{"id":10795,"date":"2025-05-21T10:19:34","date_gmt":"2025-05-21T08:19:34","guid":{"rendered":"https:\/\/finanedi.es\/blog\/?p=10795"},"modified":"2025-05-21T10:25:26","modified_gmt":"2025-05-21T08:25:26","slug":"casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa","status":"publish","type":"post","link":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/","title":{"rendered":"Casos reales de phishing: c\u00f3mo grandes empresas cayeron en la trampa"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10795\" class=\"elementor elementor-10795\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7284dc e-flex e-con-boxed e-con e-parent\" data-id=\"c7284dc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78396f1 elementor-widget elementor-widget-text-editor\" data-id=\"78396f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La ciberseguridad se ha convertido en una prioridad para cualquier empresa, sin importar su tama\u00f1o. Entre todas las amenazas digitales, el <strong data-start=\"437\" data-end=\"449\">phishing<\/strong> sigue siendo una de las m\u00e1s efectivas\u2026 y peligrosas. Su \u00e9xito se basa en algo tan simple como enga\u00f1ar a las personas para que hagan clic donde no deben o compartan informaci\u00f3n sensible. Y lo peor: ni siquiera las grandes compa\u00f1\u00edas est\u00e1n a salvo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c782576 e-flex e-con-boxed e-con e-parent\" data-id=\"c782576\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a00cfbf elementor-widget elementor-widget-heading\" data-id=\"a00cfbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es el phishing?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8332db6 e-flex e-con-boxed e-con e-parent\" data-id=\"8332db6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3691b70 elementor-widget elementor-widget-text-editor\" data-id=\"3691b70\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"940\" data-end=\"1322\">El <a href=\"https:\/\/finanedi.es\/blog\/entendiendo-el-phishing\/\" target=\"_blank\" rel=\"noopener\">phishing es una t\u00e9cnica de suplantaci\u00f3n de identidad<\/a> cuyo objetivo es obtener datos confidenciales como contrase\u00f1as, n\u00fameros de tarjetas, accesos a sistemas o realizar fraudes financieros. Los atacantes se hacen pasar por entidades leg\u00edtimas \u2014bancos, proveedores, organismos p\u00fablicos, incluso compa\u00f1eros de trabajo\u2014 para ganarse tu confianza y lograr que reveles informaci\u00f3n.<\/p><p class=\"\" data-start=\"1324\" data-end=\"1385\">Las v\u00edas m\u00e1s utilizadas para llevar a cabo estos ataques son:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fbc109f e-flex e-con-boxed e-con e-parent\" data-id=\"fbc109f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4ce7d2 elementor-widget elementor-widget-text-editor\" data-id=\"c4ce7d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"1386\" data-end=\"1425\"><p class=\"\" data-start=\"1388\" data-end=\"1425\"><strong data-start=\"1388\" data-end=\"1410\">Correo electr\u00f3nico<\/strong> (el m\u00e1s com\u00fan)<\/p><\/li><li class=\"\" data-start=\"1426\" data-end=\"1457\"><p class=\"\" data-start=\"1428\" data-end=\"1457\"><strong data-start=\"1428\" data-end=\"1446\">SMS o WhatsApp<\/strong> (smishing)<\/p><\/li><li class=\"\" data-start=\"1458\" data-end=\"1494\"><p class=\"\" data-start=\"1460\" data-end=\"1494\"><strong data-start=\"1460\" data-end=\"1484\">Llamadas telef\u00f3nicas<\/strong> (vishing)<\/p><\/li><li class=\"\" data-start=\"1495\" data-end=\"1535\"><p class=\"\" data-start=\"1497\" data-end=\"1535\"><strong data-start=\"1497\" data-end=\"1515\">Redes sociales<\/strong> o mensajes directos<\/p><\/li><li class=\"\" data-start=\"1536\" data-end=\"1633\"><p class=\"\" data-start=\"1538\" data-end=\"1633\">Y cada vez m\u00e1s, <strong data-start=\"1554\" data-end=\"1575\">ataques dirigidos<\/strong> (spear phishing), personalizados y dif\u00edciles de detectar.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2790de e-flex e-con-boxed e-con e-parent\" data-id=\"a2790de\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f37927 elementor-widget elementor-widget-spacer\" data-id=\"6f37927\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-390aca6 e-flex e-con-boxed e-con e-parent\" data-id=\"390aca6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d05ed1 elementor-widget elementor-widget-heading\" data-id=\"5d05ed1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso real #1: Facebook y Google pierden m\u00e1s de 100 millones de d\u00f3lares (2013\u20132015)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac24b95 e-flex e-con-boxed e-con e-parent\" data-id=\"ac24b95\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1cb299 elementor-widget elementor-widget-text-editor\" data-id=\"f1cb299\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Entre 2013 y 2015, <strong data-start=\"423\" data-end=\"444\">Facebook y Google<\/strong> fueron v\u00edctimas de un sofisticado ataque de <strong data-start=\"489\" data-end=\"512\">phishing financiero<\/strong> que logr\u00f3 enga\u00f1ar a sus departamentos de pagos durante varios a\u00f1os.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36b522a e-flex e-con-boxed e-con e-parent\" data-id=\"36b522a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40313b4 elementor-widget elementor-widget-heading\" data-id=\"40313b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 pas\u00f3?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1113ac4 e-flex e-con-boxed e-con e-parent\" data-id=\"1113ac4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e8a2a elementor-widget elementor-widget-text-editor\" data-id=\"f3e8a2a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un ciberdelincuente lituano, Evaldas Rimasauskas, se hizo pasar por Quanta Computer, un proveedor real de ambas compa\u00f1\u00edas. Enviaba facturas falsas y documentos aparentemente leg\u00edtimos solicitando pagos por servicios inexistentes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e026094 e-flex e-con-boxed e-con e-parent\" data-id=\"e026094\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2af36f8 elementor-widget elementor-widget-heading\" data-id=\"2af36f8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo lo hicieron?