{"id":108041,"date":"2021-11-08T10:05:00","date_gmt":"2021-11-08T09:05:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=108041"},"modified":"2021-10-06T12:10:22","modified_gmt":"2021-10-06T10:10:22","slug":"tambien-linux-es-atacado","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/auch-linux-wird-angegriffen\/","title":{"rendered":"Linux tambi\u00e9n est\u00e1 siendo atacado"},"content":{"rendered":"<p>Muchos dispositivos IoT modernos, aplicaciones en la nube y tecnolog\u00edas funcionan con una variante de Linux, que debe protegerse como componente importante de las infraestructuras modernas. Como muestra el estudio, la mayor\u00eda de las vulnerabilidades emanaban de sistemas que ejecutaban versiones obsoletas de distribuciones de Linux, incluido el 44% de las versiones 7.4 a 7.9 de CentOS. Adem\u00e1s, en solo seis meses se explotaron 200 vulnerabilidades diferentes en entornos Linux, por ejemplo a trav\u00e9s del puerto 22 en aplicaciones IoT.<\/p>","protected":false},"excerpt":{"rendered":"<p>Un estudio de Trend Micro ofrece una visi\u00f3n de c\u00f3mo los sistemas operativos Linux son cada vez m\u00e1s el objetivo de los atacantes debido a la transformaci\u00f3n en curso de la nube.<\/p>","protected":false},"author":38,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,39822],"tags":[20346,67,1516,117,10343],"coauthors":[19920],"class_list":["post-108041","post","type-post","status-publish","format-standard","hentry","category-sap-nachrichten","category-mag-21-10","tag-cybersecurity","tag-linux","tag-security","tag-sicherheit","tag-trend-micro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","image-100":"","image-480":"","image-640":"","image-720":"","image-960":"","image-1168":"","image-1440":"","image-1920":"","1536x1536":"","2048x2048":"","trp-custom-language-flag":"","bricks_large_16x9":"","bricks_large":"","bricks_large_square":"","bricks_medium":"","bricks_medium_square":"","profile_24":"","profile_48":"","profile_96":"","profile_150":"","profile_300":""},"post_excerpt_stackable_v2":"<p>Eine Studie von Trend Micro gew\u00e4hrt Einblick, wie Linux-Betriebssysteme aufgrund der fortschreitenden Cloud-Transformation verst\u00e4rkt ins Visier von Angreifern geraten.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/category\/mag-21-10\/\" rel=\"category tag\">MAG 21-10<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/108041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=108041"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/108041\/revisions"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=108041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=108041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=108041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=108041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}