{"id":13582,"date":"2025-01-03T14:50:14","date_gmt":"2025-01-03T13:50:14","guid":{"rendered":"https:\/\/oti.unp.edu.pe\/?p=13582"},"modified":"2025-01-03T14:59:22","modified_gmt":"2025-01-03T13:59:22","slug":"estafas-digitales-este-es-el-ciberataque-que-mas-amenazara-al-mundo-en-el-ano-2025","status":"publish","type":"post","link":"https:\/\/oti.unp.edu.pe\/?p=13582","title":{"rendered":"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13582\" class=\"elementor elementor-13582\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e3d044 e-flex e-con-boxed e-con e-parent\" data-id=\"3e3d044\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2a607e elementor-widget elementor-widget-text-editor\" data-id=\"e2a607e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><em><strong>Referencia: <a href=\"https:\/\/www.infobae.com\/tecno\/2025\/01\/02\/estafas-digitales-este-es-el-ciberataque-que-mas-amenazara-al-mundo-en-el-ano-2025\/\" target=\"_blank\" rel=\"noopener\">Infobae<\/a><\/strong><\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a79240c elementor-widget elementor-widget-text-editor\" data-id=\"a79240c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\">Un informe reciente de Google Cloud Security alerta sobre el aumento del ransomware\u00a0como una de las principales amenazas de ciberseguridad para 2025. Este tipo de ataque, que cifra los archivos de las v\u00edctimas y exige un rescate para desbloquearlos, se est\u00e1 volviendo m\u00e1s sofisticado gracias a los avances en inteligencia artificial (IA).<\/div><div data-testid=\"paragraph-0\"><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Esta tecnolog\u00eda est\u00e1 siendo utilizada para personalizar los ataques y para hacerlos m\u00e1s dif\u00edciles de detectar, planteando un desaf\u00edo importante para las defensas del mundo moderno.<\/p><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\"><b>La preocupaci\u00f3n se intensifica por el impacto de estos ataques en sectores esenciales como la salud, el comercio y las finanzas<\/b>, que ya sufrieron importantes afectaciones en 2024. Adem\u00e1s, el ransomware est\u00e1 expandi\u00e9ndose a regiones con sistemas de seguridad menos desarrollados, lo que subraya la urgencia de una cooperaci\u00f3n global.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37a7a37 elementor-widget elementor-widget-image\" data-id=\"37a7a37\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"533\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/AXN44MBMRCC7RVOORPT6ZC5MRQ.jpg\" class=\"attachment-large size-large wp-image-13586\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/AXN44MBMRCC7RVOORPT6ZC5MRQ.jpg 992w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/AXN44MBMRCC7RVOORPT6ZC5MRQ-300x200.jpg 300w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/AXN44MBMRCC7RVOORPT6ZC5MRQ-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05da666 elementor-widget elementor-widget-text-editor\" data-id=\"05da666\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>En este contexto, Google Cloud Security enfatiza la importancia de adoptar medidas preventivas y fortalecer la colaboraci\u00f3n entre gobiernos, expertos y empresas para mitigar esta creciente amenaza.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecfe119 elementor-widget elementor-widget-heading\" data-id=\"ecfe119\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es el ransomware y c\u00f3mo ataca a nivel global?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6064576 elementor-widget elementor-widget-text-editor\" data-id=\"6064576\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div data-testid=\"paragraph-0\"><b>El ransomware es un tipo de malware que encripta los datos de las v\u00edctimas, bloqueando su acceso hasta que se pague un rescate, generalmente en criptomonedas.<\/b>\u00a0Los atacantes emplean tambi\u00e9n estrategias de doble extorsi\u00f3n, amenazando con filtrar informaci\u00f3n confidencial si no se cumplen sus demandas.<\/div><div data-testid=\"paragraph-0\">Este tipo de ataque explota vulnerabilidades en los sistemas de seguridad,\u00a0<b>ingresando a trav\u00e9s de errores humanos como hacer clic en enlaces maliciosos o descargar archivos comprometidos.<\/b><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5513b3 elementor-widget elementor-widget-image\" data-id=\"a5513b3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"489\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Z3K5TGQ4W5ENXFIHHMIDZIVTMA.jpg\" class=\"attachment-large size-large wp-image-13585\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Z3K5TGQ4W5ENXFIHHMIDZIVTMA.jpg 992w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Z3K5TGQ4W5ENXFIHHMIDZIVTMA-300x183.jpg 300w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Z3K5TGQ4W5ENXFIHHMIDZIVTMA-768x469.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c184431 elementor-widget elementor-widget-text-editor\" data-id=\"c184431\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p>La naturaleza lucrativa del ransomware ha llevado a su adopci\u00f3n masiva por parte de grupos delictivos organizados que ahora cuentan con herramientas tecnol\u00f3gicas avanzadas para maximizar su impacto.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d7022a elementor-widget elementor-widget-heading\" data-id=\"3d7022a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo impacta la inteligencia artificial en el ransomware?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e44a46 elementor-widget elementor-widget-text-editor\" data-id=\"7e44a46\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\"><b>La inteligencia artificial ha permitido a los ciberdelincuentes desarrollar ataques m\u00e1s personalizados y dif\u00edciles de detectar.