{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/es\/","title":"Cuando los hackers hackean hackers - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6N7oGwgAGQ\"><a href=\"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/\">Cuando los hackers hackean hackers<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/embed\/#?secret=6N7oGwgAGQ\" width=\"600\" height=\"338\" title=\"\u00abCuando los hackers hackean hackers\u00bb \u2014 Perseus Technologies\" data-secret=\"6N7oGwgAGQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","thumbnail_width":730,"thumbnail_height":412,"description":"13.03.2020 Cuando los hackers hackean hackers Ciberseguridad | Hacker | Ciberdelito De forma excepcional, los ciberdelincuentes tambi\u00e9n se hackean entre s\u00ed. Pero eso no es motivo para respirar aliviado. La imagen com\u00fan de los hackers es la de expertos inform\u00e1ticos que desarrollan y distribuyen malware como autores an\u00f3nimos y solitarios. Pero incluso entre los ciberdelincuentes, [&hellip;]"}