{"id":6280,"date":"2024-01-08T16:59:54","date_gmt":"2024-01-08T15:59:54","guid":{"rendered":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?p=6280"},"modified":"2024-04-10T16:48:25","modified_gmt":"2024-04-10T14:48:25","slug":"phishing-que-es-y-cuantos-tipos-hay","status":"publish","type":"post","link":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/","title":{"rendered":"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay"},"content":{"rendered":"<h1 style=\"text-align: center;\">Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay<\/h1>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">En este art\u00edculo vamos a continuar ampliando nuestra informaci\u00f3n sobre un tipo de ciberataque cada vez m\u00e1s habitual: el <\/span><i><span style=\"font-weight: 400;\">phishing<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El <strong>phishing<\/strong> es un conjunto de t\u00e9cnicas que tienen como objetivo enga\u00f1ar a una v\u00edctima y ganar su confianza haci\u00e9ndose pasar por una persona, empresa o servicio de confianza (suplantaci\u00f3n de identidad de un tercero de confianza), con el fin de manipularla y hacer que realice acciones que no debe realizar (revelar informaci\u00f3n confidencial o hacer clic en un enlace). El suplantador se llama <\/span><i><span style=\"font-weight: 400;\">phisher<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Tipos de phishing<\/b><\/h2>\n<p><strong>Suplantaci\u00f3n de identidad por correo electr\u00f3nico<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">La mayor\u00eda de estos mensajes de phishing se env\u00edan a trav\u00e9s de spam. No est\u00e1n personalizados ni dirigidos a una persona o empresa concreta. Su contenido var\u00eda seg\u00fan el objetivo del phisher. Los objetivos comunes de phishing incluyen bancos y servicios financieros, proveedores de productividad en la nube y correo electr\u00f3nico, y servicios de transmisi\u00f3n.<\/span><\/p>\n<p><strong>Suplantaci\u00f3n de identidad de voz<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">El phishing de voz es el uso del tel\u00e9fono para realizar ataques. Los atacantes utilizan la tecnolog\u00eda VoIP (Voice over IP) para realizar numerosas llamadas fraudulentas de forma econ\u00f3mica o gratuita para obtener c\u00f3digos, contrase\u00f1as o datos bancarios de la v\u00edctima, que a menudo no sospecha nada.<\/span><\/p>\n<p><strong>Suplantaci\u00f3n de identidad por SMS<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Smishing es una forma de phishing en la que los tel\u00e9fonos m\u00f3viles se utilizan como plataforma de ataque. Los ataques de smishing suelen invitar al usuario a hacer clic en un enlace, llamar a un n\u00famero de tel\u00e9fono o ponerse en contacto con una direcci\u00f3n de correo electr\u00f3nico proporcionada por el atacante a trav\u00e9s de un mensaje SMS. El delincuente lleva a cabo el ataque con un intento de obtener informaci\u00f3n personal, incluidos los n\u00fameros de tarjeta de cr\u00e9dito o seguro social.<\/span><\/p>\n<p><strong>Secuestro de p\u00e1gina<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Se logra mediante la creaci\u00f3n de una copia ileg\u00edtima de un sitio web popular, pero en realidad, cuando un visitante inicia sesi\u00f3n, es redirigido a otro sitio web.<\/span><\/p>\n<p><strong>Suplantaci\u00f3n de identidad del calendario<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">El phishing de calendario es cuando los enlaces de phishing se env\u00edan a trav\u00e9s de invitaciones de calendario. Se env\u00edan invitaciones de calendario que, de forma predeterminada, se agregan autom\u00e1ticamente a muchos calendarios.<\/span><\/p>\n<p>La proliferaci\u00f3n del phishing convierte en una obligaci\u00f3n para las organizaciones la <strong>protecci\u00f3n propia<\/strong> con estrategias de concienciaci\u00f3n, educaci\u00f3n y evaluaci\u00f3n a empleados y herramientas internas de ciberseguridad, pero, tambi\u00e9n, la <strong>protecci\u00f3n de sus clientes<\/strong> con estrategias proactivas de detecci\u00f3n de phishing y usurpaci\u00f3n de la identidad corporativa en redes sociales y foros p\u00fablicos.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El phishing es un conjunto de t\u00e9cnicas que tienen como objetivo enga\u00f1ar a una v\u00edctima y ganar su confianza haci\u00e9ndose pasar por una persona, empresa o servicio de confianza.<\/p>\n","protected":false},"author":4,"featured_media":6309,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[45,46],"tags":[54,49],"class_list":["post-6280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-riesgos","tag-ciberseguridad","tag-riesgos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay - Enthec<\/title>\n<meta name=\"description\" content=\"Un tipo de ciberataque cada vez m\u00e1s habitual es el phishing, que pretende enga\u00f1ar a la v\u00edctima mediante la suplantaci\u00f3n de identidad.