c3\u00b3n de servicios para obtener las contrase\u00c3\u00b1as de las cuentas de correo. Como el investigador de <a style=\"color: #3333ff;\" href=\"http:\/\/blog.segu-info.com.ar\/2009\/02\/investigaciones-informaticas-recuperar.html\">Investigaciones Inform\u00c3\u00a1ticas<\/a>. \ud83d\ude42 Su valor es de <span style=\"font-weight: bold;\">U$S 110<\/span>.<\/span><\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s1600-h\/xsshkatulka.gif\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5308377162697768258\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 161px;\" src=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif\" border=\"0\" alt=\"\" \/><\/a><span style=\"font-weight: bold; font-family: arial;\">Cripta Zeus(a)<\/span><span style=\"font-family: arial;\"><br \/>\nEs un servicio cuyo fin es cifrar los troyanos que reclutan zombies PC\u00e2\u20ac\u2122s para la botnet Zeus. Los \u00e2\u20ac\u0153servicios\u00e2\u20ac\u009d ofrecidos son:<\/span><\/div>\n<ul style=\"text-align: justify; font-family: arial;\">\n<li>Construir criptas individuales (your.exe) la primera vez: <span style=\"font-weight: bold;\">U$S 49<\/span><\/li>\n<li>Construir criptas individuales (your.exe) cifrar cada dos horas: <span style=\"font-weight: bold;\">U$S 46<\/span><\/li>\n<li>Construir criptas individuales (your.exe) cifrar cada tres horas: <span style=\"font-weight: bold;\">U$S 43<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: bold; font-family: arial;\">Le Fiesta Pack<\/span><span style=\"font-family: arial;\"><br \/>\nUno de los crimware m\u00c3\u00a1s conocidos. Al igual que otros programas similares, se encuentra escrito en PHP y es utilizado para explotar vulnerabilidades a trav\u00c3\u00a9s de t\u00c3\u00a9cnicas como <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/01\/ataque-de-malware-va-drive-by-download.html\">Drive-by-Download<\/a>, Scripting, etc. Actualmente es utilizado por la <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/02\/zeus-botnet-masiva-propagacion-de-su_22.html\">botnet Zeus.<\/a> El precio de la \u00c3\u00baltima versi\u00c3\u00b3n es de <span style=\"font-weight: bold;\">U$S 1000<\/span>.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>YES Exploit System<\/span><span style=\"font-family: arial;\"><br \/>\nOtro crimware dise\u00c3\u00b1ado para explotar vulnerabilidades a trav\u00c3\u00a9s de exploit y scripts. Su valor es de <span style=\"font-weight: bold;\">U$S 600<\/span>.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>PoisonIvy Polymorphic Online Builder<\/span><span style=\"font-family: arial;\"><br \/>\nCrimware para generar variantes del troyano PoisonIvy en l\u00c3\u00adnea. Su valor es de <span style=\"font-weight: bold;\">U$S 500<\/span>.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>FriJoiner Small y Private<\/span> <a style=\"font-family: arial;\" href=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/SaslQGU9dxI\/AAAAAAAABFM\/Y-RaULAS-IE\/s1600-h\/frijoiner.gif\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5308377544292923154\" style=\"margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 139px;\" src=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/SaslQGU9dxI\/AAAAAAAABFM\/Y-RaULAS-IE\/s200\/frijoiner.gif\" border=\"0\" alt=\"\" \/><\/a><span style=\"font-family: arial;\">Una aplicaci\u00c3\u00b3n desarrollada para fusionar archivos ejecutables. Este tipo de aplicaciones es ampliamente utilizada por los diseminadores de malware para evitar que el c\u00c3\u00b3digo malicioso sea detectado. La versi\u00c3\u00b3n Small cuesta <span style=\"font-weight: bold;\">U$S 10<\/span> y la versi\u00c3\u00b3n Private <span style=\"font-weight: bold;\">U$S 15<\/span>.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>Genom iframer<\/span><span style=\"font-family: arial;\"><br \/>\nAplicativo dise\u00c3\u00b1ado para automatizar la inyecci\u00c3\u00b3n de etiquetas iframe en sitios vulnerables. Su valor es de <span style=\"font-weight: bold;\">U$S 40<\/span>.<\/span><span style=\"font-weight: bold; font-family: arial;\"><\/p>\n<p>CRUM Cryptor Polymorphic<\/span><span style=\"font-family: arial;\"><br \/>\nCripter con caracter\u00c3\u00adsticas polim\u00c3\u00b3rficas pensado para evitar la detecci\u00c3\u00b3n de malware por parte de las compa\u00c3\u00b1\u00c3\u00adas antivirus. Su costo de de <span style=\"font-weight: bold;\">U$S 100<\/span>.<\/span> <a style=\"font-family: arial;\" href=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Saslp6yBhCI\/AAAAAAAABFU\/90GClDwVXjY\/s1600-h\/crum.gif\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5308377987870196770\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 242px; height: 320px;\" src=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Saslp6yBhCI\/AAAAAAAABFU\/90GClDwVXjY\/s320\/crum.gif\" border=\"0\" alt=\"\" \/><\/a><span style=\"font-family: arial;\">Esta es s\u00c3\u00b3lo una peque\u00c3\u00b1a lista que representa un porcentaje \u00c3\u00adnfimo comparado con la cantidad y variedad de aplicaciones crimware.<\/span><span style=\"font-family: arial;\"><\/p>\n<p>La mayor\u00c3\u00ada de los ataques que utilizan Internet como base para atacar se llevan a cabo con programas de este estilo; sin embargo, debemos ser concientes que mientras m\u00c3\u00a1s informados nos encontremos y mejor utilicemos las tecnolog\u00c3\u00adas de seguridad, mayor ser\u00c3\u00a1 el nivel de protecci\u00c3\u00b3n en nuestros entornos de informaci\u00c3\u00b3n.<\/span><span style=\"font-family: arial; font-size: 85%;\"><span style=\"font-weight: bold;\"><\/p>\n<p>Fuente: mipistus.blogspot.com<\/span><\/span><span style=\"font-family: arial;\"><\/p>\n<p># pistus<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Al ver la cantidad de dominios rusos creados para diseminar malware, y la gran variedad de aplicaciones dise\u00c3\u00b1adas desde aquellas tierras para cometer diferentes tipos de delitos que buscan quedarse con la mercanc\u00c3\u00ada m\u00c3\u00a1s valiosa: la informaci\u00c3\u00b3n; imagino a Rusia como si fuese algo parecido al mundo que describe Gibson en Neuromante donde viejas callejuelas [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-497","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Los precios del Crimware ruso<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Los precios del Crimware ruso\",\"datePublished\":\"2009-03-12T14:29:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/\"},\"wordCount\":649,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los precios del Crimware ruso\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif\",\"datePublished\":\"2009-03-12T14:29:11+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage\",\"url\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif\",\"contentUrl\":\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los precios del Crimware ruso","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Los precios del Crimware ruso","datePublished":"2009-03-12T14:29:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/"},"wordCount":649,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage"},"thumbnailUrl":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/","url":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los precios del Crimware ruso","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage"},"thumbnailUrl":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif","datePublished":"2009-03-12T14:29:11+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/los-precios-del-crimware-ruso\/#primaryimage","url":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif","contentUrl":"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Sask54xlfUI\/AAAAAAAABFE\/Gxxv3eSb1kM\/s320\/xsshkatulka.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=497"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/497\/revisions"}],"predecessor-version":[{"id":498,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/497\/revisions\/498"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}