{"id":939,"date":"2025-09-08T11:58:19","date_gmt":"2025-09-08T14:58:19","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/simulacoes-phishing-metricas-taxas-cliques-insuficientes\/"},"modified":"2025-11-02T18:15:51","modified_gmt":"2025-11-02T21:15:51","slug":"phishing-simulations-why-click-rates-are-insufficient","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/","title":{"rendered":"Las simulaciones tradicionales de phishing te est\u00e1n enga\u00f1ando: por qu\u00e9 las m\u00e9tricas de tasas de clics son insuficientes"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Las simulaciones tradicionales de phishing no revelan el verdadero nivel de preparaci\u00f3n de tu empresa. Descubre por qu\u00e9 la simple cuenta de clics es insuficiente y c\u00f3mo PhishOS ayuda a medir, de verdad, la capacidad de los colaboradores para identificar y reaccionar ante ataques de ingenier\u00eda social.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ya sea por compliance o por preocupaci\u00f3n genuina por la ciberseguridad, todos nos hemos encontrado con una simulaci\u00f3n tradicional de phishing. Ese t\u00edpico correo anunciando una promoci\u00f3n o con un mensaje alarmante puede traer graves consecuencias para empresas e instituciones.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sin embargo, lo que pocos reconocen es que las simulaciones tradicionales de phishing ya no son tan eficaces y rara vez miden lo que realmente importa. En lugar de concienciar, entregan m\u00e9tricas poco relevantes y generan miedo, desmotivaci\u00f3n e incluso da\u00f1os a la reputaci\u00f3n de las organizaciones.<\/span><\/p>\n<h3><b>Cuando el \u201centrenamiento\u201d se convierte en problema<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Un caso emblem\u00e1tico sobre c\u00f3mo las simulaciones tradicionales pueden afectar negativamente a las instituciones ocurri\u00f3 en 2023. Una universidad en California realiz\u00f3 una prueba de phishing cuyo asunto era: <\/span><i><span style=\"font-weight: 400;\">\u201cNotificaci\u00f3n de Emergencia: Caso de \u00c9bola en el Campus.\u201d<\/span><\/i><span style=\"font-weight: 400;\"> El e-mail, que solo era un test, caus\u00f3 p\u00e1nico entre alumnos y empleados. \u00bfY a qu\u00e9 costo?<\/span><\/p>\n<h3><b>El problema de las m\u00e9tricas tradicionales<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En las pruebas tradicionales, las m\u00e9tricas solo muestran qui\u00e9n hizo clic y qui\u00e9n no en el e-mail de phishing. Pero esta m\u00e9trica, por s\u00ed sola, deja espacio para innumerables dudas e interpretaciones.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Un alto porcentaje de usuarios que no hicieron clic no significa necesariamente que la organizaci\u00f3n est\u00e9 segura. Tal vez los empleados estaban demasiado ocupados para revisar el correo, algunos ya sab\u00edan que se enviar\u00eda el test, o la tem\u00e1tica utilizada simplemente no resultaba de inter\u00e9s.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Como ejemplo, Google dej\u00f3 de aplicar pruebas tradicionales de phishing en los \u00faltimos a\u00f1os. En su blog oficial, la compa\u00f1\u00eda explic\u00f3: <\/span><i><span style=\"font-weight: 400;\">\u201cEducar a los empleados sobre c\u00f3mo alertar a los equipos de seguridad ante ataques en curso sigue siendo un complemento valioso y esencial para una postura de seguridad integral. Sin embargo, no hay necesidad de convertirlo en un acto confrontativo, y no ganamos nada \u2018atrapando\u2019 a personas que \u2018fallan\u2019 en la tarea.\u201d<\/span><\/i><span style=\"font-weight: 400;\"> (del texto <\/span><i><span style=\"font-weight: 400;\">\u201cOn Fire Drills and Phishing Tests\u201d<\/span><\/i><span style=\"font-weight: 400;\">).<\/span><\/p>\n<h3><b>La ra\u00edz del problema<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">De acuerdo con Vin\u00edcius Perallis, fundador y CEO de Hacker Rangers, la ra\u00edz est\u00e1 en el alejamiento del prop\u00f3sito original de las simulaciones de phishing: medir el nivel de protecci\u00f3n de una empresa frente a ataques de ingenier\u00eda social. Las organizaciones comenzaron a utilizarlas para concienciar. <\/span><i><span style=\"font-weight: 400;\">\u201cLa gran confusi\u00f3n es que la simulaci\u00f3n de phishing por correo se usa para un prop\u00f3sito muy diferente del que fue creada y en el que deber\u00eda encajar,\u201d<\/span><\/i><span style=\"font-weight: 400;\"> se\u00f1al\u00f3 Vin\u00edcius en el Hacker Rangers Podcast.<\/span><\/p>\n<h3><b>La evoluci\u00f3n: NIST Phish Scale<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ante este escenario, en 2023 el National Institute of Standards and Technology (NIST) public\u00f3 la <\/span><i><span style=\"font-weight: 400;\">NIST Phish Scale<\/span><\/i><span style=\"font-weight: 400;\">, una gu\u00eda sobre c\u00f3mo reconocer se\u00f1ales de que un e-mail es phishing. El documento lista 23 tipos de se\u00f1ales que deben verificarse frente a un e-mail sospechoso.