{"id":27635,"date":"2020-07-22T16:31:00","date_gmt":"2020-07-22T14:31:00","guid":{"rendered":"https:\/\/perseus.de\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/"},"modified":"2026-03-30T17:41:37","modified_gmt":"2026-03-30T15:41:37","slug":"twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/","title":{"rendered":"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27635\" class=\"elementor elementor-27635 elementor-23214\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Twitter-Hack.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27633\" alt=\"Port\u00e1til de Twitter\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Twitter-Hack.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Twitter-Hack-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Fuente de la imagen: Youcel Moran v\u00eda Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3582b53d e-flex e-con-boxed e-con e-parent\" data-id=\"3582b53d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-882819f e-con-full e-flex e-con e-child\" data-id=\"882819f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4424d2e e-con-full e-flex e-con e-child\" data-id=\"4424d2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fb1c9e elementor-widget elementor-widget-text-editor\" data-id=\"3fb1c9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>22.07.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b55f1 elementor-widget elementor-widget-heading\" data-id=\"f3b55f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0ea747 elementor-widget elementor-widget-text-editor\" data-id=\"f0ea747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ciberseguridad | Hacker | Ciberdelito<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce28679 e-con-full e-flex e-con e-child\" data-id=\"ce28679\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c01e25f elementor-widget elementor-widget-text-editor\" data-id=\"c01e25f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Un nombre es m\u00e1s conocido que el otro. La semana pasada, hackers hackearon cuentas verificadas de numerosas celebridades y tuitearon sobre acuerdos cuestionables con criptomonedas a trav\u00e9s de sus perfiles de Twitter. <\/strong><\/p><p>Entre las v\u00edctimas estaban el rapero estadounidense Kanye West, el CEO de Amazon Jeff Bezos, el expresidente de EE. UU. Barack Obama, el candidato presidencial Joe Biden y los gigantes tecnol\u00f3gicos Bill Gates y Elon Musk.<\/p><p>La publicaci\u00f3n estadounidense <a href=\"https:\/\/www.vice.com\/en\/article\/jgxd3d\/twitter-insider-access-panel-account-hacks-biden-uber-bezos\">Motherboard <\/a>ahora asume que los hackers enga\u00f1aron a empleados de Twitter para que te dieran el control sobre las cuentas en cuesti\u00f3n. Aunque probablemente sea un \u00abtrabajo interno\u00bb, sigue surgiendo la pregunta: \u00bfQu\u00e9 tan seguros son realmente los perfiles de redes sociales y c\u00f3mo puedes protegerte mejor de un posible hackeo? <\/p><p>Si miras en el centro de ayuda de Twitter, encontrar\u00e1s una publicaci\u00f3n sobre el tema \u00abMi cuenta ha sido hackeada\u00bb tras una breve b\u00fasqueda. No solo personalidades conocidas o grandes cuentas verificadas son atacadas por hackers: cada usuario puede convertirse en el foco de los ciberdelincuentes. Para ahorrarte los problemas que sigue, los expertos en ciberseguridad de Perseus aconsejan:  <\/p><p>\u00abUsa contrase\u00f1as complejas que tambi\u00e9n ajustes a intervalos regulares. Tambi\u00e9n es importante que actives la autenticaci\u00f3n de dos pasos. Por supuesto, esto no es una panacea contra los ciberataques, pero act\u00faa como una buena herramienta de seguridad frente a accesos no deseados.\u00bb<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Fuente de la imagen: Youcel Moran v\u00eda Unsplash 22.07.2020 #TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging Ciberseguridad | Hacker | Ciberdelito Un nombre es m\u00e1s conocido que el otro. La semana pasada, hackers hackearon cuentas verificadas de numerosas celebridades y tuitearon sobre acuerdos cuestionables con criptomonedas a trav\u00e9s de sus perfiles [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27634,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-27635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Fuente de la imagen: Youcel Moran v\u00eda Unsplash 22.07.2020 #TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging Ciberseguridad | Hacker | Ciberdelito Un nombre es m\u00e1s conocido que el otro. La semana pasada, hackers hackearon cuentas verificadas de numerosas celebridades y tuitearon sobre acuerdos cuestionables con criptomonedas a trav\u00e9s de sus perfiles [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T14:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T15:41:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging\",\"datePublished\":\"2020-07-22T14:31:00+00:00\",\"dateModified\":\"2026-03-30T15:41:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/\"},\"wordCount\":271,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/\",\"name\":\"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"datePublished\":\"2020-07-22T14:31:00+00:00\",\"dateModified\":\"2026-03-30T15:41:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"width\":730,\"height\":412,\"caption\":\"Tarjeta de cr\u00e9dito hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/","og_locale":"es_ES","og_type":"article","og_title":"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging - Perseus Technologies","og_description":"Fuente de la imagen: Youcel Moran v\u00eda Unsplash 22.07.2020 #TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging Ciberseguridad | Hacker | Ciberdelito Un nombre es m\u00e1s conocido que el otro. La semana pasada, hackers hackearon cuentas verificadas de numerosas celebridades y tuitearon sobre acuerdos cuestionables con criptomonedas a trav\u00e9s de sus perfiles [&hellip;]","og_url":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/","og_site_name":"Perseus Technologies","article_published_time":"2020-07-22T14:31:00+00:00","article_modified_time":"2026-03-30T15:41:37+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Anastasia Pamoukis","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging","datePublished":"2020-07-22T14:31:00+00:00","dateModified":"2026-03-30T15:41:37+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/"},"wordCount":271,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/","url":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/","name":"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","datePublished":"2020-07-22T14:31:00+00:00","dateModified":"2026-03-30T15:41:37+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","width":730,"height":412,"caption":"Tarjeta de cr\u00e9dito hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/twitterhacked-ataque-sin-precedentes-de-ciberdelincuentes-al-servicio-de-microblogging\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"#TwitterHacked \u2013 ataque sin precedentes de ciberdelincuentes al servicio de microblogging"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/es\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27635"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27635\/revisions"}],"predecessor-version":[{"id":27636,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27635\/revisions\/27636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media\/27634"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}