{"id":201727,"date":"2026-05-12T22:50:09","date_gmt":"2026-05-12T22:50:09","guid":{"rendered":"http:\/\/6a039a8965ac43258fef18f3"},"modified":"2026-05-12T22:50:09","modified_gmt":"2026-05-12T22:50:09","slug":"google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero","status":"publish","type":"post","link":"https:\/\/sarmiento24h.com\/?p=201727","title":{"rendered":"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero"},"content":{"rendered":"<p>El Grupo de Inteligencia de Amenazas de Google (GTIG, por sus siglas en ingl\u00e9s) asegura que identific\u00f3 por primera vez un <em>exploit<\/em> de d\u00eda cero desarrollado con ayuda de un sistema de inteligencia artificial (IA). El hallazgo surge en un contexto en el que el uso de modelos avanzados en materia de ciberseguridad genera cada vez m\u00e1s preocupaci\u00f3n ante la creciente sofisticaci\u00f3n de los ataques inform\u00e1ticos.<\/p>\n<p>El informe de la unidad especializada detalla que \u201cimportantes ciberdelincuentes\u201d intentaron emplear este <em>exploit<\/em> de d\u00eda cero para ejecutar un ataque que les habr\u00eda permitido vulnerar los mecanismos de <a href=\"https:\/\/es.wired.com\/articulos\/google-authenticator-estrena-practica-herramienta-de-autenticacion-de-dos-factores\">autenticaci\u00f3n de dos pasos (2FA)<\/a> en una herramienta de administraci\u00f3n de sistemas <em>web<\/em> de c\u00f3digo abierto cuya identidad no fue revelada.<\/p>\n<hr>\n<div class=\"ContentCardEmbedWrapper-hkvhYu kMYDit content-card-embed content-card-embed--stacked\" data-testid=\"ContentCardEmbedWrapper\" readability=\"21.853658536585\">\n<div class=\"ContentCardEmbedImage-bqahne fjmzkP content-card-embed__image\" data-testid=\"ContentCardEmbedImage\"><span class=\"SpanWrapper-kFnjvc eKnjjD responsive-asset\"><picture class=\"ResponsiveImagePicture-jKunQM gjCCFj responsive-image\"><img decoding=\"async\" alt=\"Sam Altman\" loading=\"lazy\" class=\"ResponsiveImageContainer-dkeESL cQPiWi responsive-image__image\" srcset=\"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_120,c_limit\/GettyImages-2265991537.jpg 120w, https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_240,c_limit\/GettyImages-2265991537.jpg 240w, https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_320,c_limit\/GettyImages-2265991537.jpg 320w, https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_640,c_limit\/GettyImages-2265991537.jpg 640w\" sizes=\"100vw\" src=\"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_775%2Cc_limit\/GettyImages-2265991537.jpg\"><\/picture><\/span><\/div>\n<div class=\"ContentCardEmbedInfo-buyHWH gWLOee\" readability=\"23.219512195122\">\n<div class=\"BaseText-fEwdHD ContentCardEmbedHed-kDKGDs fUtEc dlHXUJ content-card-embed__hed\" data-testid=\"ContentCardEmbedHed\"><a class=\"BaseLink-haTOKm ContentCardEmbedHedLink-iBZsco gAoKdC hhUFQU content-card-embed__hed-link link\" href=\"https:\/\/es.wired.com\/articulos\/openai-responde-a-mythos-con-su-propio-modelo-de-ciberseguridad-gpt-54-cyber\" data-testid=\"ContentCardEmbedHedLink\">OpenAI responde a Mythos con su propio modelo de ciberseguridad: GPT-5.4-Cyber<\/a><\/div>\n<p>OpenAI asegura que sus barreras \u00abreducen suficientemente el riesgo cibern\u00e9tico\u00bb por ahora, mientras que GPT-5.4-Cyber es un nuevo modelo centrado en la ciberseguridad.<\/p>\n<\/div>\n<\/div>\n<hr>\n<p>El <em>malware<\/em>, escrito en el lenguaje de programaci\u00f3n Python, fue dise\u00f1ado para explotar un \u201cfallo de l\u00f3gica sem\u00e1ntica de alto nivel\u201d dentro del sistema objetivo. Esta vulnerabilidad, <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/ai-vulnerability-exploitation-initial-access\">de acuerdo con los especialistas<\/a>, deriv\u00f3 de una suposici\u00f3n de confianza por parte de los desarrolladores, quienes asumieron que determinadas acciones o datos siempre ser\u00edan leg\u00edtimos o seguros. Como resultado, el <em>software<\/em> omit\u00eda ciertas verificaciones esenciales, lo que termin\u00f3 generando un vac\u00edo de seguridad.<\/p>\n<p>El equipo de Google detect\u00f3 diversos indicios que apuntaban al uso de inteligencia artificial en la creaci\u00f3n del c\u00f3digo malicioso. Entre las se\u00f1ales encontradas figuraba una \u201cpuntuaci\u00f3n CVSS ficticia\u201d, un indicador normalmente utilizado para medir la gravedad de las fallas de seguridad. A ello se a\u00f1adi\u00f3 un estilo de programaci\u00f3n excesivamente estructurado y convencional, rasgo que suele aparecer en contenidos generados por modelos de IA.<\/p>\n<p>La tecnol\u00f3gica afirma que logr\u00f3 interrumpir el avance de esta vulnerabilidad. No obstante, advierte que el incidente demuestra que <strong>la IA ya se ha convertido en una herramienta relevante para los <em>hackers<\/em><\/strong>, quienes la utilizan para <a href=\"https:\/\/es.wired.com\/articulos\/la-ia-es-cada-vez-mejor-encontrando-vulnerabilidades-y-explotandolas\">identificar y explotar fallos de seguridad<\/a> de manera cada vez m\u00e1s sofisticada.