[{"channel_id":1254615786,"post_id":6339,"date":1777134000000,"views":"76","text":"<b>100 <\/b><b>#Libros<\/b><b> <\/b><b>#Hacking<\/b><b> <\/b><b>#Security<\/b><br><br>Algunos son viejitos pero...<br><br>\ud83d\ude0d<a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/www.yeahhub.com\/biggest-hacking-security-ebooks-collection-free-download\/\">https:\/\/www.yeahhub.com\/biggest-hacking-security-ebooks-collection-free-download\/<\/a><br><br>Algunos otros...<br>\ud83d\udd17<a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/ciberseguridad.blog\/33-de-los-mejores-libros-de-ciberseguridad\/\">https:\/\/ciberseguridad.blog\/33-de-los-mejores-libros-de-ciberseguridad\/<\/a>","text_length":237,"media":{"root":"\/013\/wxgAAOrqx0oAAAAA-8EHgNxUkdQ","webpage":{"url":"https:\/\/www.yeahhub.com\/biggest-hacking-security-ebooks-collection-free-download","type":"photo","title":"Biggest Hacking & Security E-Books Collection - FREE Download - Yeah Hub","site_name":"Yeah Hub","display_url":"yeahhub.com\/biggest-hacking-security-ebooks-collection-free-download","description":"Ever thought of creating a library with thousands of free hacking an security e-books? You'd never have to spend a time.","author":"http:\/\/facebook.com\/yeahhub","thumbs":{"m":{"w":320,"h":156,"hash":"IEcOgFujmo9W-Ko4Y4P19g&ts=1777240428"},"x":{"w":800,"h":389,"hash":"LPsc44iQmC5V9HV3G2G5Vg&ts=1777240428"},"y":{"w":1198,"h":583,"hash":"nEu5ZzlOCPHJA7XWhFlcuA&ts=1777240428"},"i":{"bytes":"AUACg|BPKyMFATt+75nvU0sJJDmPYBnkvxUpt1EJO1d44G4H1pFt5DvX93tYnI55pDIBEVDFED7h2f2qTy\/9GjDqF54+f605pIofkVgNv3xg+lOylxCnk7cKcnIPT2p6i0RWhxERJGg3bcffBHWirTNZFd7qp49KKLN7DTS3K9pLI7jfIzDB4JqzcMUvoUUkKwJIHc0UVKLktURXvyXEGP4mIbPfgVOq7YGcMRx93jAoopLcjoVR9\/y8\/KEz+tFFFWSf\/9k="}}}}},{"channel_id":1254615786,"post_id":6338,"date":1777127926000,"forwards":"2","views":"568","text":"&quot;Copitos de nieve&quot;: Empleo de Ingenier\u00eda Social para enga\u00f1ar directivos y desplegar malware personalizado.<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/copitos-de-nieve-empleo-de-ingenieria.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/copitos-de-nieve-empleo-de-ingenieria.html<\/a>","text_length":187,"media":{"root":"\/001\/whgAAOrqx0oAAAAAKcnZAZoHKkM","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/copitos-de-nieve-empleo-de-ingenieria.html","type":"article","title":"\"Copitos de nieve\": Empleo de Ingenier\u00eda Social para enga\u00f1ar directivos y desplegar malware personalizado.","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/copitos-de-nieve-empleo-de-ingenieria.html","thumbs":{"m":{"w":320,"h":69,"hash":"8jjFUX4HDOuMjfGcM71yjQ&ts=1777240428"},"x":{"w":800,"h":172,"hash":"rZ0Idks4Hot3SqrSz2DwFA&ts=1777240428"},"y":{"w":1000,"h":215,"hash":"5pLMWzexWg-5VOa0w5Zeog&ts=1777240428"},"i":{"bytes":"AIACg|Ca5+1fam8sS7MjG3OKJBc\/ajt83bv7ZxiiimSH+lfbOkuzzPfGM0Ri5+1LuMuzdznOMUUUAFt9p+1Jv83ZnnOcUUUUAj\/\/2Q=="}}}}},{"channel_id":1254615786,"post_id":6337,"date":1777124370000,"views":"128","text":"#Claude<br>Finde