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bab7ae6 e-flex e-con-boxed e-con e-parent\" data-id=\"bab7ae6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f51cfb elementor-widget elementor-widget-text-editor\" data-id=\"7f51cfb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"863\" data-end=\"939\"><p class=\"\" data-start=\"865\" data-end=\"939\">Registr\u00f3 empresas ficticias con nombres similares al proveedor original.<\/p><\/li><li class=\"\" data-start=\"940\" data-end=\"1011\"><p class=\"\" data-start=\"942\" data-end=\"1011\">Cre\u00f3 cuentas bancarias a nombre de esas entidades en varios pa\u00edses.<\/p><\/li><li class=\"\" data-start=\"1012\" data-end=\"1093\"><p class=\"\" data-start=\"1014\" data-end=\"1093\">Enviaba correos electr\u00f3nicos desde direcciones muy similares a las oficiales.<\/p><\/li><li class=\"\" data-start=\"1094\" data-end=\"1199\"><p class=\"\" data-start=\"1096\" data-end=\"1199\">Presentaba documentaci\u00f3n falsa (facturas, contratos, \u00f3rdenes de compra) para respaldar las solicitudes.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d0a423 e-flex e-con-boxed e-con e-parent\" data-id=\"7d0a423\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-110ac3e elementor-widget elementor-widget-heading\" data-id=\"110ac3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfImpacto?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fbd93e e-flex e-con-boxed e-con e-parent\" data-id=\"1fbd93e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38b77e0 elementor-widget elementor-widget-text-editor\" data-id=\"38b77e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ambas empresas transfirieron en total m\u00e1s de <strong data-start=\"1262\" data-end=\"1289\">100 millones de d\u00f3lares<\/strong> a las cuentas del atacante antes de que se detectara el fraude. Rimasauskas fue finalmente detenido, extraditado a EE. UU. y condenado por fraude y blanqueo de dinero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa723e7 e-flex e-con-boxed e-con e-parent\" data-id=\"fa723e7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd31cd0 elementor-widget elementor-widget-spacer\" data-id=\"fd31cd0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4612a38 e-flex e-con-boxed e-con e-parent\" data-id=\"4612a38\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2de5084 elementor-widget elementor-widget-heading\" data-id=\"2de5084\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso real #2: Banco belga Crelan pierde 70 millones de euros por spear phishing (2016)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e24eecb e-flex e-con-boxed e-con e-parent\" data-id=\"e24eecb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a19dac8 elementor-widget elementor-widget-text-editor\" data-id=\"a19dac8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En 2016, el <strong data-start=\"2153\" data-end=\"2187\">banco cooperativo belga Crelan<\/strong> se vio afectado por un ataque de <strong data-start=\"2221\" data-end=\"2239\">spear phishing<\/strong> especialmente dirigido y bien ejecutado. El incidente revel\u00f3 lo vulnerables que pueden ser incluso las entidades financieras con sistemas de seguridad avanzados si fallan en lo m\u00e1s b\u00e1sico: la verificaci\u00f3n humana.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a5931f e-flex e-con-boxed e-con e-parent\" data-id=\"5a5931f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d9381 elementor-widget elementor-widget-heading\" data-id=\"40d9381\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 pas\u00f3?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16026ab e-flex e-con-boxed e-con e-parent\" data-id=\"16026ab\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3fecb5 elementor-widget elementor-widget-text-editor\" data-id=\"f3fecb5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Los ciberdelincuentes consiguieron enga\u00f1ar a empleados de alto rango para que autorizaran transferencias a cuentas fraudulentas. Para ello, utilizaron correos electr\u00f3nicos cuidadosamente preparados y personalizados, simulando instrucciones leg\u00edtimas de la direcci\u00f3n del banco.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03e6857 e-flex e-con-boxed e-con e-parent\" data-id=\"03e6857\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f62cde5 elementor-widget elementor-widget-heading\" data-id=\"f62cde5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo lo hicieron?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1f1779 e-flex e-con-boxed e-con e-parent\" data-id=\"e1f1779\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e961c06 elementor-widget elementor-widget-text-editor\" data-id=\"e961c06\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"2778\" data-end=\"2837\"><p class=\"\" data-start=\"2780\" data-end=\"2837\">Analizaron previamente la estructura interna del banco.<\/p><\/li><li class=\"\" data-start=\"2838\" data-end=\"2936\"><p class=\"\" data-start=\"2840\" data-end=\"2936\">Redactaron correos dirigidos a personas espec\u00edficas, imitando perfectamente el estilo del CEO.<\/p><\/li><li class=\"\" data-start=\"2937\" data-end=\"3004\"><p class=\"\" data-start=\"2939\" data-end=\"3004\">Utilizaron ingenier\u00eda social para generar confianza y urgencia.<\/p><\/li><li class=\"\" data-start=\"3005\" data-end=\"3088\"><p class=\"\" data-start=\"3007\" data-end=\"3088\">Las transferencias se fraccionaron en diferentes operaciones para evitar alertas.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd118ad e-flex e-con-boxed e-con e-parent\" data-id=\"bd118ad\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2eb12d elementor-widget elementor-widget-heading\" data-id=\"c2eb12d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfImpacto?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-989a1cd e-flex e-con-boxed e-con e-parent\" data-id=\"989a1cd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-866c96f elementor-widget elementor-widget-text-editor\" data-id=\"866c96f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El fraude alcanz\u00f3 los 70 millones de euros, una cifra sorprendente para una entidad financiera. Crelan reconoci\u00f3 p\u00fablicamente el ataque y reforz\u00f3 sus protocolos internos. A pesar de contar con herramientas de seguridad, el fallo estuvo en no verificar internamente las \u00f3rdenes recibidas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2af6736 e-flex e-con-boxed e-con e-parent\" data-id=\"2af6736\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f61a098 elementor-widget elementor-widget-spacer\" data-id=\"f61a098\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e972ec3 e-flex e-con-boxed e-con e-parent\" data-id=\"e972ec3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-146bf21 elementor-widget elementor-widget-heading\" data-id=\"146bf21\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Caso real #3: Zendal pierde 9 millones de euros por un fraude del CEO (2020)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23c7f96 e-flex e-con-boxed e-con e-parent\" data-id=\"23c7f96\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51beeb6 elementor-widget elementor-widget-text-editor\" data-id=\"51beeb6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En 2020, la farmac\u00e9utica gallega Zendal, involucrada en la producci\u00f3n de vacunas contra la COVID-19, fue v\u00edctima de un sofisticado ataque de phishing conocido como \u00abfraude del CEO\u00bb, resultando en la p\u00e9rdida de m\u00e1s de 9 millones de euros.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e28f9b e-flex e-con-boxed e-con e-parent\" data-id=\"5e28f9b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f62a28b elementor-widget elementor-widget-heading\" data-id=\"f62a28b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 pas\u00f3?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bd9996 e-flex e-con-boxed e-con e-parent\" data-id=\"3bd9996\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83769dc elementor-widget elementor-widget-text-editor\" data-id=\"83769dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Un ciberdelincuente suplant\u00f3 la identidad del CEO de Zendal mediante un correo electr\u00f3nico aparentemente leg\u00edtimo, solicitando al director financiero que realizara transferencias urgentes y confidenciales para establecer acuerdos con una empresa asi\u00e1tica relacionada con el desarrollo de vacunas contra la COVID-19.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Confiando en la autenticidad del mensaje, el director financiero ejecut\u00f3 las instrucciones, realizando unas 20 transferencias por un total de m\u00e1s de 9 millones de euros.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57d0080 e-flex e-con-boxed e-con e-parent\" data-id=\"57d0080\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8198d76 elementor-widget elementor-widget-heading\" data-id=\"8198d76\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo lo hicieron?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc7884b e-flex e-con-boxed e-con e-parent\" data-id=\"bc7884b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bd7382 elementor-widget elementor-widget-text-editor\" data-id=\"2bd7382\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"436\" data-end=\"477\"><p class=\"\" data-start=\"438\" data-end=\"477\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">El atacante utiliz\u00f3 una direcci\u00f3n de correo electr\u00f3nico que imitaba la del CEO de la empresa.<\/span><\/p><\/li><li class=\"\" data-start=\"478\" data-end=\"519\"><p class=\"\" data-start=\"480\" data-end=\"519\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Redact\u00f3 mensajes con un lenguaje corporativo convincente, solicitando discreci\u00f3n y urgencia.<\/span><\/p><\/li><li class=\"\" data-start=\"520\" data-end=\"561\"><p class=\"\" data-start=\"522\" data-end=\"561\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Justific\u00f3 las transferencias como parte de una operaci\u00f3n estrat\u00e9gica relacionada con la pandemia.<\/span><\/p><\/li><li class=\"\" data-start=\"562\" data-end=\"642\"><p class=\"\" data-start=\"564\" data-end=\"642\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Aprovech\u00f3 la confianza y la falta de verificaci\u00f3n adicional en los procesos internos.<\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3feef30 e-flex e-con-boxed e-con e-parent\" data-id=\"3feef30\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5520b1c elementor-widget elementor-widget-heading\" data-id=\"5520b1c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u00bfImpacto?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7620c3 e-flex e-con-boxed e-con e-parent\" data-id=\"b7620c3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50c6b7b elementor-widget elementor-widget-text-editor\" data-id=\"50c6b7b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">La estafa fue descubierta cuando la falta de liquidez y las tensiones internas llevaron a una reuni\u00f3n entre los directivos, revelando el fraude.<\/span> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Zendal denunci\u00f3 el incidente a la Guardia Civil, que inici\u00f3 una investigaci\u00f3n para rastrear los fondos y dar con los responsables.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a6195b e-flex e-con-boxed e-con e-parent\" data-id=\"6a6195b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef24c9f elementor-widget elementor-widget-spacer\" data-id=\"ef24c9f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8b752d e-flex e-con-boxed e-con e-parent\" data-id=\"e8b752d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7afddb3 elementor-widget elementor-widget-heading\" data-id=\"7afddb3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo identificar un intento de phishing?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d11dd1e e-flex e-con-boxed e-con e-parent\" data-id=\"d11dd1e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39d1417 elementor-widget elementor-widget-text-editor\" data-id=\"39d1417\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aunque los ataques de phishing son cada vez m\u00e1s sofisticados, hay se\u00f1ales de alerta que puedes aprender a reconocer:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25a4909 e-flex e-con-boxed e-con e-parent\" data-id=\"25a4909\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-595324b elementor-widget elementor-widget-text-editor\" data-id=\"595324b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"4594\" data-end=\"4696\"><p class=\"\" data-start=\"4596\" data-end=\"4696\"><strong data-start=\"4596\" data-end=\"4618\">Urgencia o presi\u00f3n<\/strong> para actuar r\u00e1pido: \u201c\u00a1Tu cuenta ser\u00e1 bloqueada!