<\/b>\u00a0Los sistemas de IA pueden analizar grandes vol\u00famenes de datos para identificar vulnerabilidades espec\u00edficas, adaptando el malware a cada objetivo.<\/p><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Adem\u00e1s, la automatizaci\u00f3n que ofrece la IA reduce el tiempo necesario para ejecutar un ataque,<b>\u00a0permitiendo a los atacantes lanzar campa\u00f1as simult\u00e1neas a gran escala.<\/b>\u00a0Estas capacidades hacen que las soluciones de seguridad tradicionales resulten insuficientes frente a un panorama de amenazas cada vez m\u00e1s complejo.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8998f8c elementor-widget elementor-widget-heading\" data-id=\"8998f8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfCu\u00e1les sectores son los m\u00e1s vulnerables a esta amenaza?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2d1a14 elementor-widget elementor-widget-image\" data-id=\"a2d1a14\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"450\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/4OUCYP6G6NFYBM2ORRUJDCNXXU.jpg\" class=\"attachment-large size-large wp-image-13584\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/4OUCYP6G6NFYBM2ORRUJDCNXXU.jpg 992w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/4OUCYP6G6NFYBM2ORRUJDCNXXU-300x169.jpg 300w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/4OUCYP6G6NFYBM2ORRUJDCNXXU-768x432.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109ac46 elementor-widget elementor-widget-text-editor\" data-id=\"109ac46\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">En 2024,\u00a0los sectores m\u00e1s afectados por el ransomware incluyeron la salud, el comercio y las finanzas.\u00a0Estos \u00e1mbitos son atractivos para los atacantes por la sensibilidad de la informaci\u00f3n que manejan y la urgencia con la que deben operar.<\/p><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\"><b>Un ataque a un hospital puede interrumpir servicios cr\u00edticos, poniendo en riesgo vidas humanas<\/b>, mientras que en el comercio y las finanzas, las interrupciones generan p\u00e9rdidas econ\u00f3micas significativas. Estos sectores deben reforzar sus sistemas de seguridad y priorizar la educaci\u00f3n de empleados para mitigar el riesgo.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2264aab elementor-widget elementor-widget-heading\" data-id=\"2264aab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 medidas preventivas existen?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52e1a10 elementor-widget elementor-widget-text-editor\" data-id=\"52e1a10\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p>Google Cloud Security destaca la importancia de implementar sistemas de respaldo de datos, mantener actualizados los softwares y adoptar soluciones de seguridad avanzadas.\u00a0<b>Estas medidas ayudan a minimizar los da\u00f1os en caso de un ataque y a dificultar la acci\u00f3n de los ciberdelincuentes.<\/b><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a23a024 elementor-widget elementor-widget-image\" data-id=\"a23a024\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"450\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/ASYXXTF2WRGK3DAH622JBFYVNI.jpg\" class=\"attachment-large size-large wp-image-13583\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/ASYXXTF2WRGK3DAH622JBFYVNI.jpg 992w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/ASYXXTF2WRGK3DAH622JBFYVNI-300x169.jpg 300w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/ASYXXTF2WRGK3DAH622JBFYVNI-768x432.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27178b8 elementor-widget elementor-widget-text-editor\" data-id=\"27178b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p>La educaci\u00f3n juega un papel crucial. Capacitar a empleados y usuarios sobre pr\u00e1cticas seguras en el manejo de informaci\u00f3n digital reduce los errores humanos que son el punto de entrada.\u00a0<b>La inversi\u00f3n en seguridad cibern\u00e9tica es clave para prevenir interrupciones operativas y proteger la reputaci\u00f3n de las organizaciones.<\/b><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-398597a elementor-widget elementor-widget-heading\" data-id=\"398597a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo deben actuar las autoridades?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5f82e1 elementor-widget elementor-widget-text-editor\" data-id=\"e5f82e1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\" data-testid=\"paragraph-0\"><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">El informe resalta que la cooperaci\u00f3n global es esencial para combatir el ransomware. Esto incluye el intercambio de informaci\u00f3n sobre amenazas,\u00a0<b>el desarrollo de marcos regulatorios y el fortalecimiento de capacidades de respuesta ante incidentes.<\/b><\/p><p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Gobiernos, empresas y expertos en ciberseguridad deben trabajar juntos para crear estrategias integrales que enfrenten esta problem\u00e1tica. La colaboraci\u00f3n no solo mejora la detecci\u00f3n y respuesta a ataques, sino que tambi\u00e9n ayuda a desincentivar a los atacantes al aumentar los riesgos asociados a sus actividades.