{"id":2060,"date":"2025-12-05T11:53:09","date_gmt":"2025-12-05T14:53:09","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2060"},"modified":"2025-12-05T11:53:09","modified_gmt":"2025-12-05T14:53:09","slug":"deepfake-phishing-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","title":{"rendered":"Deepfake phishing: qu\u00e9 es y c\u00f3mo mantenerse protegido"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Eran otros los tiempos en que un v\u00eddeo o un mensaje de voz nos pod\u00edan ayudar a descifrar si una solicitud era real o fraudulenta. Hoy en d\u00eda, en cambio, los ciberdelincuentes logran crear phishings ultrarrealistas con t\u00e9cnicas de deepfake. Pero... \u00bfsabes qu\u00e9 significa cada uno de esos t\u00e9rminos?<\/span><\/p>\n<h2><b>\u00bfQu\u00e9 es phishing, qu\u00e9 es deepfake y, sobre todo, qu\u00e9 es deepfake phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Los phishings no son otra cosa que mensajes fraudulentos creados por ciberdelincuentes para enga\u00f1ar a la gente. Ya sea por e-mail, SMS o redes sociales, se perpetra el phishing cuando un estafador efect\u00faa una solicitud fraudulenta a una v\u00edctima por medio de un contenido enga\u00f1oso: un pedido de transferencia de dinero, un pedido de puesta en com\u00fan de datos, entre muchos otros pretextos.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/hackerrangers.siteup.dev\/es\/cybersecurity\/in-the-age-of-deepfakes-not-every-picture-is-worth-a-thousand-words\/\">Deepfakes:<\/a>, por otro lado, son contenidos manipulados que presentan a personas actuando de un modo en el que nunca actuaron en el mundo real. Hoy en d\u00eda, por medio de una inteligencia artificial, pr\u00e1cticamente cualquier persona puede crear im\u00e1genes, v\u00eddeos o mensajes de voz sumamente fieles a la fisionom\u00eda y a la cadencia de habla de alguien conocido de la potencial v\u00edctima.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuando un ciberdelincuente usa t\u00e9cnicas de deepfake para enga\u00f1ar a un internauta, a esa estafa la llamamos deepfake phishing; consiste en usar contenidos ultrarrealistas creados con inteligencia artificial.<\/span><\/p>\n<h2><b>\u00bfC\u00f3mo funciona el Deepfake Phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Las estafas de phishing con deepfake se efect\u00faan de esta forma. En primer lugar, el estafador fabrica contenidos que parecen sumamente aut\u00e9nticos personificando a alguien que conoces: tu jefe, un compa\u00f1ero de trabajo, un familiar o un amigo.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00bfC\u00f3mo lo hace? El ciberdelincuente recoge im\u00e1genes y v\u00eddeos ya existentes de la persona que pretende personificar, materiales que encuentra f\u00e1cilmente en los medios sociales. Despu\u00e9s, alimenta un algoritmo de inteligencia artificial con ese contenido. \u00a1Y listo! Ahora, el sistema puede imitar a esa persona casi a la perfecci\u00f3n, creando v\u00eddeos, im\u00e1genes y audios falsos que pueden llegar a enga\u00f1ar hasta a los ojos y o\u00eddos m\u00e1s entrenados.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Los ciberdelincuentes han usado insistentemente el deepfake phishing para dirigir ataques cibern\u00e9ticos contra empresas. Una de las formas m\u00e1s comunes es crear v\u00eddeos fraudulentos de CEO o de ejecutivos de alto escalaf\u00f3n en los cuales los jerarcas piden a un colaborador que haga transferencias financieras urgentes o comparta credenciales de acceso a sistemas.\u00a0<\/span><\/p>\n<h3><b>Los gatillos m\u00e1s comunes<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As\u00ed como en otros tipos de phishing, los delincuentes emplean diferentes gatillos mentales para volver la estafa de deepfake phishing aun m\u00e1s convincente. Por ejemplo:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Autoridad:<\/b><span style=\"font-weight: 400;\"> personificando autoridades, como CEO y otros ejecutivos C-level, o aun colaboradores de bancos o de gobiernos, los ciberdelincuentes logran que las v\u00edctimas acaten las solicitudes fraudulentas m\u00e1s f\u00e1cilmente.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Urgencia:<\/b><span style=\"font-weight: 400;\"> una solicitud fraudulenta casi siempre tendr\u00e1 un tono de urgencia o amenaza, advirtiendo de malas consecuencias si no se realiza una acci\u00f3n inmediata que se exige: la p\u00e9rdida de clientes o de proveedores si no se hace una transferencia financiera; la interrupci\u00f3n de alg\u00fan sistema si no se comparte una credencial; entre otras.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Escasez: <\/b><span style=\"font-weight: 400;\">oportunidades imperdibles y beneficios exclusivos tambi\u00e9n est\u00e1n en el cat\u00e1logo de argumentos de un ciberdelincuente para convencer a las v\u00edctimas a que realicen una acci\u00f3n r\u00e1pidamente.