{"id":28116,"date":"2025-09-02T12:45:34","date_gmt":"2025-09-02T10:45:34","guid":{"rendered":"https:\/\/perseus.de\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/"},"modified":"2026-03-31T14:32:10","modified_gmt":"2026-03-31T12:32:10","slug":"en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/","title":{"rendered":"En Focus: Inteligencia artificial como vector de ataque, ejemplo: Deepfakes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28116\" class=\"elementor elementor-28116 elementor-24935\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En resumen: la IA ataca usando el ejemplo de los deepfakes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La inteligencia artificial abre nuevas y fascinantes posibilidades, desafortunadamente tambi\u00e9n para los ciberdelincuentes. Cada vez usan m\u00e1s los llamados deepfakes: falsificaciones generadas por IA de v\u00eddeos, im\u00e1genes o voces que se emplean en el entorno laboral para ataques enga\u00f1osamente reales. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-768x768.png\" class=\"attachment-medium_large size-medium_large wp-image-28114\" alt=\"Ilustraci\u00f3n de una cabeza humana con conexiones neuronales que simbolizan la Inteligencia Artificial, con letras grandes &#039;IA&#039;.\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM.png 1024w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 data-start=\"141\" data-end=\"167\">Acontecimientos actuales &#8211; IA y deepfakes &#8211; un peligro creciente<\/h4><p data-start=\"160\" data-end=\"724\">Ahora se pueden crear v\u00eddeos, im\u00e1genes y voces enga\u00f1osamente reales en solo unos minutos gracias a la inteligencia artificial. Para los ciberdelincuentes, los deepfakes han sido durante mucho tiempo una herramienta para da\u00f1ar a las empresas, ya sea mediante fraude, extorsi\u00f3n o manipulaci\u00f3n dirigida. Un an\u00e1lisis reciente de Surfshark muestra lo grave que es la situaci\u00f3n: en el primer trimestre de 2025, ya hubo un 19% m\u00e1s de incidentes de deepfake que en todo 2024.  <\/p><p data-start=\"160\" data-end=\"724\">Nuestro caso de estudio deja claro c\u00f3mo pueden funcionar estos ataques y qu\u00e9 puedes hacer para estar preparado.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a91556 e-flex e-con-boxed e-con e-parent\" data-id=\"4a91556\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c1881d0 e-con-full e-flex e-con e-child\" data-id=\"c1881d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6cad134 e-con-full e-flex e-con e-child\" data-id=\"6cad134\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4f8151 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b4f8151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png\" class=\"attachment-large size-large wp-image-28115\" alt=\"Te sientas frente a tu port\u00e1til y recibes una llamada de tu superior. En la pantalla est\u00e1 la palabra deepfake. Es un ciberataque con IA\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-300x200.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-768x512.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940521b elementor-widget elementor-widget-text-editor\" data-id=\"940521b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Un caso de la pr\u00e1ctica<\/h4>\n<p>Un empleado de contabilidad recibe una videollamada de su director general. Una situaci\u00f3n que ocurre muy a menudo en el trabajo cotidiano. La voz y el rostro me resultan absolutamente familiares.    <br><br>El \u00abjefe\u00bb explica enf\u00e1ticamente que un socio comercial japon\u00e9s espera urgentemente un pago de seis cifras, que debe transferirse hoy mismo. Se hab\u00eda perdido un plazo importante.   <br><br>Bajo presi\u00f3n de tiempo y con la autoridad del supuesto superior, pide al empleado que realice la transferencia inmediatamente y env\u00eda los datos de la cuenta al mismo tiempo.  <br><br>Lo que el empleado no sabe es que la llamada es un deepfake enga\u00f1osamente real que los delincuentes utilizan espec\u00edficamente para intentar desviar fondos de la empresa a una cuenta extranjera fraudulenta.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f2d18b e-flex e-con-boxed e-con e-parent\" data-id=\"8f2d18b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a58566c elementor-widget elementor-widget-text-editor\" data-id=\"a58566c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Descubre en nuestro estudio de caso c\u00f3mo los criminales crean y utilizan deepfakes para enga\u00f1ar a los empleados. Tambi\u00e9n te mostraremos c\u00f3mo desenmascarar los deepfakes y qu\u00e9 medidas puedes tomar para protegerte eficazmente a ti y a tu empresa. <\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Descarga el estudio de caso para aprender:\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\"><li data-start=\"157\" data-end=\"230\"><p data-start=\"159\" data-end=\"230\">\u00bfC\u00f3mo surgen los deepfakes y qu\u00e9 tecnolog\u00edas hay detr\u00e1s de ellos?