\u201d, \u201cPago inmediato requerido\u201d.<\/p><\/li><li class=\"\" data-start=\"4697\" data-end=\"4774\"><p class=\"\" data-start=\"4699\" data-end=\"4774\"><strong data-start=\"4699\" data-end=\"4738\">Errores ortogr\u00e1ficos o gramaticales<\/strong> en correos supuestamente oficiales.<\/p><\/li><li class=\"\" data-start=\"4775\" data-end=\"4881\"><p class=\"\" data-start=\"4777\" data-end=\"4881\"><strong data-start=\"4777\" data-end=\"4810\">Correos o enlaces sospechosos<\/strong>, con dominios similares pero no exactos (por ejemplo: @micros0ft.com).<\/p><\/li><li class=\"\" data-start=\"4882\" data-end=\"4976\"><p class=\"\" data-start=\"4884\" data-end=\"4976\"><strong data-start=\"4884\" data-end=\"4918\">Solicitudes de datos sensibles<\/strong>, como contrase\u00f1as, n\u00fameros de cuenta o c\u00f3digos de acceso.<\/p><\/li><li class=\"\" data-start=\"4977\" data-end=\"5057\"><p class=\"\" data-start=\"4979\" data-end=\"5057\"><strong data-start=\"4979\" data-end=\"5007\">Enlaces que no coinciden<\/strong> con la URL real (pasar el cursor para verificar).<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68db1d4c e-flex e-con-boxed e-con e-parent\" data-id=\"68db1d4c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a37ecd9 elementor-widget elementor-widget-text-editor\" data-id=\"4a37ecd9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\ud83d\udcc4 Art\u00edculo relacionado<\/strong>:\u00a0<a href=\"https:\/\/finanedi.es\/blog\/como-identificar-un-mensaje-de-phishing-navega-con-seguridad\/\">C\u00f3mo identificar un mensaje de phishing: Navega con seguridad<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0ef1e0 e-flex e-con-boxed e-con e-parent\" data-id=\"b0ef1e0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e26cc7e elementor-widget elementor-widget-spacer\" data-id=\"e26cc7e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b40426 e-flex e-con-boxed e-con e-parent\" data-id=\"3b40426\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3856bc elementor-widget elementor-widget-heading\" data-id=\"e3856bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 hacer si has sido v\u00edctima?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10f2b95 e-flex e-con-boxed e-con e-parent\" data-id=\"10f2b95\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a632ef4 elementor-widget elementor-widget-text-editor\" data-id=\"a632ef4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"5100\" data-end=\"5141\">Actuar r\u00e1pido puede marcar la diferencia:<\/p><ol data-start=\"5143\" data-end=\"5541\"><li class=\"\" data-start=\"5143\" data-end=\"5198\"><p class=\"\" data-start=\"5146\" data-end=\"5198\"><strong data-start=\"5146\" data-end=\"5187\">Cambia inmediatamente tus contrase\u00f1as<\/strong> de acceso.<\/p><\/li><li class=\"\" data-start=\"5199\" data-end=\"5276\"><p class=\"\" data-start=\"5202\" data-end=\"5276\"><strong data-start=\"5202\" data-end=\"5227\">Contacta con tu banco<\/strong> si hay movimientos sospechosos o transferencias.<\/p><\/li><li class=\"\" data-start=\"5277\" data-end=\"5392\"><p class=\"\" data-start=\"5280\" data-end=\"5392\"><strong data-start=\"5280\" data-end=\"5309\">Informa a las autoridades<\/strong>: el <a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener\">INCIBE (Instituto Nacional de Ciberseguridad)<\/a> ofrece ayuda gratuita en el 017.<\/p><\/li><li class=\"\" data-start=\"5393\" data-end=\"5457\"><p class=\"\" data-start=\"5396\" data-end=\"5457\"><strong data-start=\"5396\" data-end=\"5428\">Analiza el origen del ataque<\/strong> para evitar repetir errores.<\/p><\/li><li class=\"\" data-start=\"5458\" data-end=\"5541\"><p class=\"\" data-start=\"5461\" data-end=\"5541\"><strong data-start=\"5461\" data-end=\"5494\">Notifica a posibles afectados<\/strong> si se ha comprometido informaci\u00f3n de terceros.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1381bc5 e-flex e-con-boxed e-con e-parent\" data-id=\"1381bc5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f03700d elementor-widget elementor-widget-spacer\" data-id=\"f03700d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f52ef2a e-flex e-con-boxed e-con e-parent\" data-id=\"f52ef2a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-173391c elementor-widget elementor-widget-heading\" data-id=\"173391c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">C\u00f3mo proteger tu empresa del phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4dbf43 e-flex e-con-boxed e-con e-parent\" data-id=\"a4dbf43\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d350d3 elementor-widget elementor-widget-text-editor\" data-id=\"0d350d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"5590\" data-end=\"5671\">Adem\u00e1s de identificar ataques, es fundamental <strong data-start=\"5636\" data-end=\"5670\">establecer medidas preventivas<\/strong>:<\/p><p class=\"\" data-start=\"5673\" data-end=\"6092\">\u2705 <strong data-start=\"5675\" data-end=\"5700\">Formaci\u00f3n a empleados<\/strong>: todos deben saber identificar un correo fraudulento.<br data-start=\"5754\" data-end=\"5757\" \/>\u2705 <strong data-start=\"5759\" data-end=\"5819\">Verificaci\u00f3n doble de pagos y cambios de cuenta bancaria<\/strong>.<br data-start=\"5820\" data-end=\"5823\" \/>\u2705 <strong data-start=\"5825\" data-end=\"5855\">Autenticaci\u00f3n en dos pasos<\/strong> en correos, programas de gesti\u00f3n y banca online.<br data-start=\"5904\" data-end=\"5907\" \/>\u2705 <strong data-start=\"5909\" data-end=\"5944\">Simulacros de phishing internos<\/strong> para evaluar la preparaci\u00f3n del equipo.