divertido, curso directo desde el creador \ud83e\udd13<br>\ud83d\udd17<a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/x.com\/LQP2021\/status\/2047877250184618248\">https:\/\/x.com\/LQP2021\/status\/2047877250184618248<\/a>","text_length":109,"media":{"root":"\/006\/wRgAAOrqx0oAAAAANquA9K1Hc5E","webpage":{"url":"https:\/\/x.com\/LQP2021\/status\/2047877250184618248","type":"article","title":"\u68da\u54e5\u8bf4\u52a0\u5bc6 (@LQP2021) on X","site_name":"X (formerly Twitter)","display_url":"x.com\/LQP2021\/status\/2047877250184618248","description":"Anthropic \u5b98\u65b9\u56e2\u961f\u4eb2\u81ea\u6f14\u793a\u4e86 Claude Code \u7684\u6b63\u786e\u6253\u5f00\u65b9\u5f0f\uff0c\u8fd9\u624d\u662f\u771f\u6b63\u7684\u9ad8\u9636\u7528\u6cd5\u3002\n\n\u5168\u7a0b\u4ec5\u970030\u5206\u949f\uff0c\u800c\u4e14\u5b8c\u5168\u514d\u8d39\uff0c\u4e3b\u8bb2\u4eba\u5c31\u662f Claude Code \u7684\u6838\u5fc3\u5f00\u53d1\u8005\u3002\n\n\u4e00\u5b9a\u8981\u53bb\u770b\u8fd9\u573a\u5de5\u4f5c\u574a\uff0c\u5efa\u8bae\u76f4\u63a5\u6536\u85cf\u3002\n\n\u5b83\u5e26\u6765\u7684\u4ef7\u503c\uff0c\u8fdc\u6bd4\u90a3\u4e9b\u6807\u4ef7\u51e0\u767e\u7f8e\u5143\u7684\u4ed8\u8d39\u8bfe\u7a0b\u8981\u9ad8\u5f97\u591a\u3002\n\n\u4f60\u5e73\u65f6\u4e5f\u5728\u7528","thumbs":{"m":{"w":320,"h":180,"hash":"9Xv_N7befirkmnpzuSmg3w&ts=1777240428"},"x":{"w":800,"h":450,"hash":"jk93u5soMGdNs8xJeg0Eng&ts=1777240428"},"y":{"w":1280,"h":720,"hash":"wl6LGo-B-bj6xjcHrnOOXw&ts=1777240428"},"i":{"bytes":"AXACg|CqsSGfqc46ZqwtrGOTvyR\/eqZLZPMEn8VSRgbASe1JFMrpbQp0LAHvkVL9kjb+NvwNShR2YmorucwKpUA5PenZE3GtaoqMfn4H96iq\/wBvdzsKqAeKKl2GP+3BF3Dg+4pg1FVTATJA9KKKaAcNSXAyvP0qO4uVuAAwIx6UUUCIF2bshm4PpRRRSGf\/2Q=="}}}}},{"channel_id":1254615786,"post_id":6336,"date":1777052326000,"views":"86","text":"FakeWallet: Aplicaciones falsas en la App Store de Apple roban frases semilla de criptomonedas<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/fakewallet-aplicaciones-falsas-en-la.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/fakewallet-aplicaciones-falsas-en-la.html<\/a>","text_length":174,"media":{"root":"\/002\/wBgAAOrqx0oAAAAAM9A7yGCr4xw","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/fakewallet-aplicaciones-falsas-en-la.html","type":"article","title":"FakeWallet: Aplicaciones falsas en la App Store de Apple roban frases semilla de criptomonedas","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/fakewallet-aplicaciones-falsas-en-la.html","thumbs":{"m":{"w":320,"h":155,"hash":"l_u5_ljDRGkOdjaLvfnwaQ&ts=1777240428"},"x":{"w":640,"h":310,"hash":"kvwGnQi720H15PkKVhCtcQ&ts=1777240428"},"i":{"bytes":"AUACg|DSmfy7eR8fdUnjiqCasmwsIMH03\/8A1q0WwIzu+7jmqgubHbu2jG3d9ztnHpQAg1HNx5PlHlQ2d3qM+lQyapIY1eNAvz7SCc5q27oshxAGwPvY7YqKdoQqBrYHJyB\/WnZrULkNpqM9xdRxOECtnOAff3oqeFYEukQW2xwMhgelFK4WLcozE49VNZwsoyjDLYxjt0zmiimiWXGjVvLDcgKePXgUGJdg9lx+lFFN7DW5HHEDdRyFmLAEfzoooqEUz\/\/Z"}}}}},{"channel_id":1254615786,"post_id":6335,"date":1777034324000,"forwards":"1","views":"189","text":"M\u00e1s de 1.300 servidores SharePoint expuestos a la vulnerabilidad CVE-2026-32201 de abril<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/mas-de-1300-servidores-sharepoint.