{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/es\/","title":"Gu\u00eda gratuita: Vulnerabilidades en Microsoft Exchange Server - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vngyXDGWtm\"><a href=\"https:\/\/perseus.de\/es\/guia-gratuita-vulnerabilidades-en-microsoft-exchange-server\/\">Gu\u00eda gratuita: Vulnerabilidades en Microsoft Exchange Server<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/es\/guia-gratuita-vulnerabilidades-en-microsoft-exchange-server\/embed\/#?secret=vngyXDGWtm\" width=\"600\" height=\"338\" title=\"\u00abGu\u00eda gratuita: Vulnerabilidades en Microsoft Exchange Server\u00bb \u2014 Perseus Technologies\" data-secret=\"vngyXDGWtm\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","thumbnail_width":768,"thumbnail_height":589,"description":"Se supo que se han encontrado vulnerabilidades cr\u00edticas de seguridad en el software de transporte de correo electr\u00f3nico \"Microsoft Exchange Server\". Durante este periodo se utiliz\u00f3 especialmente la ayuda de emergencia Perseo. Todas las ideas obtenidas, instrucciones concretas sobre el curso de acci\u00f3n adecuado durante y despu\u00e9s de un incidente, as\u00ed como consejos \u00fatiles sobre c\u00f3mo proteger a\u00fan mejor tu empresa, se encuentran en el informe t\u00e9cnico actual de Perseus."}