<br data-start=\"5984\" data-end=\"5987\" \/>\u2705 <strong data-start=\"5989\" data-end=\"6014\">Herramientas t\u00e9cnicas<\/strong> como filtros antispam, antivirus y protecci\u00f3n del dominio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ccd3ed e-flex e-con-boxed e-con e-parent\" data-id=\"6ccd3ed\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-625b2f3 elementor-widget elementor-widget-spacer\" data-id=\"625b2f3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd3df5b e-flex e-con-boxed e-con e-parent\" data-id=\"cd3df5b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b7ceab3 e-con-full e-flex e-con e-child\" data-id=\"7b7ceab3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1c6e2884 e-flex e-con-boxed e-con e-child\" data-id=\"1c6e2884\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68cd3b48 elementor-widget elementor-widget-heading\" data-id=\"68cd3b48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Herramientas para impulsar<br>tu negocio<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7be746 elementor-widget elementor-widget-text-editor\" data-id=\"4a7be746\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>FinanEDI es la soluci\u00f3n en la nube gratuita que permite automatizar y optimizar los procesos financieros, contables y administrativos de tu negocio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d655176 elementor-widget elementor-widget-button\" data-id=\"1d655176\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/finanedi.es\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Crear cuenta gratis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1be392 e-con-full e-flex e-con e-child\" data-id=\"1be392\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30ef00b4 elementor-widget elementor-widget-image\" data-id=\"30ef00b4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"233\" src=\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/09\/Dashborad_00115-300x233.png\" class=\"attachment-medium size-medium wp-image-5370\" alt=\"Herramientas para impulsar tu negocio - FinanEDI\" srcset=\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/09\/Dashborad_00115-300x233.png 300w, https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/09\/Dashborad_00115-768x597.png 768w, https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/09\/Dashborad_00115.png 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f5b8e1 e-flex e-con-boxed e-con e-parent\" data-id=\"6f5b8e1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f956a4e elementor-widget elementor-widget-spacer\" data-id=\"f956a4e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e52ad5b e-flex e-con-boxed e-con e-parent\" data-id=\"e52ad5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dda784 elementor-widget elementor-widget-text-editor\" data-id=\"3dda784\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"6151\" data-end=\"6424\">El phishing no es un problema solo para las grandes corporaciones. Las pymes, aut\u00f3nomos y peque\u00f1os equipos tambi\u00e9n son objetivos habituales. La buena noticia es que con informaci\u00f3n, formaci\u00f3n y sentido com\u00fan puedes reducir dr\u00e1sticamente el riesgo de caer en una trampa.<\/p><p class=\"\" data-start=\"6426\" data-end=\"6557\">Aprende de los errores de otros. Revisa los procesos de tu empresa. Y recuerda: si algo suena sospechoso, probablemente lo sea.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-528f7930 e-flex e-con-boxed e-con e-parent\" data-id=\"528f7930\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd099f0 e-flex e-con-boxed e-con e-child\" data-id=\"cd099f0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-15721c3d elementor-widget elementor-widget-heading\" data-id=\"15721c3d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Preguntas frecuentes<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2026bf7b e-flex e-con-boxed e-con e-child\" data-id=\"2026bf7b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cf095fc elementor-widget elementor-widget-heading\" data-id=\"7cf095fc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"> \u00bfQu\u00e9 diferencia hay entre phishing y spear phishing?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-320d49b3 elementor-widget elementor-widget-text-editor\" data-id=\"320d49b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El <strong data-start=\"346\" data-end=\"358\">phishing<\/strong> es un ataque masivo que busca enga\u00f1ar a muchos usuarios para obtener datos confidenciales (por ejemplo, correos falsos de bancos o servicios).<br \/><br data-start=\"501\" data-end=\"504\" \/>El <strong data-start=\"507\" data-end=\"525\">spear phishing<\/strong> es m\u00e1s sofisticado: est\u00e1 dirigido a personas concretas (como empleados o directivos) y se basa en informaci\u00f3n personalizada, lo que lo hace m\u00e1s dif\u00edcil de detectar.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73088e1c e-flex e-con-boxed e-con e-child\" data-id=\"73088e1c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45aac891 elementor-widget elementor-widget-heading\" data-id=\"45aac891\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es el \u201cfraude del CEO\u201d y por qu\u00e9 es tan peligroso?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e30af90 elementor-widget elementor-widget-text-editor\" data-id=\"5e30af90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Es un tipo de spear phishing en el que los atacantes se hacen pasar por un alto cargo de la empresa (como el CEO o director financiero) para solicitar transferencias de dinero o informaci\u00f3n sensible. Funciona porque juega con la jerarqu\u00eda, la urgencia y la confianza interna.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f4b02d8 e-flex e-con-boxed e-con e-child\" data-id=\"3f4b02d8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32de4d92 elementor-widget elementor-widget-heading\" data-id=\"32de4d92\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo puedo saber si un correo es phishing?