
{"id":560,"date":"2009-07-16T14:40:54","date_gmt":"2009-07-16T17:40:54","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=560"},"modified":"2009-07-16T14:40:54","modified_gmt":"2009-07-16T17:40:54","slug":"software-as-a-service-en-la-industria-del-malware","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/","title":{"rendered":"Software as a Service en la industria del malware"},"content":{"rendered":"<div style=\"text-align: justify;\">Hace varios a\u00f1os que tenemos la posibilidad de interactuar con diferentes recursos que se ofrecen v\u00eda web sin la necesidad de emplear los recursos, a nivel local, de nuestros equipos; por ejemplo, recuerdo un sistema operativo (<span style=\"font-style: italic;\">eyeOS)<\/span> que aplicaba en su momento, y aplica, este concepto, adem\u00e1s de otros que habitualmente solemos utilizar como <span style=\"font-style: italic;\">Google Apps<\/span>.<\/p>\n<p>Sin embargo, en la actualidad este concepto responde a una denominaci\u00f3n que esta marcando una tendencia bajo el nombre de <span style=\"font-weight: bold;\">Cloud Computing<\/span> (computaci\u00f3n en nube) que ofrece una gama variada de servicios que utilizan como infraestructura central Internet (la nube). Cuando los servicios que se ofrecen son programas, es conocido bajo el acr\u00f3nimo <span style=\"font-weight: bold;\">SaaS<\/span> (<span style=\"font-weight: bold;\">Software as a Services<\/span> \u2013 Software como servicio).<\/div>\n<div style=\"text-align: justify;\">La cuesti\u00f3n es que bajo este nuevo fen\u00f3meno, los desarrolladores de malware no se quedaron al margen y dan lugar a una nueva nomenclatura que acompa\u00f1a el concepto de Cloud Computing, <span style=\"font-weight: bold;\">MaaS<\/span> \u2013 <span style=\"font-weight: bold;\">Malware as a Service<\/span>.<\/p>\n<p>Hace unos meses mencionaba un servicio online pago que permite crear c\u00f3digos maliciosos con capacidades polim\u00f3rficas basados en el famoso troyano PoisonIvy, denominado <span style=\"font-weight: bold;\">PoisonIvy Polymorphic Online Builder<\/span>.<\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s1600-h\/mipistus-pyob.gif\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5357028735074277186\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 314px;\" src=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif\" border=\"0\" alt=\"\" \/><\/a>Sum\u00e1ndose a esta tendencia de ofrecer servicios a trav\u00e9s del protocolo HTTP, aparecen varias alternativas como un servicio similar al anteriormente mencionado, pero gratuito, llamado <span style=\"font-weight: bold;\">FUDSOnly Online Crypter<\/span>, que canaliza su actividad en la manipulaci\u00f3n en l\u00ednea de c\u00f3digos maliciosos con el \u00e1nimo de evitar su detecci\u00f3n por parte de las compa\u00f1\u00edas antivirus; contribuyendo a la causa que persiguen los desarrolladores de malware de implementar en sus creaciones <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/07\/automatizacion-de-procesos-anti.html\">procesos anti-an\u00e1lisis<\/a>.<\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9XEgYmhI\/AAAAAAAABmY\/VFyWsMg5l50\/s1600-h\/mipistus-fudsonly2.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5357028854568884754\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 223px;\" src=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9XEgYmhI\/AAAAAAAABmY\/VFyWsMg5l50\/s400\/mipistus-fudsonly2.png\" border=\"0\" alt=\"\" \/><\/a>B\u00e1sicamente se trata de un <span style=\"font-weight: bold;\">crypter<\/span>. Un tipo de programa generalmente utilizado para cifrar los binarios utilizados en la distribuci\u00f3n de c\u00f3digos maliciosos. Este &#8220;servicio&#8221; posee la &#8220;ventaja&#8221; de no necesitar descargar ni ejecutar el crypter de forma local en la PC, sino que todo el proceso se lleva a cabo v\u00eda web.<\/p>\n<p>Al finalizar el proceso, el aplicativo devuelve la siguiente leyenda &#8220;<span style=\"font-style: italic;\">Su archivo ha sido encriptado sin errores, Servicio ofrecido por FUDSOnly. Click AQUI para descargar.<\/span>&#8221; que posee el enlace para descargar el archivo manipulado.