{"id":2023,"date":"2025-12-03T11:52:43","date_gmt":"2025-12-03T14:52:43","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2023"},"modified":"2025-12-03T11:52:43","modified_gmt":"2025-12-03T14:52:43","slug":"cybersecurity-in-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/cybersecurity-in-critical-infrastructure\/","title":{"rendered":"Ciberseguridad: por qu\u00e9 es importante para las infraestructuras cr\u00edticas"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">En d\u00e9cadas pasadas, antes del cambio de milenio, exist\u00eda la creencia de que los servicios \u201ccr\u00edticos\u201d para la sociedad no deber\u00edan estar conectados a internet. Sin embargo, ese pensamiento no resisti\u00f3 a los avances tecnol\u00f3gicos de los \u00faltimos a\u00f1os y, hoy en d\u00eda, la propia internet es una infraestructura cr\u00edtica de la cual dependen muchas empresas y servicios todos los d\u00edas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Analizando la realidad actual, no hay c\u00f3mo negar que las organizaciones ya no tienen c\u00f3mo evitar el tema de la ciberseguridad, que, a su vez, no se puede limitar a la noci\u00f3n de que \u201clos sistemas m\u00e1s cr\u00edticos no est\u00e9n conectados para garantizar que ning\u00fan invasor pueda llegar hasta ellos\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aun cuando un incidente no perjudique directamente a una f\u00e1brica o servicio p\u00fablico, debemos recordar la existencia de servicios de cobros, seguimiento de contratos y servicios financieros, procesos que est\u00e1n conectados a la red y que pueden verse interrumpidos por un ataque cibern\u00e9tico.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Incluso, ya existen casos reales de ese tipo. En 2021, un oleoducto en Estados Unidos paraliz\u00f3 sus operaciones despu\u00e9s de que un malware de rescate (ransomware) interfiriera en el funcionamiento del sistema de contabilidad y cobro. El bombeo de petr\u00f3leo a\u00fan funcionaba, pero no era viable seguir operando sin restaurar el sistema de cobro.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En el sector de log\u00edstica y transporte, un incidente cibern\u00e9tico puede no llegar a afectar las gr\u00faas, camiones, trenes o autobuses, pero, sin duda, puede perjudicar los sistemas de informaci\u00f3n que guardan las listas de pasajeros, documentos fiscales y planes de carga. Un caso de ese tipo ocurri\u00f3 en 2023, cuando un puerto de Jap\u00f3n qued\u00f3 paralizado, tambi\u00e9n por un ransomware, ya que no hab\u00eda posibilidad de registrar las cargas recibidas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En cuanto al sector el\u00e9ctrico, ya se han registrado incidentes de apagones provocados por ataques cibern\u00e9ticos y da\u00f1os f\u00edsicos en usinas de enriquecimiento de uranio. Se cree que esos eventos, que ocurrieron en Ucrania e Ir\u00e1n, respectivamente, estuvieron vinculados a tensiones geopol\u00edticas y fueron provocados por ataques virtuales.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Un sector diverso<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">El t\u00e9rmino \u201cinfraestructura cr\u00edtica\u201d podr\u00eda llevarnos a creer que estamos hablando de un grupo selecto de empresas, pero lo cierto es que diversas organizaciones y ramos de actuaci\u00f3n se consideran cr\u00edticos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As\u00ed, la lista de sectores clasificados de esa manera puede ser m\u00e1s larga de lo que imaginamos. En ese contexto, podemos incluir estos ramos: transporte, salud, gobierno, telecomunicaci\u00f3n, energ\u00eda, alimentaci\u00f3n y agua, servicios de emergencia, f\u00e1bricas y tambi\u00e9n servicios financieros. Todos esos sectores est\u00e1n interconectados y son servicios esenciales para nuestra sociedad.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Algunos tambi\u00e9n est\u00e1n bastante vinculados a las redes de comunicaci\u00f3n, como es el caso de los servicios financieros. En ese escenario, los maletines de transporte de valores dieron lugar a las redes bancarias internacionales y a las \u201cmaquinitas\u201d que funcionan por medio de las mismas redes que usamos para hablar con amigos y familiares por el celular.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">De esa forma, vemos c\u00f3mo las organizaciones cr\u00edticas dependen, incluso, unas de las otras.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">El factor humano en la defensa de la infraestructura cr\u00edtica<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Como en muchas otras empresas, los profesionales que act\u00faan en organizaciones vinculadas a sectores cr\u00edticos tienen mucho para contribuir con la seguridad cibern\u00e9tica. Ese es el caso de los equipos de tecnolog\u00eda, que pueden evitar la exposici\u00f3n de sistemas vulnerables. Sin embargo, no son solo ellos los que pueden contribuir: los delincuentes saben que pueden intentar enga\u00f1ar a los operadores de los sistemas con mensajes o intentos de contacto maliciosos, ya sea por e-mail, tel\u00e9fono o incluso personalmente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">De esa forma, un \u00fanico clic o la utilizaci\u00f3n de un dispositivo no autorizado, como, por ejemplo, un teclado, pen drive o hasta un mouse, puede bastar para perjudicar un sistema entero e desencadenar un efecto domin\u00f3. En las situaciones m\u00e1s graves, un estafador puede incluso intentar sobornar o amenazar la integridad f\u00edsica de un colaborador para convencerlo de realizar alguna acci\u00f3n que podr\u00eda poner a la organizaci\u00f3n en riesgo.