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14d9da14 elementor-widget elementor-widget-text-editor\" data-id=\"14d9da14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"1105\" data-end=\"1131\">Algunas se\u00f1ales de alerta:<\/p><ul data-start=\"1132\" data-end=\"1455\"><li class=\"\" data-start=\"1132\" data-end=\"1226\"><p class=\"\" data-start=\"1134\" data-end=\"1226\">Direcciones de correo ligeramente modificadas (ej. <code data-start=\"1185\" data-end=\"1198\">@empresa.co<\/code> en lugar de <code data-start=\"1211\" data-end=\"1225\">@empresa.com<\/code>)<\/p><\/li><li class=\"\" data-start=\"1227\" data-end=\"1269\"><p class=\"\" data-start=\"1229\" data-end=\"1269\">Faltas de ortograf\u00eda o redacci\u00f3n forzada<\/p><\/li><li class=\"\" data-start=\"1270\" data-end=\"1319\"><p class=\"\" data-start=\"1272\" data-end=\"1319\">Solicitudes urgentes o confidenciales inusuales<\/p><\/li><li class=\"\" data-start=\"1320\" data-end=\"1455\"><p class=\"\" data-start=\"1322\" data-end=\"1455\">Archivos adjuntos o enlaces sospechosos. Cuando haya duda, verifica por otro canal (tel\u00e9fono o presencialmente) antes de actuar.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d196fae e-flex e-con-boxed e-con e-child\" data-id=\"5d196fae\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7559d621 elementor-widget elementor-widget-heading\" data-id=\"7559d621\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 hacer si mi empresa ha sido v\u00edctima de phishing?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21554af6 elementor-widget elementor-widget-text-editor\" data-id=\"21554af6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"1529\" data-end=\"1608\"><p class=\"\" data-start=\"1531\" data-end=\"1608\">Contacta inmediatamente con tu banco para bloquear posibles transferencias.<\/p><\/li><li class=\"\" data-start=\"1609\" data-end=\"1699\"><p class=\"\" data-start=\"1611\" data-end=\"1699\">Denuncia el incidente a las autoridades (en Espa\u00f1a: Guardia Civil o Polic\u00eda Nacional).<\/p><\/li><li class=\"\" data-start=\"1700\" data-end=\"1797\"><p class=\"\" data-start=\"1702\" data-end=\"1797\">Notifica a los afectados (empleados, clientes, etc.) si se han comprometido datos personales.<\/p><\/li><li class=\"\" data-start=\"1798\" data-end=\"1857\"><p class=\"\" data-start=\"1800\" data-end=\"1857\">Revisa y refuerza tus protocolos de seguridad internos.<\/p><\/li><li class=\"\" data-start=\"1858\" data-end=\"1905\"><p class=\"\" data-start=\"1860\" data-end=\"1905\">Forma al equipo para que no vuelva a ocurrir.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8af5195 e-flex e-con-boxed e-con e-child\" data-id=\"8af5195\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a18904 elementor-widget elementor-widget-heading\" data-id=\"3a18904\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo se puede prevenir el phishing en una pyme o negocio peque\u00f1o?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79242f9 elementor-widget elementor-widget-text-editor\" data-id=\"79242f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"\" data-start=\"1992\" data-end=\"2063\"><p class=\"\" data-start=\"1994\" data-end=\"2063\">Implementa una pol\u00edtica clara de verificaci\u00f3n para pagos y accesos.<\/p><\/li><li class=\"\" data-start=\"2064\" data-end=\"2133\"><p class=\"\" data-start=\"2066\" data-end=\"2133\">Forma regularmente al personal sobre amenazas y buenas pr\u00e1cticas.<\/p><\/li><li class=\"\" data-start=\"2134\" data-end=\"2199\"><p class=\"\" data-start=\"2136\" data-end=\"2199\">Utiliza autenticaci\u00f3n en dos pasos (2FA) en cuentas cr\u00edticas.<\/p><\/li><li class=\"\" data-start=\"2200\" data-end=\"2259\"><p class=\"\" data-start=\"2202\" data-end=\"2259\">Mant\u00e9n el software actualizado y usa antivirus fiables.<\/p><\/li><li class=\"\" data-start=\"2260\" data-end=\"2359\"><p class=\"\" data-start=\"2262\" data-end=\"2359\">Fomenta una cultura donde preguntar antes de actuar est\u00e9 bien visto, aunque venga del \u201cjefe\u201d.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-703c6f8a e-flex e-con-boxed e-con e-parent\" data-id=\"703c6f8a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3dbcfbde e-con-full e-flex e-con e-child\" data-id=\"3dbcfbde\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-495ab5b1 elementor-widget elementor-widget-spacer\" data-id=\"495ab5b1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c59200b e-con-full e-flex e-con e-child\" data-id=\"5c59200b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74244574 elementor-widget elementor-widget-heading\" data-id=\"74244574\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">No te pierdas...<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7fbb6a41 e-con-full e-flex e-con e-child\" data-id=\"7fbb6a41\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ebd5589 elementor-widget elementor-widget-katen-post-five\" data-id=\"5ebd5589\" data-element_type=\"widget\" data-widget_type=\"katen-post-five.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"padding-30 rounded bordered\">\n\n\t\t\t<div class=\"row infinite-wrapper\">\n\n\t\t\t\n\t\t\t\t<div class=\"col-md-12 col-sm-6 post-list-item post-item\">\n\t\t\t\t\t<!-- post -->\n\t\t\t\t\t<div class=\"post post-list clearfix\">\n\n\t\t\t\t\t\t<div class=\"thumb rounded\"><div class=\"inner\"><a href=\"https:\/\/finanedi.es\/blog\/como-identificar-un-mensaje-de-phishing-navega-con-seguridad\/\"><img decoding=\"async\" width=\"330\" height=\"250\" src=\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/keepcoding-lVF2HLzjopw-unsplash-330x250.jpg\" class=\"attachment-katen-thumb-list size-katen-thumb-list wp-post-image\" alt=\"C\u00f3mo identificar un mensaje de phishing\" \/><\/a><\/div><\/div>  \n\n\t\t\t\t\t\t<div class=\"details clearfix\">\n\t\t\t\t\t\t\t<ul class=\"meta list-inline mb-3\">\n\t\t\t\t\t\t\t\t<li class=\"list-inline-item\"><a href=\"https:\/\/finanedi.es\/blog\/category\/tecnologia\/\">Tecnolog\u00eda<\/a><\/li>\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<h5 class=\"post-title\"><a href=\"https:\/\/finanedi.es\/blog\/como-identificar-un-mensaje-de-phishing-navega-con-seguridad\/\">C\u00f3mo identificar un mensaje de phishing: Navega con seguridad<\/a><\/h5>\n\t\t\t\t\t\t\t<p class=\"excerpt mb-0\">\n\t\t\t\t\t\t\t\t\u00bfC\u00f3mo puedes reconocer estas trampas cibern\u00e9ticas y protegerte? En este art\u00edculo, te proporcionar\u00e9 una gu\u00eda&hellip;\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"post-bottom clearfix d-flex align-items-center\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\t<div class=\"col-md-12 col-sm-6 post-list-item post-item\">\n\t\t\t\t\t<!