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/mas-de-1300-servidores-sharepoint.html<\/a>","text_length":165,"media":{"root":"\/006\/vxgAAOrqx0oAAAAANquA9K1Hc5E","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/mas-de-1300-servidores-sharepoint.html","type":"article","title":"M\u00e1s de 1.300 servidores SharePoint expuestos a la vulnerabilidad CVE-2026-32201 de abril","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/mas-de-1300-servidores-sharepoint.html","thumbs":{"m":{"w":320,"h":155,"hash":"jjDaiZAxYoUe4pdNL6Zkpw&ts=1777240428"},"x":{"w":638,"h":310,"hash":"UKgS1EHUSPVXtijKg5y3CQ&ts=1777240428"},"i":{"bytes":"AUACg|DWVQD2\/Oo3cI4XOCegzUpHNQyDJOOD2PpQA8OecmgO5qJFYL8xz708NzgH6ihAxxZ6KaSTRQBK1RSffNFFHUBo70UUUAOHIooooA\/\/2Q=="}}}}},{"channel_id":1254615786,"post_id":6334,"date":1776969526000,"forwards":"1","views":"302","comments":"1","text":"CLI de Bitwarden comprometida en la campa\u00f1a de la cadena de suministro de Checkmarx<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/cli-de-bitwarden-comprometida-en-la.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/cli-de-bitwarden-comprometida-en-la.html<\/a>","text_length":162,"media":{"root":"\/00d\/vhgAAOrqx0oAAAAATmceaN9g0fc","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/cli-de-bitwarden-comprometida-en-la.html","type":"article","title":"CLI de Bitwarden comprometida en la campa\u00f1a de la cadena de suministro de Checkmarx","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/cli-de-bitwarden-comprometida-en-la.html","thumbs":{"m":{"w":320,"h":210,"hash":"txTXWK45-0vcq43yD7COhQ&ts=1777240428"},"x":{"w":639,"h":420,"hash":"n-xh63tEz_J0j5IYti0QCg&ts=1777240428"},"i":{"bytes":"AaACg|DRJAlIMqgkDCk80\/Bzjj9aQqpcHcARjipfl9qAI0ZSxXehI6gHNPBU+n5U1UAcnPPpTyBg56UAQjLy745VaPHIBziinooCtg5ooARo95Vs4xjvT9o9P1puTjrRk+poAQqA2Ap\/CnMVIK7gD9aTJ9TQetACIoUEB88Y60UtFAH\/2Q=="}}}}},{"channel_id":1254615786,"post_id":6333,"date":1776962325000,"forwards":"1","views":"1.1K","text":"Ataques de ingenier\u00eda social intentan robar dominios DeFI<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html<\/a>","text_length":138,"media":{"root":"\/00d\/vRgAAOrqx0oAAAAATmceaN9g0fc","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html","type":"article","title":"Ataques de ingenier\u00eda social intentan robar dominios DeFI","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html","thumbs":{"m":{"w":252,"h":320,"hash":"JY1D16S-0bSXXCjhDvfWMQ&ts=1777240428"},"x":{"w":629,"h":800,"hash":"ie9Do85qZCjeVeZ2tYUMcA&ts=1777240428"},"y":{"w":635,"h":808,"hash":"V76Frpa_3qpgOlY_6BC4oQ&ts=1777240428"},"i":{"bytes":"AoACA|BDq8rOwW3zt64Y9KaNdf8A54L\/AN9GqMUixzuWBweOO3Of6VLNNbJdI9rCwReuSfm\/woAtHXJAATbrzyPmpU1x2dR5C8nH3qpi6jCFTbK3y7QTjI6+3v8ApUTSLLcqyxhASOBQB0+2TP8ArB\/3zRsl\/wCeo\/75ox\/tfrRj\/a\/WgBdsmfvj\/vmjbJ\/fH\/fNJ\/wL9acuM\/eJ\/GgBp69P\/HaPwP8A3zRRQAfh\/wCO05B3xj8KKKAP\/9k="}}}}},{"channel_id":1254615786,"post_id":6332,"date":1776959934000,"forwards":"1","views":"209","text":"Premio