{"id":27662,"date":"2020-03-13T16:22:00","date_gmt":"2020-03-13T15:22:00","guid":{"rendered":"https:\/\/perseus.de\/cuando-los-hackers-hackean-hackers\/"},"modified":"2026-03-30T17:44:14","modified_gmt":"2026-03-30T15:44:14","slug":"cuando-los-hackers-hackean-hackers","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/","title":{"rendered":"Cuando los hackers hackean hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27662\" class=\"elementor elementor-27662 elementor-23194\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27634\" alt=\"Tarjeta de cr\u00e9dito hacker\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36960a0 e-flex e-con-boxed e-con e-parent\" data-id=\"36960a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-40fcb2c e-con-full e-flex e-con e-child\" data-id=\"40fcb2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-daca2bd e-con-full e-flex e-con e-child\" data-id=\"daca2bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf41c0a elementor-widget elementor-widget-text-editor\" data-id=\"cf41c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>13.03.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b999df5 elementor-widget elementor-widget-heading\" data-id=\"b999df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cuando los hackers hackean hackers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee19593 elementor-widget elementor-widget-text-editor\" data-id=\"ee19593\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ciberseguridad | Hacker | Ciberdelito<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb7d217 e-con-full e-flex e-con e-child\" data-id=\"eb7d217\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4979fa elementor-widget elementor-widget-text-editor\" data-id=\"d4979fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>De forma excepcional, los ciberdelincuentes tambi\u00e9n se hackean entre s\u00ed. Pero eso no es motivo para respirar aliviado. <\/strong><\/p><p>La imagen com\u00fan de los hackers es la de expertos inform\u00e1ticos que desarrollan y distribuyen malware como autores an\u00f3nimos y solitarios. Pero incluso entre los ciberdelincuentes, \u00bfpor qu\u00e9 reinventar la rueda innecesariamente? Y muchos en esta industria ilegal trabajan con herramientas que no han desarrollado por s\u00ed mismos.  <\/p><p>Un grupo de hackers ha aprovechado ahora este hecho. Proporcionaron a otros hackers herramientas comunes contra el cibercrimen, pero en las que a su vez ocultaron un troyano. El troyano de acceso remoto (RAT) llamado \u00abnjRat\u00bb fue descubierto por los expertos en ciberseguridad de Cyberreason.  <\/p><p>Pero cualquiera que piense que los hackers se est\u00e1n enfrentando entre s\u00ed y dejan en paz a sus v\u00edctimas est\u00e1 equivocado. Al fin y al cabo, el objetivo sigue siendo penetrar ilegalmente en los sistemas inform\u00e1ticos de empresas y particulares. La \u00fanica diferencia es que el delincuente que inyecta el malware no obtiene nada al final, porque una vez dentro, el hacker que le proporcion\u00f3 el malware toma el control. Desafortunadamente, esto no cambia nada para la v\u00edctima: los hackers ahora tienen acceso a su ordenador, pueden robar datos sensibles e infiltrarse y usar otros malwares.   <\/p><p>Puedes leer el informe completo de <a href=\"https:\/\/www.cybereason.com\/blog\/research\/whos-hacking-the-hackers-no-honor-among-thieves\">Cyberreason aqu\u00ed<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>13.03.2020 Cuando los hackers hackean hackers Ciberseguridad | Hacker | Ciberdelito De forma excepcional, los ciberdelincuentes tambi\u00e9n se hackean entre s\u00ed. Pero eso no es motivo para respirar aliviado. La imagen com\u00fan de los hackers es la de expertos inform\u00e1ticos que desarrollan y distribuyen malware como autores an\u00f3nimos y solitarios. Pero incluso entre los ciberdelincuentes, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27634,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-27662","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cuando los hackers hackean hackers - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cuando los hackers hackean hackers - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"13.03.2020 Cuando los hackers hackean hackers Ciberseguridad | Hacker | Ciberdelito De forma excepcional, los ciberdelincuentes tambi\u00e9n se hackean entre s\u00ed. Pero eso no es motivo para respirar aliviado. La imagen com\u00fan de los hackers es la de expertos inform\u00e1ticos que desarrollan y distribuyen malware como autores an\u00f3nimos y solitarios. Pero incluso entre los ciberdelincuentes, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-13T15:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T15:44:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Cuando los hackers hackean hackers\",\"datePublished\":\"2020-03-13T15:22:00+00:00\",\"dateModified\":\"2026-03-30T15:44:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/\"},\"wordCount\":236,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/\",\"name\":\"Cuando los hackers hackean hackers - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"datePublished\":\"2020-03-13T15:22:00+00:00\",\"dateModified\":\"2026-03-30T15:44:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"width\":730,\"height\":412,\"caption\":\"Tarjeta de cr\u00e9dito hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cuando-los-hackers-hackean-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cuando los hackers hackean hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cuando los hackers hackean hackers - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/","og_locale":"es_ES","og_type":"article","og_title":"Cuando los hackers hackean hackers - Perseus Technologies","og_description":"13.03.2020 Cuando los hackers hackean hackers Ciberseguridad | Hacker | Ciberdelito De forma excepcional, los ciberdelincuentes tambi\u00e9n se hackean entre s\u00ed. Pero eso no es motivo para respirar aliviado. La imagen com\u00fan de los hackers es la de expertos inform\u00e1ticos que desarrollan y distribuyen malware como autores an\u00f3nimos y solitarios. Pero incluso entre los ciberdelincuentes, [&hellip;]","og_url":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/","og_site_name":"Perseus Technologies","article_published_time":"2020-03-13T15:22:00+00:00","article_modified_time":"2026-03-30T15:44:14+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Anastasia Pamoukis","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Cuando los hackers hackean hackers","datePublished":"2020-03-13T15:22:00+00:00","dateModified":"2026-03-30T15:44:14+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/"},"wordCount":236,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/","url":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/","name":"Cuando los hackers hackean hackers - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","datePublished":"2020-03-13T15:22:00+00:00","dateModified":"2026-03-30T15:44:14+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","width":730,"height":412,"caption":"Tarjeta de cr\u00e9dito hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/cuando-los-hackers-hackean-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Cuando los hackers hackean hackers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/es\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27662"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27662\/revisions"}],"predecessor-version":[{"id":27663,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27662\/revisions\/27663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media\/27634"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}