<\/span><\/p>\n<h3><b>PhishOS: la nueva generaci\u00f3n de simulaciones de phishing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Con todo esto en mente, Hacker Rangers cre\u00f3 <\/span><b>PhishOS<\/b><span style=\"font-weight: 400;\">, un simulador de phishing dise\u00f1ado \u00edntegramente en base a la NIST Phish Scale. PhishOS va m\u00e1s all\u00e1 de la simple cuenta de clics: los jugadores deben explicar <\/span><i><span style=\"font-weight: 400;\">por qu\u00e9<\/span><\/i><span style=\"font-weight: 400;\"> un e-mail es o no un phishing, con 34 posibles escenarios a identificar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Con PhishOS, cada simulaci\u00f3n se convierte en un momento de educaci\u00f3n pr\u00e1ctica. Los colaboradores aprenden a reconocer se\u00f1ales de peligro en un entorno seguro, mientras los gestores obtienen m\u00e9tricas precisas sobre el comportamiento y la evoluci\u00f3n del equipo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Es hora de dejar atr\u00e1s las simulaciones obsoletas y adoptar un enfoque que realmente transforme el comportamiento. Con PhishOS, pasas de la simple \u201ccuenta de clics\u201d a una estrategia inteligente, educativa y atractiva. <a href=\"https:\/\/hackerrangers.siteup.dev\/es\/phishos\/\">Pru\u00e9balo gratis durante 30 d\u00edas<\/a> y descubre c\u00f3mo transformar las simulaciones en resultados reales para tu empresa.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Las simulaciones tradicionales de phishing no revelan el verdadero nivel de preparaci\u00f3n de tu empresa. Descubre por qu\u00e9 la simple cuenta de clics es insuficiente y c\u00f3mo PhishOS ayuda a medir, de verdad, la capacidad de los colaboradores para identificar y reaccionar ante ataques de ingenier\u00eda social.<\/p>","protected":false},"author":4009,"featured_media":943,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[41],"tags":[],"class_list":["post-939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-08T14:58:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-02T21:15:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient\",\"datePublished\":\"2025-09-08T14:58:19+00:00\",\"dateModified\":\"2025-11-02T21:15:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"articleSection\":[\"Phishing\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\",\"name\":\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"datePublished\":\"2025-09-08T14:58:19+00:00\",\"dateModified\":\"2025-11-02T21:15:51+00:00\",\"description\":\"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","description":"Las simulaciones tradicionales de phishing no revelan el verdadero nivel de preparaci\u00f3n de tu empresa. Descubre por qu\u00e9 la simple cuenta de clics es insuficiente y c\u00f3mo PhishOS ayuda a medir, de verdad, la capacidad de los colaboradores para identificar y reaccionar ante ataques de ingenier\u00eda social.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","og_description":"Traditional phishing simulations do not reveal your company\u2019s true level of preparedness. Discover why click counting is insufficient and how PhishOS helps measure employees\u2019 real ability to identify and respond to social engineering attacks.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/","og_site_name":"Hacker Rangers","article_published_time":"2025-09-08T14:58:19+00:00","article_modified_time":"2025-11-02T21:15:51+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","type":"image\/jpeg"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient","datePublished":"2025-09-08T14:58:19+00:00","dateModified":"2025-11-02T21:15:51+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/"},"wordCount":571,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","articleSection":["Phishing"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/","url":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/","name":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","datePublished":"2025-09-08T14:58:19+00:00","dateModified":"2025-11-02T21:15:51+00:00","description":"Las simulaciones tradicionales de phishing no revelan el verdadero nivel de preparaci\u00f3n de tu empresa. Descubre por qu\u00e9 la simple cuenta de clics es insuficiente y c\u00f3mo PhishOS ayuda a medir, de verdad, la capacidad de los colaboradores para identificar y reaccionar ante ataques de ingenier\u00eda social.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/09\/phishing-scaled.jpg","width":2560,"height":1707,"caption":"phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/phishing\/phishing-simulations-why-click-rates-are-insufficient\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Traditional Phishing Simulations Are Misleading You: Why Click Rates Are Insufficient"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=939"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/939\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/943"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}