freaky de la semana \ud83d\ude03<br><br>\ud83d\udd17<a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/x.com\/edu_seo_scraper\/status\/2046992034427224561\">https:\/\/x.com\/edu_seo_scraper\/status\/2046992034427224561<\/a>","text_length":89,"media":{"root":"\/00c\/vBgAAOrqx0oAAAAAozc4Dp6QmKs","webpage":{"url":"https:\/\/x.com\/edu_seo_scraper\/status\/2046992034427224561","type":"article","title":"Edu | \ud83d\ude80 SEO & \ud83d\udd77\ufe0f Web Scraping (@edu_seo_scraper) on X","site_name":"X (formerly Twitter)","display_url":"x.com\/edu_seo_scraper\/status\/2046992034427224561","description":"Google tiene un endpoint publico para obtener el favicon de cualquier dominio en PNG.\n\nSin API key.\n\nSin registro. Gratis.\n\nLo usa Chrome internamente.\n\nLo saqu\u00e9 del c\u00f3digo fuente de Chromium \ud83e\uddf5","thumbs":{"m":{"w":200,"h":200,"hash":"XSPUGOFD5j_r8m_4RaLYaw&ts=1777240428"},"i":{"bytes":"AoACg|DOpQCTgUlS2yCSUKxIHU4oYIYUIGe1NrV+yW3l53Pj0rOnQJKyqcjtmkmNojooopiCtCyhBiDt\/Fnp1rPrRtSUgUHjvQBa8qMxiPnb9eap38IVRIMdce9WfMGO1QXxL2\/HY5NFh3M6iiigQUUUUAFFFFABRRRQB\/\/Z"}}}}},{"channel_id":1254615786,"post_id":6331,"date":1776947929000,"views":"499","text":"Ataques de ingenier\u00eda social intentan robar dominios DeFI<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html<\/a>","text_length":138,"media":{"root":"\/00b\/uxgAAOrqx0oAAAAAm4Yo4AUC5Rg","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html","type":"article","title":"Ataques de ingenier\u00eda social intentan robar dominios DeFI","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/ataques-de-ingenieria-social-intentan.html","thumbs":{"m":{"w":252,"h":320,"hash":"u9A_8sFeqLRoHM3J0QiFuQ&ts=1777240428"},"x":{"w":629,"h":800,"hash":"nygvQp2hWj3Qgn2sE6kQqQ&ts=1777240428"},"y":{"w":635,"h":808,"hash":"fZ7N_xywzmy6y36ivplo1w&ts=1777240428"},"i":{"bytes":"AoACA|BDq8rOwW3zt64Y9KaNdf8A54L\/AN9GqMUixzuWBweOO3Of6VLNNbJdI9rCwReuSfm\/woAtHXJAATbrzyPmpU1x2dR5C8nH3qpi6jCFTbK3y7QTjI6+3v8ApUTSLLcqyxhASOBQB0+2TP8ArB\/3zRsl\/wCeo\/75ox\/tfrRj\/a\/WgBdsmfvj\/vmjbJ\/fH\/fNJ\/wL9acuM\/eJ\/GgBp69P\/HaPwP8A3zRRQAfh\/wCO05B3xj8KKKAP\/9k="}}}}},{"channel_id":1254615786,"post_id":6330,"date":1776944326000,"forwards":"1","views":"319","text":"Vercel encontr\u00f3 m\u00e1s cuentas comprometidas<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/vercel-encontro-mas-cuentas.