{"version":"1.0","provider_name":"Jeyjo","provider_url":"https:\/\/jeyjo.es\/blog","author_name":"Jos\u00e9 Antonio","author_url":"https:\/\/jeyjo.es\/blog\/index.php\/author\/programador\/","title":"Hackers, la renovaci\u00f3n contin\u00faa - Jeyjo","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1HLRQDxs0N\"><a href=\"https:\/\/jeyjo.es\/blog\/index.php\/2023\/10\/25\/hackers-la-renovacion-continua\/\">Hackers, la renovaci\u00f3n contin\u00faa<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/jeyjo.es\/blog\/index.php\/2023\/10\/25\/hackers-la-renovacion-continua\/embed\/#?secret=1HLRQDxs0N\" width=\"600\" height=\"338\" title=\"\u00abHackers, la renovaci\u00f3n contin\u00faa\u00bb \u2014 Jeyjo\" data-secret=\"1HLRQDxs0N\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/jeyjo.es\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/jeyjo.es\/blog\/wp-content\/uploads\/2023\/10\/wolf-securityhackershplnktheat-insights.png","thumbnail_width":499,"thumbnail_height":329,"description":"La batalla entre los hackers y las empresas cada vez est\u00e1 m\u00e1s igualada. Los primeros trabajan sin descanso para encontrar brechas de seguridad por las que colarse, mientras que los segundos emplean sus fuerzas en implementar la mejor, y m\u00e1s completa, estrategia de seguridad y sue\u00f1an con adelantarse a los ciberdelincuentes."}