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay - Enthec\" \/>\n<meta property=\"og:description\" content=\"Un tipo de ciberataque cada vez m\u00e1s habitual es el phishing, que pretende enga\u00f1ar a la v\u00edctima mediante la suplantaci\u00f3n de identidad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\" \/>\n<meta property=\"og:site_name\" content=\"Enthec\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T15:59:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T14:48:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"amorena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"amorena\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\"},\"author\":{\"name\":\"amorena\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\"},\"headline\":\"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay\",\"datePublished\":\"2024-01-08T15:59:54+00:00\",\"dateModified\":\"2024-04-10T14:48:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\"},\"wordCount\":485,\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"keywords\":[\"Ciberseguridad\",\"Riesgos\"],\"articleSection\":[\"Ciberseguridad\",\"Riesgos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\",\"name\":\"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"datePublished\":\"2024-01-08T15:59:54+00:00\",\"dateModified\":\"2024-04-10T14:48:25+00:00\",\"description\":\"Un tipo de ciberataque cada vez m\u00e1s habitual es el phishing, que pretende enga\u00f1ar a la v\u00edctima mediante la suplantaci\u00f3n de identidad.\",\"breadcrumb\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"Licensed programmer running code on laptop, troubleshooting and updating data center equipment designed to accommodate server clusters, networking systems and storage arrays, close up\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\",\"name\":\"Enthec\",\"description\":\"La plataforma XTI automatizada\",\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization\"},\"alternateName\":\"Kartos by Enthec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization\",\"name\":\"Enthec\",\"alternateName\":\"Kartos by Enthec\u00e7\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"width\":512,\"height\":512,\"caption\":\"Enthec\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\",\"name\":\"amorena\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/author\/amorena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay - Enthec","description":"Un tipo de ciberataque cada vez m\u00e1s habitual es el phishing, que pretende enga\u00f1ar a la v\u00edctima mediante la suplantaci\u00f3n de identidad.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay - Enthec","og_description":"Un tipo de ciberataque cada vez m\u00e1s habitual es el phishing, que pretende enga\u00f1ar a la v\u00edctima mediante la suplantaci\u00f3n de identidad.","og_url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/","og_site_name":"Enthec","article_published_time":"2024-01-08T15:59:54+00:00","article_modified_time":"2024-04-10T14:48:25+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","type":"image\/jpeg"}],"author":"amorena","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"amorena","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#article","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/"},"author":{"name":"amorena","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661"},"headline":"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay","datePublished":"2024-01-08T15:59:54+00:00","dateModified":"2024-04-10T14:48:25+00:00","mainEntityOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/"},"wordCount":485,"publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","keywords":["Ciberseguridad","Riesgos"],"articleSection":["Ciberseguridad","Riesgos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/","name":"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay - Enthec","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","datePublished":"2024-01-08T15:59:54+00:00","dateModified":"2024-04-10T14:48:25+00:00","description":"Un tipo de ciberataque cada vez m\u00e1s habitual es el phishing, que pretende enga\u00f1ar a la v\u00edctima mediante la suplantaci\u00f3n de identidad.","breadcrumb":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#primaryimage","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Ciberataque-scaled.jpg","width":2560,"height":1440,"caption":"Licensed programmer running code on laptop, troubleshooting and updating data center equipment designed to accommodate server clusters, networking systems and storage arrays, close up"},{"@type":"BreadcrumbList","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mascalagrimas.es\/dev-enthec_old\/"},{"@type":"ListItem","position":2,"name":"Phishing: qu\u00e9 es y cu\u00e1ntos tipos hay"}]},{"@type":"WebSite","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/","name":"Enthec","description":"La plataforma XTI automatizada","publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization"},"alternateName":"Kartos by Enthec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization","name":"Enthec","alternateName":"Kartos by Enthec\u00e7","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","width":512,"height":512,"caption":"Enthec"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661","name":"amorena","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/author\/amorena\/"}]}},"_links":{"self":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts\/6280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/comments?post=6280"}],"version-history":[{"count":2,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts\/6280\/revisions"}],"predecessor-version":[{"id":7014,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts\/6280\/revisions\/7014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/media\/6309"}],"wp:attachment":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/media?parent=6280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/categories?post=6280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/tags?post=6280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}