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Entre los riesgos asociados a caer en una estafa de deepfake est\u00e1n el robo de identidad, fraudes financieros y perjuicios a la reputaci\u00f3n de la v\u00edctima o de la empresa.\u00a0<\/span><\/p>\n<h2><b>\u00bfC\u00f3mo identificar una estafa por deepfake?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Los phishings por deepfake son delitos casi perfectos en realidad. Pero casi siempre es posible notar algunas inconsistencias que te ayudan a identificar un fraude:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Movimientos no naturales de los ojos y de la boca:<\/b><span style=\"font-weight: 400;\"> los deepfakes suelen presentar movimientos no naturales de los ojos y de la boca. Pesta\u00f1eos extra\u00f1os o labios mal sincronizados con respecto al habla son algunas fallas comunes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Atenci\u00f3n a los detalles de manos, pelo y otras partes del cuerpo:<\/b><span style=\"font-weight: 400;\"> a menudo se notan formatos extra\u00f1os o cortados de las manos, de las orejas y del pelo en deepfakes.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Voz artificial:<\/b><span style=\"font-weight: 400;\"> desconf\u00eda de cadencias de habla muy perfectas que no presenten titubeos, correcciones o ruidos de fondo, pues es probable que se hayan creado con inteligencia artificial.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A fin de cuentas, ante estafas ultrarrealistas como las creadas por deepfake, lo mejor, siempre, es desconfiar de solicitudes sospechosas. Siempre procura confirmar la veracidad del pedido personalmente con el solicitante antes de proseguir con cualquier acci\u00f3n.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Gone are the days when a video or a voice message could help you guess whether a request was real or fraudulent. Nowadays, cybercriminals can create ultra-realistic phishing scams using deepfake techniques. But first&#8230; do you know what each of these terms means? What is phishing, what is deepfake, and, most importantly, what is deepfake [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2062,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[41],"tags":[64,86,92,70],"class_list":["post-2060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing","tag-cybersecurity","tag-deepfakes","tag-phishing","tag-scam"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deepfake Phishing explained and how you can protect yourself | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T14:53:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Deepfake Phishing explained and how you can protect yourself\",\"datePublished\":\"2025-12-05T14:53:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"keywords\":[\"cybersecurity\",\"deepfakes\",\"phishing\",\"scam\"],\"articleSection\":[\"Phishing\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\",\"name\":\"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"datePublished\":\"2025-12-05T14:53:09+00:00\",\"description\":\"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png\",\"width\":1500,\"height\":1000,\"caption\":\"deepfake phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deepfake Phishing explained and how you can protect yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers","description":"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers","og_description":"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-05T14:53:09+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Deepfake Phishing explained and how you can protect yourself","datePublished":"2025-12-05T14:53:09+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/"},"wordCount":628,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","keywords":["cybersecurity","deepfakes","phishing","scam"],"articleSection":["Phishing"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","url":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/","name":"Deepfake Phishing explained and how you can protect yourself | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","datePublished":"2025-12-05T14:53:09+00:00","description":"Learn how deepfake phishing works, how to spot AI-generated scams, and the key steps to protect yourself from ultra-realistic fraud.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/deepfake-phishing-2.png","width":1500,"height":1000,"caption":"deepfake phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/deepfake-phishing-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Deepfake Phishing explained and how you can protect yourself"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2060"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2062"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}