<\/p>\n<p>\u201cLos ciberdelincuentes est\u00e1n utilizando la IA para optimizar diversas fases del ciclo de vida de un ataque. Esto incluye el desarrollo de <em>exploits<\/em> y <em>malware<\/em>, la ejecuci\u00f3n aut\u00f3noma de comandos, la realizaci\u00f3n de reconocimientos m\u00e1s espec\u00edficos y exhaustivos, y la mejora de la eficacia de las operaciones de ingenier\u00eda social y de informaci\u00f3n\u201d, se\u00f1al\u00f3 el GTIG en su informe.<\/p>\n<p>La unidad especializada a\u00f1ade que los atacantes recurren, por ejemplo, al \u201c<em>jailbreaking<\/em> basado en la suplantaci\u00f3n de identidad\u201d para lograr que la IA encuentre vulnerabilidades. Asimismo, alimentan modelos inteligentes con repositorios completos de datos sobre fallos de seguridad y utilizan herramientas como <a href=\"https:\/\/es.wired.com\/articulos\/meta-y-otras-tecnologicas-restringen-openclaw-la-ia-que-puede-tomar-el-control-de-computadoras\">OpenClaw<\/a> de formas que sugieren \u201cun inter\u00e9s en refinar las cargas \u00fatiles generadas por la IA en entornos controlados para aumentar la fiabilidad de los <em>exploits<\/em> antes de su implementaci\u00f3n\u201d.<\/p>\n<h2>La IA en la mira de los <em>hackers<\/em><\/h2>\n<p>El GTIG tambi\u00e9n advierte que la IA no solo se ha convertido en un recurso valioso para los <em>hackers<\/em>, sino que ahora representa uno de los objetivos m\u00e1s atractivos para los atacantes, conforme un mayor n\u00famero de empresas y organizaciones integran sistemas inteligentes <a href=\"https:\/\/es.wired.com\/articulos\/el-gobierno-mexicano-ya-usa-la-ia-pero-no-hay-normas-ni-estrategia\">en operaciones cr\u00edticas<\/a>. \u201cHemos observado que los atacantes se centran cada vez m\u00e1s en los componentes integrados que otorgan utilidad a los sistemas de IA, como las habilidades aut\u00f3nomas y los conectores de datos de terceros\u201d, explic\u00f3 el equipo.<\/p>\n<p>En este contexto, el GTIG concluye que \u201cel potencial de la IA es inmenso. A medida que la innovaci\u00f3n avanza, <strong>la industria necesita est\u00e1ndares de seguridad para desarrollar e implementar la IA de forma responsable<\/strong>\u201d.<\/p>\n<p>Las advertencias de Google llegan en un momento en el que diversos desarrolladores de inteligencia artificial han alertado sobre la capacidad de esta tecnolog\u00eda para planificar, ejecutar y perfeccionar ciberataques complejos.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Grupo de Inteligencia de Amenazas de&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":201728,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[46],"tags":[],"class_list":["post-201727","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero - Sarmiento24h<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sarmiento24h.com\/?p=201727\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero - Sarmiento24h\" \/>\n<meta property=\"og:description\" content=\"El Grupo de Inteligencia de Amenazas de&#046;&#046;&#046;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sarmiento24h.com\/?p=201727\" \/>\n<meta property=\"og:site_name\" content=\"Sarmiento24h\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/s24hnoticias\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-12T22:50:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_775%2Cc_limit\/GettyImages-2265991537.jpg\" \/>\n<meta name=\"author\" content=\"sarmiento24h@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sarmiento24h\" \/>\n<meta name=\"twitter:site\" content=\"@sarmiento24h\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"sarmiento24h@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727\"},\"author\":{\"name\":\"sarmiento24h@gmail.com\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/person\\\/d653a59725ad629a7e0429af7b939d4d\"},\"headline\":\"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero\",\"datePublished\":\"2026-05-12T22:50:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg\",\"articleSection\":[\"Tecnologia\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727\",\"name\":\"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero - Sarmiento24h\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg\",\"datePublished\":\"2026-05-12T22:50:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#primaryimage\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg\",\"width\":775,\"height\":517},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/?p=201727#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sarmiento24h.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#website\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/\",\"name\":\"Sarmiento24h\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sarmiento24h.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#organization\",\"name\":\"Sarmiento24h\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/AddText_12-16-10.30.52.jpg\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/AddText_12-16-10.30.52.jpg\",\"width\":1220,\"height\":324,\"caption\":\"Sarmiento24h\"},\"image\":{\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/s24hnoticias\",\"https:\\\/\\\/x.com\\\/sarmiento24h\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/#\\\/schema\\\/person\\\/d653a59725ad629a7e0429af7b939d4d\",\"name\":\"sarmiento24h@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1778367703\",\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1778367703\",\"contentUrl\":\"https:\\\/\\\/sarmiento24h.com\\\/wp-content\\\/litespeed\\\/avatar\\\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1778367703\",\"caption\":\"sarmiento24h@gmail.com\"},\"sameAs\":[\"https:\\\/\\\/sarmiento24h.com\"],\"url\":\"https:\\\/\\\/sarmiento24h.