<\/p><\/li><li data-start=\"231\" data-end=\"339\"><p data-start=\"233\" data-end=\"339\">\u00bfC\u00f3mo utilizan los ciberdelincuentes los deepfakes para enga\u00f1ar a empresas y empleados?<\/p><\/li><li data-start=\"340\" data-end=\"440\"><p data-start=\"342\" data-end=\"440\">\u00bfQu\u00e9 consejos ofrecen nuestros expertos para que las empresas puedan detectar deepfakes de forma fiable?<\/p><\/li><li data-start=\"441\" data-end=\"532\"><p data-start=\"443\" data-end=\"532\">\u00bfQu\u00e9 medidas son necesarias para proteger eficazmente contra este tipo de ataques?<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Begin Brevo Form -->\r\n<!-- START - We recommend to place the below code in head tag of your website html  -->\r\n<style>\r\n  @font-face {\r\n    font-display: block;\r\n    font-family: Roboto;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/7529907e9eaf8ebb5220c5f9850e3811.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/25c678feafdc175a70922a116c9be3e7.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 600;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/6e9caeeafb1f3491be3e32744bc30440.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/71501f0d8d5aa95960f6475d5487d4c2.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 700;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/3ef7cf158f310cf752d5ad08cd0e7e60.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/ece3a1d82f18b60bcce0211725c476aa.woff) format(\"woff\")\r\n  }\r\n\r\n  #sib-container input:-ms-input-placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container input::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container textarea::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container a {\r\n    text-decoration: underline;\r\n    color: #2BB2FC;\r\n  }\r\n<\/style>\r\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\r\n<link rel=\"stylesheet\" href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins&amp;&amp;display=swap\">\r\n<!--  END - We recommend to place the above code in head tag of your website html -->\r\n\r\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\r\n<div class=\"sib-form\" style=\"text-align: center; background-color: #041e42;  \">\r\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\r\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\"\/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n  No se pudo guardar tu acceso. Por favor, int\u00e9ntalo de nuevo. \r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#13ce66;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\"\/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n  Hemos recibido su solicitud. Por favor, revise su bandeja de entrada y verifique su direcci\u00f3n para recibir la gu\u00eda. \r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:540px; border-radius:15px; border-width:0px; border-color:#a8aab8; border-style:solid; direction:ltr\">\r\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAHjCVt9CiJQTo7xPQpAWD30JsOz2gPaqhT3U4xx0u8WTL6IfuD7TUvNV9sAVCQ9zvyRwAJYHUxeZfGXg7Ib8d4yA8MAm5XTz_ixBxnaMJHm23LHpYZ7g2KmaCXbl3mLAq5Q7lWMiXntxBoXwFIA2GApQIivq0ZRp4qTpNWXpFpmvTO0WACVlYTac_iQowEf9RllsANM9kkjf\" data-type=\"subscription\">\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"font-size:32px; text-align:left; font-weight:700; font-family:Poppins, webFonts; color:#041e42; background-color:transparent; text-align:left\">\r\n            <p>Descargar estudio de caso<\/p>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"font-size:16px; text-align:left; font-family:Poppins, webFonts; color:#041e42; background-color:transparent; text-align:left\">\r\n            <div class=\"sib-text-form-block\">\r\n              <p>Simplemente introduce tu direcci\u00f3n de correo electr\u00f3nico y recibir\u00e1s el caso pr\u00e1ctico por correo electr\u00f3nico.