<\/div>\n<div style=\"text-align: justify;\">Como &#8220;extra&#8221;, el &#8220;servicio&#8221; ofrece la posibilidad de insertar en el archivo cifrado con el crypter el <span style=\"font-style: italic;\">Eof Data<\/span> (informaci\u00f3n del server que se ubica al final del archivo) para aquellos c\u00f3digos maliciosos que no lo soporten, a trav\u00e9s de un peque\u00f1o programa llamado <span style=\"font-style: italic;\">ReEoF<\/span>.<\/div>\n<div style=\"text-align: justify;\">Este servicio ofrecido para manipular malware, ha tenido una versi\u00f3n previa que demuestra que el concepto ya hab\u00eda sido adoptado por los ciber-delincuentes hace bastante tiempo.<\/div>\n<p><a href=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9dejj2TI\/AAAAAAAABmg\/bSm_ukEqknQ\/s1600-h\/mipistus-fudsonly.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5357028964640741682\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 255px;\" src=\"http:\/\/2.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9dejj2TI\/AAAAAAAABmg\/bSm_ukEqknQ\/s400\/mipistus-fudsonly.png\" border=\"0\" alt=\"\" \/><\/a>De hecho, son muchos los servicios de este estilo que se han subido a la ola.<\/p>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/4.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf-pVcBMxI\/AAAAAAAABm4\/JiJAPnX6_qk\/s1600-h\/mipistus-rogonline-pe-protector.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5357030267863249682\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 248px;\" src=\"http:\/\/4.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf-pVcBMxI\/AAAAAAAABm4\/JiJAPnX6_qk\/s400\/mipistus-rogonline-pe-protector.png\" border=\"0\" alt=\"\" \/><\/a>La industria del malware se suma al concepto que aglomera los servicios en l\u00ednea propuestos por la <span style=\"font-weight: bold;\">Cloud Computing<\/span>, ampliando la posibilidad y peligrosidad de las amenazas, de continuar con el cotidiano bombardeo que hacen contra los entornos de informaci\u00f3n, en busca de ampliar la oferta delictiva.<\/div>\n<p><span style=\"font-weight: bold;\">Informaci\u00f3n relacionada<\/span><br \/>\n<a style=\"color: #3333ff;\" href=\"http:\/\/www.mipistus.blogspot.com\/2009\/02\/creacion-online-de-malware-polimorfico.html\">Creaci\u00f3n Online de malware polim\u00f3rfico basado en PoisonIvy<\/a><\/p>\n<p># Jorge Mieres<\/p>\n<p>Fuente:\u00a0 MiPistus Blog<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hace varios a\u00f1os que tenemos la posibilidad de interactuar con diferentes recursos que se ofrecen v\u00eda web sin la necesidad de emplear los recursos, a nivel local, de nuestros equipos; por ejemplo, recuerdo un sistema operativo (eyeOS) que aplicaba en su momento, y aplica, este concepto, adem\u00e1s de otros que habitualmente solemos utilizar como Google [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-560","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Software as a Service en la industria del malware<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Software as a Service en la industria del malware\",\"datePublished\":\"2009-07-16T17:40:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Software as a Service en la industria del malware\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif\",\"datePublished\":\"2009-07-16T17:40:54+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage\",\"url\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif\",\"contentUrl\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Software as a Service en la industria del malware","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Software as a Service en la industria del malware","datePublished":"2009-07-16T17:40:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/","url":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Software as a Service en la industria del malware","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif","datePublished":"2009-07-16T17:40:54+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/software-as-a-service-en-la-industria-del-malware\/#primaryimage","url":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif","contentUrl":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Slf9QHWpl0I\/AAAAAAAABmQ\/omESMMrma-g\/s400\/mipistus-pyob.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=560"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/560\/revisions"}],"predecessor-version":[{"id":561,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/560\/revisions\/561"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}