-- post -->\n\t\t\t\t\t<div class=\"post post-list clearfix\">\n\n\t\t\t\t\t\t<div class=\"thumb rounded\"><div class=\"inner\"><a href=\"https:\/\/finanedi.es\/blog\/entendiendo-el-phishing\/\"><img decoding=\"async\" width=\"330\" height=\"250\" src=\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/clint-patterson-dYEuFB8KQJk-unsplash-330x250.jpg\" class=\"attachment-katen-thumb-list size-katen-thumb-list wp-post-image\" alt=\"\u00bfQu\u00e9 es el Phishing?\" \/><\/a><\/div><\/div>  \n\n\t\t\t\t\t\t<div class=\"details clearfix\">\n\t\t\t\t\t\t\t<ul class=\"meta list-inline mb-3\">\n\t\t\t\t\t\t\t\t<li class=\"list-inline-item\"><a href=\"https:\/\/finanedi.es\/blog\/category\/tecnologia\/\">Tecnolog\u00eda<\/a><\/li>\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<h5 class=\"post-title\"><a href=\"https:\/\/finanedi.es\/blog\/entendiendo-el-phishing\/\">\u00bfQu\u00e9 es el Phishing?<\/a><\/h5>\n\t\t\t\t\t\t\t<p class=\"excerpt mb-0\">\n\t\t\t\t\t\t\t\tEl phishing se ha convertido en una de las amenazas m\u00e1s persistentes y peligrosas para&hellip;\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"post-bottom clearfix d-flex align-items-center\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\t<div class=\"col-md-12 col-sm-6 post-list-item post-item\">\n\t\t\t\t\t<!-- post -->\n\t\t\t\t\t<div class=\"post post-list clearfix\">\n\n\t\t\t\t\t\t<div class=\"thumb rounded\"><div class=\"inner\"><a href=\"https:\/\/finanedi.es\/blog\/descifrando-los-tipos-de-phishing-guia-para-protegerte-en-linea\/\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"250\" src=\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/markus-spiske-iar-afB0QQw-unsplash-330x250.jpg\" class=\"attachment-katen-thumb-list size-katen-thumb-list wp-post-image\" alt=\"Descifrando los tipos de phishing\" \/><\/a><\/div><\/div>  \n\n\t\t\t\t\t\t<div class=\"details clearfix\">\n\t\t\t\t\t\t\t<ul class=\"meta list-inline mb-3\">\n\t\t\t\t\t\t\t\t<li class=\"list-inline-item\"><a href=\"https:\/\/finanedi.es\/blog\/category\/tecnologia\/\">Tecnolog\u00eda<\/a><\/li>\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<h5 class=\"post-title\"><a href=\"https:\/\/finanedi.es\/blog\/descifrando-los-tipos-de-phishing-guia-para-protegerte-en-linea\/\">Descifrando los tipos de phishing<\/a><\/h5>\n\t\t\t\t\t\t\t<p class=\"excerpt mb-0\">\n\t\t\t\t\t\t\t\tNos sumergiremos en el intrigante reino de los tipos de phishing, una amenaza que debemos&hellip;\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"post-bottom clearfix d-flex align-items-center\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t\t\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La ciberseguridad se ha convertido en una prioridad para cualquier empresa, sin importar su tama\u00f1o. Entre todas las amenazas digitales, el phishing sigue siendo una de las m\u00e1s efectivas\u2026 y peligrosas. Su \u00e9xito se basa en algo tan simple como enga\u00f1ar a las personas para que hagan clic donde no deben o compartan informaci\u00f3n sensible. Y lo peor: ni siquiera las grandes compa\u00f1\u00edas est\u00e1n a salvo.<\/p>\n","protected":false},"author":3,"featured_media":10799,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-10795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing: C\u00f3mo grandes empresas cayeron en la trampa<\/title>\n<meta name=\"description\" content=\"Descubre c\u00f3mo grandes empresas como Google, Facebook o Zendal fueron v\u00edctimas de phishing y qu\u00e9 lecciones puedes aplicar en tu negocio.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: C\u00f3mo grandes empresas cayeron en la trampa\" \/>\n<meta property=\"og:description\" content=\"Descubre c\u00f3mo grandes empresas como Google, Facebook o Zendal fueron v\u00edctimas de phishing y qu\u00e9 lecciones puedes aplicar en tu negocio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog para pymes y aut\u00f3nomos - FinanEDI\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-21T08:19:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-21T08:25:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1127\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"restevez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"restevez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\"},\"author\":{\"name\":\"restevez\",\"@id\":\"https:\/\/finanedi.es\/blog\/#\/schema\/person\/233ed58195d34f36f74f13ba1030ebd8\"},\"headline\":\"Casos reales de phishing: c\u00f3mo grandes empresas cayeron en la trampa\",\"datePublished\":\"2025-05-21T08:19:34+00:00\",\"dateModified\":\"2025-05-21T08:25:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\"},\"wordCount\":1535,\"publisher\":{\"@id\":\"https:\/\/finanedi.es\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\",\"url\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\",\"name\":\"Phishing: C\u00f3mo grandes empresas cayeron en la trampa\",\"isPartOf\":{\"@id\":\"https:\/\/finanedi.es\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg\",\"datePublished\":\"2025-05-21T08:19:34+00:00\",\"dateModified\":\"2025-05-21T08:25:26+00:00\",\"description\":\"Descubre c\u00f3mo grandes empresas como Google, Facebook o Zendal fueron v\u00edctimas de phishing y qu\u00e9 lecciones puedes aplicar en tu negocio.\",\"breadcrumb\":{\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage\",\"url\":\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg\",\"contentUrl\":\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg\",\"width\":2000,\"height\":1127,\"caption\":\"Casos reales de phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/finanedi.es\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Casos reales de phishing: c\u00f3mo grandes empresas cayeron en la trampa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/finanedi.es\/blog\/#website\",\"url\":\"https:\/\/finanedi.es\/blog\/\",\"name\":\"Blog para pymes y aut\u00f3nomos - FinanEDI\",\"description\":\"Blog para aut\u00f3nomos y PYMES, sobre temas como facturaci\u00f3n, contabilidad, tecnolog\u00eda.