<\/p>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 700; text-align:left; font-size:16px; text-align:left; font-weight:700; font-family:Helvetica, sans-serif; color:#041e42;\" for=\"EMAIL\" data-required=\"*\">Direcci\u00f3n de correo electr\u00f3nico<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" placeholder=\"Por favor, entren  \" data-required=\"true\" required=\"\">\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-optin sib-form-block\" data-required=\"true\">\r\n            <div class=\"form__entry entry_mcq\">\r\n              <div class=\"form__label-row \">\r\n                <div class=\"entry__choice\" style=\"\">\r\n                  <label>\r\n                    <input type=\"checkbox\" class=\"input_replaced\" value=\"1\" id=\"OPT_IN\" name=\"OPT_IN\" required=\"\">\r\n                    <span class=\"checkbox checkbox_tick_positive\" style=\"margin-left:\"><\/span><span style=\"font-size:12px; text-align:left; font-family:Poppins, webFonts; color:#3C4858; background-color:transparent;\"><p>La protecci\u00f3n de datos es importante para nosotros. Utilizamos tu informaci\u00f3n para contactarte sobre contenido y servicios relevantes. Puedes darte de baja de cualquier comunicaci\u00f3n en cualquier momento. M\u00e1s informaci\u00f3n www.perseus.de\/datenschutzerklaerung\/.   <\/p><span data-required=\"*\" style=\"display: inline;\" class=\"entry__label entry__label_optin\"><\/span><\/span> <\/label>\r\n                <\/div>\r\n              <\/div>\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n              <label class=\"entry__specification\" style=\"font-size:12px; text-align:left; font-family:Helvetica, sans-serif; color:#a8aab8; text-align:left\">\r\n  Puedes darte de baja del bolet\u00edn en cualquier momento a trav\u00e9s del enlace de nuestro bolet\u00edn.\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-captcha sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <script>\r\n                  function handleCaptchaResponse() {\r\n                    var event = new Event('captchaChange');\r\n                    document.getElementById('sib-captcha').dispatchEvent(event);\r\n                  }\r\n                <\/script>\r\n                <div class=\"g-recaptcha sib-visible-recaptcha\" id=\"sib-captcha\" data-sitekey=\"6Lc3MhopAAAAAAwNvz5u5sHSIiH0DmaVt2IPBWkg\" data-callback=\"handleCaptchaResponse\" style=\"direction:ltr\"><\/div>\r\n              <\/div>\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"text-align: center\">\r\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" style=\"font-size:16px; text-align:center; font-weight:700; font-family:Helvetica, sans-serif; color:#FFFFFF; background-color:#041e42; border-radius:15px; border-width:0px;\" form=\"sib-form\" type=\"submit\">\r\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewbox=\"0 0 512 512\" style=\"\">\r\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\"\/>\r\n              <\/svg>\r\n  ENVIAR\r\n            <\/button>\r\n          <\/div>\r\n        <\/div>\r\n\r\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\r\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\r\n      <\/form>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n<!-- END - We recommend to place the above code where you want the form in your website html  -->\r\n\r\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\r\n<script>\r\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'W\u00e4hle bitte einen L\u00e4ndervorwahl aus.';\r\n  window.LOCALE = 'de';\r\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"Die eingegebenen Informationen sind nicht g\u00fcltig. Bitte \u00fcberpr\u00fcfen Sie das Feld und versuchen Sie es erneut.\";\r\n\r\n  window.REQUIRED_ERROR_MESSAGE = \"Dieses Feld darf nicht leer sein. \";\r\n\r\n  window.GENERIC_INVALID_MESSAGE = \"Die eingegebenen Informationen sind nicht g\u00fcltig. Bitte \u00fcberpr\u00fcfen Sie das Feld und versuchen Sie es erneut.\";\r\n\r\n\r\n\r\n\r\n  window.translation = {\r\n    common: {\r\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\r\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt',\r\n      selectedOption: '{quantity} ausgew\u00e4hlt',\r\n      selectedOptions: '{quantity} ausgew\u00e4hlt',\r\n    }\r\n  };\r\n\r\n  var AUTOHIDE = Boolean(0);\r\n<\/script>\r\n\r\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\r\n\r\n<script src=\"https:\/\/www.google.com\/recaptcha\/api.js?hl=de\"><\/script>\r\n\r\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\r\n<!