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/vercel-encontro-mas-cuentas.html<\/a>","text_length":112,"media":{"root":"\/002\/uhgAAOrqx0oAAAAAM9A7yGCr4xw","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/vercel-encontro-mas-cuentas.html","type":"article","title":"Vercel encontr\u00f3 m\u00e1s cuentas comprometidas","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/vercel-encontro-mas-cuentas.html","thumbs":{"m":{"w":225,"h":320,"hash":"M_aczypTHnI9k8EI3zuk7A&ts=1777240428"},"x":{"w":336,"h":478,"hash":"ykNQb4A4oPGegt995b6jdg&ts=1777240428"},"i":{"bytes":"AoABw|COkxT6TFdVx3G4pNtSYoxRcVx4c564\/Cl3cff\/AEqOipsBLvwOH\/8AHaaZGPU\/pTKWixIlFFFMYUUUUyT\/2Q=="}}}}},{"channel_id":1254615786,"post_id":6329,"date":1776873797000,"views":"530","comments":"4","text":"Est\u00e1n las malas pr\u00e1cticas y abajo de todo eso, est\u00e1 esto \ud83d\ude35\u200d\ud83d\udcab<br><br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/x.com\/SeguInfo\/status\/2046982662250692654\">https:\/\/x.com\/SeguInfo\/status\/2046982662250692654<\/a>","text_length":113,"media":{"root":"\/012\/uRgAAOrqx0oAAAAAMVydsekmc74","webpage":{"url":"https:\/\/x.com\/SeguInfo\/status\/2046982662250692654","type":"article","title":"Cristian Borghello (@SeguInfo) on X","site_name":"X (formerly Twitter)","display_url":"x.com\/SeguInfo\/status\/2046982662250692654","description":"\ud83d\udea8\u00bfCorreo Verdadero o Falso #MiArgentina910?\ud83d\udc47\ud83e\udd14\n\"Si te roban o perd\u00e9s el celular, pod\u00e9s evitar que usen tu l\u00ednea o intenten vender tu equipo\"\n\nComo tener una idea \u00fatil e implementarla MUY MAL.\n\nEl correo ES VERDADERO pero parece falso. Por esto existe el #phishing!","thumbs":{"m":{"w":320,"h":183,"hash":"OP15yoZkS_pS3mLVob8TRg&ts=1777240428"},"x":{"w":800,"h":458,"hash":"EsLi-OjMWHkZYOEPe5Zi9w&ts=1777240428"},"y":{"w":1166,"h":667,"hash":"GM6_elfdRPdN2XiRBYaLKg&ts=1777240428"},"i":{"bytes":"AXACg|B\/9oybd5twF9c0f2nKB\/x6jH+falNtbKDEbsgDgrxSjT7c4xOfm6cDmnoGpG2qSDk2yj6k0n9rv\/zwT\/vqpzpUQGTMwH0FJ\/ZsH\/Pf+VGgiB9VlYcR7fof8RRU39l2\/wDz8H8xRT0Apykfb5cjOHbj1q48mJ4x\/dJGfyoorNmi2LU0gjtgzoH5xiqv22D\/AJ9x+f8A9aiirRm9yxaTpMzBIdmBnOaKKKGB\/9k="}}}}},{"channel_id":1254615786,"post_id":6328,"date":1776872325000,"views":"561","text":"Por qu\u00e9 falla la recuperaci\u00f3n de las organizaciones ante un ataque de ransomware<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/por-que-falla-la-recuperacion-de-las.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/por-que-falla-la-recuperacion-de-las.html<\/a>","text_length":160,"media":{"root":"\/00d\/uBgAAOrqx0oAAAAATmceaN9g0fc","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/por-que-falla-la-recuperacion-de-las.html","type":"article","title":"Por qu\u00e9 falla la recuperaci\u00f3n de las organizaciones ante un ataque de ransomware","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/por-que-falla-la-recuperacion-de-las.html","thumbs":{"m":{"w":225,"h":320,"hash":"cOPo5f50TNdEuMgxAKqvtA&ts=1777240428"},"x":{"w":336,"h":478,"hash":"LEOSAirvtZLp_LZ5JPaIZg&ts=1777240428"},"i":{"bytes":"AoABw|COkxT6TFdVx3G4pNtSYoxRcVx4c564\/Cl3cff\/AEqOipsBLvwOH\/8AHaaZGPU\/pTKWixIlFFFMYUUUUyT\/2Q=="}}}}},{"channel_id":1254615786,"post_id":6327,"date":1776861525000,"forwards":"2","views":"226","comments":"2","text":"Vulnerabilidad &quot;previsible&quot; en el dise\u00f1o en Anthropic permite la ejecuci\u00f3n remota de c\u00f3digo (RCE)<br><a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/blog.segu-info.com.ar\/2026\/04\/vulnerabilidad-previsible-en-el-diseno.html\">https:\/\/blog.segu-info.com.ar\/2026\/04\/vulnerabilidad-previsible-en-el-diseno.html<\/a>","text_length":179,"media":{"root":"\/001\/txgAAOrqx0oAAAAAKcnZAZoHKkM","webpage":{"url":"https:\/\/blog.segu-info.com.ar\/2026\/04\/vulnerabilidad-previsible-en-el-diseno.html","type":"article","title":"Vulnerabilidad \"previsible\" en el dise\u00f1o en Anthropic permite la ejecuci\u00f3n remota de c\u00f3digo (RCE)","site_name":"Segu-Info - Ciberseguridad desde 2000","display_url":"blog.segu-info.com.ar\/2026\/04\/vulnerabilidad-previsible-en-el-diseno.html","thumbs":{"m":{"w":320,"h":166,"hash":"1yy_lBQQNXsM0Uy-6O27jw&ts=1777240428"},"x":{"w":640,"h":333,"hash":"cyxB5h1e2afeQO1dkneANg&ts=1777240428"},"i":{"bytes":"AVACg|DXJOaCSB706igBAc5pB144\/CnU0daAFyc0UtFABRRRQAUgGD1oooAWiiigD\/\/Z"}}}}},{"channel_id":1254615786,"post_id":6326,"date":1776823784000,"forwards":"3","views":"208","text":"<b>\ud83e\udd86\ud83e\udd86GO GO!!<\/b><br><br>DuckDuckGo anunci\u00f3 los resultados de una auditor\u00eda independiente realizada a su servicio VPN, que verifica el cumplimiento de su pol\u00edtica de no registro de datos.<br><br>El an\u00e1lisis confirma que el VPN no recopila ni guarda informaci\u00f3n que pueda identificar a los usuarios ni rastrea su actividad de navegaci\u00f3n, cumpliendo estrictamente con las promesas de privacidad de la compa\u00f1\u00eda.<br><br>\ud83d\udd17<a target=\"_blank\" rel=\"noreferrer nofollow\" href=\"https:\/\/duckduckgo.com\/duckduckgo-help-pages\/static-assets\/pdfs\/Securitum_DuckDuckGo_VPN-No-Log-Policy-Audit_20260320.pdf\">https:\/\/duckduckgo.com\/duckduckgo-help-pages\/static-assets\/pdfs\/Securitum_DuckDuckGo_VPN-No-Log-Policy-Audit_20260320.pdf<\/a>","text_length":515,"media":{"root":null,"document":{"file_name":"Securitum_DuckDuckGo_VPN-No-Log-Policy-Audit_20260320.pdf","mime_type":"application\/pdf","size":480697}}},{"channel_id":1254615786,"post_id":6325,"date":1776774954000,"forwards":"1","views":"285","comments":"4","text":"Uso de VS, Sonnet 4.6 + Codex 5.3.<br><br>1era version con especificaciones muy claras <b>funcionales<\/b> de una persona que no sabe casi nada de seguridad ni arquitectura.<br>Resultado: muy buena UI y funcionalidad, p\u00e9simo dise\u00f1o y arquitectura y p\u00e9sima seguridad. Manejo de roles, permisos y API asqueroso. (3\/10)<br><br>2da version con especificaciones muy claras de seguridad y skills espec\u00edficos.<br>Resultado: seguridad media, p\u00e9sima arquitectura cliente\/servidor. Mala arquitectura de BD. Datos regalados en el cliente. (5\/10)<br><br>3era version: redise\u00f1o con especificaciones claras de arquitectura front\/back, skill propios de seguridad.<br>Resultado: esperado (8\/10)","text_length":643}]