\",\"publisher\":{\"@id\":\"https:\/\/finanedi.es\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/finanedi.es\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/finanedi.es\/blog\/#organization\",\"name\":\"Blog para pymes y aut\u00f3nomos - FinanEDI\",\"url\":\"https:\/\/finanedi.es\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/finanedi.es\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/FinanEdiAzul1.svg\",\"contentUrl\":\"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/FinanEdiAzul1.svg\",\"width\":142,\"height\":36,\"caption\":\"Blog para pymes y aut\u00f3nomos - FinanEDI\"},\"image\":{\"@id\":\"https:\/\/finanedi.es\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/finanedi.es\/blog\/#\/schema\/person\/233ed58195d34f36f74f13ba1030ebd8\",\"name\":\"restevez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/finanedi.es\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6c4880db9746e4aa887a98e0ebf657788804dc4280120ef10331a2e6ebb4a9a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6c4880db9746e4aa887a98e0ebf657788804dc4280120ef10331a2e6ebb4a9a0?s=96&d=mm&r=g\",\"caption\":\"restevez\"},\"url\":\"https:\/\/finanedi.es\/blog\/author\/restevez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing: C\u00f3mo grandes empresas cayeron en la trampa","description":"Descubre c\u00f3mo grandes empresas como Google, Facebook o Zendal fueron v\u00edctimas de phishing y qu\u00e9 lecciones puedes aplicar en tu negocio.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/","og_locale":"es_ES","og_type":"article","og_title":"Phishing: C\u00f3mo grandes empresas cayeron en la trampa","og_description":"Descubre c\u00f3mo grandes empresas como Google, Facebook o Zendal fueron v\u00edctimas de phishing y qu\u00e9 lecciones puedes aplicar en tu negocio.","og_url":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/","og_site_name":"Blog para pymes y aut\u00f3nomos - FinanEDI","article_published_time":"2025-05-21T08:19:34+00:00","article_modified_time":"2025-05-21T08:25:26+00:00","og_image":[{"width":2000,"height":1127,"url":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg","type":"image\/jpeg"}],"author":"restevez","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"restevez","Tiempo de lectura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#article","isPartOf":{"@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/"},"author":{"name":"restevez","@id":"https:\/\/finanedi.es\/blog\/#\/schema\/person\/233ed58195d34f36f74f13ba1030ebd8"},"headline":"Casos reales de phishing: c\u00f3mo grandes empresas cayeron en la trampa","datePublished":"2025-05-21T08:19:34+00:00","dateModified":"2025-05-21T08:25:26+00:00","mainEntityOfPage":{"@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/"},"wordCount":1535,"publisher":{"@id":"https:\/\/finanedi.es\/blog\/#organization"},"image":{"@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage"},"thumbnailUrl":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg","articleSection":["Tecnolog\u00eda"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/","url":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/","name":"Phishing: C\u00f3mo grandes empresas cayeron en la trampa","isPartOf":{"@id":"https:\/\/finanedi.es\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage"},"image":{"@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage"},"thumbnailUrl":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg","datePublished":"2025-05-21T08:19:34+00:00","dateModified":"2025-05-21T08:25:26+00:00","description":"Descubre c\u00f3mo grandes empresas como Google, Facebook o Zendal fueron v\u00edctimas de phishing y qu\u00e9 lecciones puedes aplicar en tu negocio.","breadcrumb":{"@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#primaryimage","url":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg","contentUrl":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2025\/05\/Casos-reales-de-phishing.jpg","width":2000,"height":1127,"caption":"Casos reales de phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/finanedi.es\/blog\/casos-reales-de-phishing-como-grandes-empresas-cayeron-en-la-trampa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/finanedi.es\/blog\/"},{"@type":"ListItem","position":2,"name":"Casos reales de phishing: c\u00f3mo grandes empresas cayeron en la trampa"}]},{"@type":"WebSite","@id":"https:\/\/finanedi.es\/blog\/#website","url":"https:\/\/finanedi.es\/blog\/","name":"Blog para pymes y aut\u00f3nomos - FinanEDI","description":"Blog para aut\u00f3nomos y PYMES, sobre temas como facturaci\u00f3n, contabilidad, tecnolog\u00eda.","publisher":{"@id":"https:\/\/finanedi.es\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/finanedi.es\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/finanedi.es\/blog\/#organization","name":"Blog para pymes y aut\u00f3nomos - FinanEDI","url":"https:\/\/finanedi.es\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/finanedi.es\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/FinanEdiAzul1.svg","contentUrl":"https:\/\/finanedi.es\/blog\/contenido\/uploads\/2024\/02\/FinanEdiAzul1.svg","width":142,"height":36,"caption":"Blog para pymes y aut\u00f3nomos - FinanEDI"},"image":{"@id":"https:\/\/finanedi.es\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/finanedi.es\/blog\/#\/schema\/person\/233ed58195d34f36f74f13ba1030ebd8","name":"restevez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/finanedi.es\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6c4880db9746e4aa887a98e0ebf657788804dc4280120ef10331a2e6ebb4a9a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6c4880db9746e4aa887a98e0ebf657788804dc4280120ef10331a2e6ebb4a9a0?s=96&d=mm&r=g","caption":"restevez"},"url":"https:\/\/finanedi.es\/blog\/author\/restevez\/"}]}},"_links":{"self":[{"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/posts\/10795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/comments?post=10795"}],"version-history":[{"count":6,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/posts\/10795\/revisions"}],"predecessor-version":[{"id":10802,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/posts\/10795\/revisions\/10802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/media\/10799"}],"wp:attachment":[{"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/media?parent=10795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/categories?post=10795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/finanedi.es\/blog\/wp-json\/wp\/v2\/tags?post=10795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}