-- End Brevo Form -->\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La inteligencia artificial abre nuevas y fascinantes posibilidades, desafortunadamente tambi\u00e9n para los ciberdelincuentes. Cada vez usan m\u00e1s los llamados deepfakes: falsificaciones generadas por IA de v\u00eddeos, im\u00e1genes o voces que se emplean en el entorno laboral para ataques enga\u00f1osamente reales. <\/p>\n","protected":false},"author":3,"featured_media":28115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[67],"tags":[],"class_list":["post-28116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-estudios-de-caso"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>En foco: ataques deepfake por IA<\/title>\n<meta name=\"description\" content=\"El estudio de caso muestra c\u00f3mo los atacantes utilizan deepfakes para ataques basados en IA, y qu\u00e9 medidas de protecci\u00f3n deber\u00edan adoptar las empresas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En foco: ataques deepfake por IA\" \/>\n<meta property=\"og:description\" content=\"El estudio de caso muestra c\u00f3mo los atacantes utilizan deepfakes para ataques basados en IA, y qu\u00e9 medidas de protecci\u00f3n deber\u00edan adoptar las empresas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-02T10:45:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:32:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"En Focus: Inteligencia artificial como vector de ataque, ejemplo: Deepfakes\",\"datePublished\":\"2025-09-02T10:45:34+00:00\",\"dateModified\":\"2026-03-31T12:32:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/\"},\"wordCount\":536,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"articleSection\":[\"Estudios de caso\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/\",\"name\":\"En foco: ataques deepfake por IA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"datePublished\":\"2025-09-02T10:45:34+00:00\",\"dateModified\":\"2026-03-31T12:32:10+00:00\",\"description\":\"El estudio de caso muestra c\u00f3mo los atacantes utilizan deepfakes para ataques basados en IA, y qu\u00e9 medidas de protecci\u00f3n deber\u00edan adoptar las empresas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"width\":1536,\"height\":1024,\"caption\":\"Te sientas frente a tu port\u00e1til y recibes una llamada de tu superior. En la pantalla est\u00e1 la palabra deepfake. Es un ciberataque con IA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En Focus: Inteligencia artificial como vector de ataque, ejemplo: Deepfakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En foco: ataques deepfake por IA","description":"El estudio de caso muestra c\u00f3mo los atacantes utilizan deepfakes para ataques basados en IA, y qu\u00e9 medidas de protecci\u00f3n deber\u00edan adoptar las empresas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/","og_locale":"es_ES","og_type":"article","og_title":"En foco: ataques deepfake por IA","og_description":"El estudio de caso muestra c\u00f3mo los atacantes utilizan deepfakes para ataques basados en IA, y qu\u00e9 medidas de protecci\u00f3n deber\u00edan adoptar las empresas.","og_url":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/","og_site_name":"Perseus Technologies","article_published_time":"2025-09-02T10:45:34+00:00","article_modified_time":"2026-03-31T12:32:10+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"En Focus: Inteligencia artificial como vector de ataque, ejemplo: Deepfakes","datePublished":"2025-09-02T10:45:34+00:00","dateModified":"2026-03-31T12:32:10+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/"},"wordCount":536,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","articleSection":["Estudios de caso"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/","url":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/","name":"En foco: ataques deepfake por IA","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","datePublished":"2025-09-02T10:45:34+00:00","dateModified":"2026-03-31T12:32:10+00:00","description":"El estudio de caso muestra c\u00f3mo los atacantes utilizan deepfakes para ataques basados en IA, y qu\u00e9 medidas de protecci\u00f3n deber\u00edan adoptar las empresas.","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","width":1536,"height":1024,"caption":"Te sientas frente a tu port\u00e1til y recibes una llamada de tu superior. En la pantalla est\u00e1 la palabra deepfake. Es un ciberataque con IA"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/en-focus-inteligencia-artificial-como-vector-de-ataque-ejemplo-deepfakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"En Focus: Inteligencia artificial como vector de ataque, ejemplo: Deepfakes"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/28116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=28116"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/28116\/revisions"}],"predecessor-version":[{"id":28117,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/28116\/revisions\/28117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media\/28115"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=28116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=28116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=28116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}