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por eso, adem\u00e1s de conocer las normas de seguridad, es importante que los colaboradores y empleados sepan identificar las amenazas m\u00e1s comunes que pueden acechar a las organizaciones \u2014como el phishing y el malware\u2014 para poder mantenerse atentos a los riesgos y no clicar en sitios sospechosos ni abrir archivos, enlaces o adjuntos desconocidos.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La relaci\u00f3n con proveedores tambi\u00e9n amerita cautela, ya que algunos incidentes ocurren cuando no se cancelan contrase\u00f1as usadas por terceros tras la finalizaci\u00f3n de un contrato de trabajo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por \u00faltimo, es importante resaltar que nadie necesita ser un experto en seguridad cibern\u00e9tica para conocer las buenas pr\u00e1cticas de ciberseguridad. <a href=\"https:\/\/hackerrangers.siteup.dev\/es\/gamification\/cyberattitudes\/\">Son las peque\u00f1as tareas del d\u00eda a d\u00eda<\/a> las que, si se hacen con conciencia y responsabilidad, se convierten en una verdadera barrera capaz de proteger la seguridad de la empresa.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>In decades past, before the turn of the millennium, folks believed that &#8220;critical&#8221; services for society should not be connected to the Internet. However, this thought process has not withstood the technological advances of recent years and the Internet itself is now a critical infrastructure on which many companies and services depend daily. Considering today&#8217;s [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2025,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[81,64],"class_list":["post-2023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-critical-infrastructure","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity: why it matters in critical infrastructure | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"In decades past, before the turn of the millennium, folks believed that &quot;critical&quot; services for society should not be connected to the Internet. However,\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: why it matters in critical infrastructure | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"In decades past, before the turn of the millennium, folks believed that &quot;critical&quot; services for society should not be connected to the Internet. However,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/cybersecurity-in-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-03T14:52:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Cybersecurity: why it matters in critical infrastructure\",\"datePublished\":\"2025-12-03T14:52:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png\",\"keywords\":[\"critical infrastructure\",\"cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/\",\"name\":\"Cybersecurity: why it matters in critical infrastructure | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png\",\"datePublished\":\"2025-12-03T14:52:43+00:00\",\"description\":\"In decades past, before the turn of the millennium, folks believed that \\\"critical\\\" services for society should not be connected to the Internet. However,\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png\",\"width\":1500,\"height\":1000,\"caption\":\"critical infrastructure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: why it matters in critical infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: why it matters in critical infrastructure | Hacker Rangers","description":"In decades past, before the turn of the millennium, folks believed that \"critical\" services for society should not be connected to the Internet. However,","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity: why it matters in critical infrastructure | Hacker Rangers","og_description":"In decades past, before the turn of the millennium, folks believed that \"critical\" services for society should not be connected to the Internet. However,","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/cybersecurity-in-critical-infrastructure\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-03T14:52:43+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure-1024x683.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Cybersecurity: why it matters in critical infrastructure","datePublished":"2025-12-03T14:52:43+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/"},"wordCount":707,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png","keywords":["critical infrastructure","cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/","name":"Cybersecurity: why it matters in critical infrastructure | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png","datePublished":"2025-12-03T14:52:43+00:00","description":"In decades past, before the turn of the millennium, folks believed that \"critical\" services for society should not be connected to the Internet. However,","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/critical-infrastructure.png","width":1500,"height":1000,"caption":"critical infrastructure"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/cybersecurity-in-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: why it matters in critical infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2023"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2023\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2025"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}