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero - Sarmiento24h","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sarmiento24h.com\/?p=201727","og_locale":"es_ES","og_type":"article","og_title":"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero - Sarmiento24h","og_description":"El Grupo de Inteligencia de Amenazas de&#46;&#46;&#46;","og_url":"https:\/\/sarmiento24h.com\/?p=201727","og_site_name":"Sarmiento24h","article_publisher":"https:\/\/facebook.com\/s24hnoticias","article_published_time":"2026-05-12T22:50:09+00:00","og_image":[{"url":"https:\/\/media.es.wired.com\/photos\/69dfa1f911486b608489da49\/master\/w_775%2Cc_limit\/GettyImages-2265991537.jpg","type":"","width":"","height":""}],"author":"sarmiento24h@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@sarmiento24h","twitter_site":"@sarmiento24h","twitter_misc":{"Escrito por":"sarmiento24h@gmail.com","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sarmiento24h.com\/?p=201727#article","isPartOf":{"@id":"https:\/\/sarmiento24h.com\/?p=201727"},"author":{"name":"sarmiento24h@gmail.com","@id":"https:\/\/sarmiento24h.com\/#\/schema\/person\/d653a59725ad629a7e0429af7b939d4d"},"headline":"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero","datePublished":"2026-05-12T22:50:09+00:00","mainEntityOfPage":{"@id":"https:\/\/sarmiento24h.com\/?p=201727"},"wordCount":689,"publisher":{"@id":"https:\/\/sarmiento24h.com\/#organization"},"image":{"@id":"https:\/\/sarmiento24h.com\/?p=201727#primaryimage"},"thumbnailUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg","articleSection":["Tecnologia"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/sarmiento24h.com\/?p=201727","url":"https:\/\/sarmiento24h.com\/?p=201727","name":"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero - Sarmiento24h","isPartOf":{"@id":"https:\/\/sarmiento24h.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sarmiento24h.com\/?p=201727#primaryimage"},"image":{"@id":"https:\/\/sarmiento24h.com\/?p=201727#primaryimage"},"thumbnailUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg","datePublished":"2026-05-12T22:50:09+00:00","breadcrumb":{"@id":"https:\/\/sarmiento24h.com\/?p=201727#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sarmiento24h.com\/?p=201727"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/?p=201727#primaryimage","url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg","width":775,"height":517},{"@type":"BreadcrumbList","@id":"https:\/\/sarmiento24h.com\/?p=201727#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sarmiento24h.com\/"},{"@type":"ListItem","position":2,"name":"Google alerta sobre hackers que ya utilizan IA para crear exploits de d\u00eda cero"}]},{"@type":"WebSite","@id":"https:\/\/sarmiento24h.com\/#website","url":"https:\/\/sarmiento24h.com\/","name":"Sarmiento24h","description":"","publisher":{"@id":"https:\/\/sarmiento24h.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sarmiento24h.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sarmiento24h.com\/#organization","name":"Sarmiento24h","url":"https:\/\/sarmiento24h.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/#\/schema\/logo\/image\/","url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2025\/12\/AddText_12-16-10.30.52.jpg","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2025\/12\/AddText_12-16-10.30.52.jpg","width":1220,"height":324,"caption":"Sarmiento24h"},"image":{"@id":"https:\/\/sarmiento24h.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/s24hnoticias","https:\/\/x.com\/sarmiento24h"]},{"@type":"Person","@id":"https:\/\/sarmiento24h.com\/#\/schema\/person\/d653a59725ad629a7e0429af7b939d4d","name":"sarmiento24h@gmail.com","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1778367703","url":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1778367703","contentUrl":"https:\/\/sarmiento24h.com\/wp-content\/litespeed\/avatar\/d02cbc4e23c747e6659cd45907173c8f.jpg?ver=1778367703","caption":"sarmiento24h@gmail.com"},"sameAs":["https:\/\/sarmiento24h.com"],"url":"https:\/\/sarmiento24h.com\/?author=1"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/sarmiento24h.com\/wp-content\/uploads\/2026\/05\/google-alerta-sobre-hackers-que-ya-utilizan-ia-para-crear-exploits-de-dia-cero.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts\/201727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=201727"}],"version-history":[{"count":0,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/posts\/201727\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=\/wp\/v2\/media\/201728"}],"wp:attachment":[{"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=201727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=201727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sarmiento24h.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=201727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}