<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Hacker Rangers</provider_name><provider_url>https://hackerrangers.siteup.dev/es</provider_url><author_name>Hacker Rangers</author_name><author_url>https://hackerrangers.siteup.dev/es/author/hackerrangers/</author_url><title>Cyberattitudes: How to Measure True Behavioral Change in Cybersecurity | Hacker Rangers</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="xybCWboIpC"&gt;&lt;a href="https://hackerrangers.siteup.dev/es/gamification/cyberattitudes/"&gt;Ciberactitudes: c&#xF3;mo medir el verdadero cambio de comportamiento en ciberseguridad&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hackerrangers.siteup.dev/es/gamification/cyberattitudes/embed/#?secret=xybCWboIpC" width="600" height="338" title="&#xAB;Cyberattitudes: How to Measure True Behavioral Change in Cybersecurity&#xBB; &#x2014; Hacker Rangers" data-secret="xybCWboIpC" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;</html><thumbnail_url>https://hackerrangers.siteup.dev/wp-content/uploads/2025/09/Ciberatitudes.jpg</thumbnail_url><thumbnail_width>1500</thumbnail_width><thumbnail_height>1000</thumbnail_height><description>Cyberattitudes encourage employees to adopt safe practices in their daily routines and turn each action into concrete metrics. Learn how they can help your company track the evolution of its digital security culture.</description></oembed>