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Referencia: Infobae Un informe reciente de Google Cloud Security alerta<\/p>\n","protected":false},"author":1,"featured_media":13587,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52,58,5],"tags":[11,9],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025 - Oficina de Tecnolog\u00eda de Informaci\u00f3n<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oti.unp.edu.pe\/?p=13582\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025 - Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Referencia: Infobae Un informe reciente de Google Cloud Security alerta\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oti.unp.edu.pe\/?p=13582\" \/>\n<meta property=\"og:site_name\" content=\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T13:50:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T13:59:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"992\" \/>\n\t<meta property=\"og:image:height\" content=\"558\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#article\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\"},\"headline\":\"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025\",\"datePublished\":\"2025-01-03T13:50:14+00:00\",\"dateModified\":\"2025-01-03T13:59:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg\",\"keywords\":[\"Informaci\u00f3n\",\"O.T.I.\"],\"articleSection\":[\"Mundo\",\"Seguridad Inform\u00e1tica\",\"Tecnolog\u00eda\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582\",\"url\":\"https:\/\/oti.unp.edu.pe\/?p=13582\",\"name\":\"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025 - Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg\",\"datePublished\":\"2025-01-03T13:50:14+00:00\",\"dateModified\":\"2025-01-03T13:59:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/oti.unp.edu.pe\/?p=13582\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg\",\"width\":992,\"height\":558},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=13582#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/oti.unp.edu.pe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/oti.unp.edu.pe\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"width\":736,\"height\":385,\"caption\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"sameAs\":[\"https:\/\/oti.unp.edu.pe\/webotiunp\"],\"url\":\"https:\/\/oti.unp.edu.pe\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025 - Oficina de Tecnolog\u00eda de Informaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oti.unp.edu.pe\/?p=13582","og_locale":"es_ES","og_type":"article","og_title":"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025 - Oficina de Tecnolog\u00eda de Informaci\u00f3n","og_description":"Referencia: Infobae Un informe reciente de Google Cloud Security alerta","og_url":"https:\/\/oti.unp.edu.pe\/?p=13582","og_site_name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","article_published_time":"2025-01-03T13:50:14+00:00","article_modified_time":"2025-01-03T13:59:22+00:00","og_image":[{"width":992,"height":558,"url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"desarrollo","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oti.unp.edu.pe\/?p=13582#article","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13582"},"author":{"name":"desarrollo","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c"},"headline":"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025","datePublished":"2025-01-03T13:50:14+00:00","dateModified":"2025-01-03T13:59:22+00:00","mainEntityOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13582"},"wordCount":698,"publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg","keywords":["Informaci\u00f3n","O.T.I."],"articleSection":["Mundo","Seguridad Inform\u00e1tica","Tecnolog\u00eda"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/oti.unp.edu.pe\/?p=13582","url":"https:\/\/oti.unp.edu.pe\/?p=13582","name":"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025 - Oficina de Tecnolog\u00eda de Informaci\u00f3n","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg","datePublished":"2025-01-03T13:50:14+00:00","dateModified":"2025-01-03T13:59:22+00:00","breadcrumb":{"@id":"https:\/\/oti.unp.edu.pe\/?p=13582#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oti.unp.edu.pe\/?p=13582"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/?p=13582#primaryimage","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/FFLZ5BISFRESFH4C6C2WZSIIHM.jpg","width":992,"height":558},{"@type":"BreadcrumbList","@id":"https:\/\/oti.unp.edu.pe\/?p=13582#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/oti.unp.edu.pe\/"},{"@type":"ListItem","position":2,"name":"Estafas digitales: este es el ciberataque que m\u00e1s amenazar\u00e1 al mundo en el a\u00f1o 2025"}]},{"@type":"WebSite","@id":"https:\/\/oti.unp.edu.pe\/#website","url":"https:\/\/oti.unp.edu.pe\/","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","description":"","publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oti.unp.edu.pe\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/oti.unp.edu.pe\/#organization","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","url":"https:\/\/oti.unp.edu.pe\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","width":736,"height":385,"caption":"Oficina de Tecnolog\u00eda de Informaci\u00f3n"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","caption":"desarrollo"},"sameAs":["https:\/\/oti.unp.edu.pe\/webotiunp"],"url":"https:\/\/oti.unp.edu.pe\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13582"}],"collection":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13582"}],"version-history":[{"count":4,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13582\/revisions"}],"predecessor-version":[{"id":13591,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/13582\/revisions\/13591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/media\/13587"}],"wp:attachment":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}