{"version":"1.0","provider_name":"Xelere","provider_url":"https:\/\/xelere.com\/en","author_name":"xelere","author_url":"https:\/\/xelere.com\/en\/author\/lalonso\/","title":"Red Team: Estrategia de Ciberseguridad Avanzada - Xelere","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"R4S7lpnePP\"><a href=\"https:\/\/xelere.com\/en\/red-team-estrategia-de-ciberseguridad-avanzada\/\">Red Team: Estrategia de Ciberseguridad Avanzada<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/xelere.com\/en\/red-team-estrategia-de-ciberseguridad-avanzada\/embed\/#?secret=R4S7lpnePP\" width=\"600\" height=\"338\" title=\"&#8220;Red Team: Estrategia de Ciberseguridad Avanzada&#8221; &#8212; Xelere\" data-secret=\"R4S7lpnePP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/xelere.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/xelere.com\/wp-content\/uploads\/2026\/03\/Portada-de-blog-para-Xelere-1.jpg","thumbnail_width":1920,"thumbnail_height":1080,"description":"Escrito por: Sergio Hrabinski, Socio &#8211; Gerente Soluciones y Servicios de Ciberseguridad En un panorama digital donde las amenazas evolucionan con velocidad r\u00e9cord y los atacantes adoptan t\u00e9cnicas cada vez m\u00e1s sofisticadas, las organizaciones modernas necesitan ir m\u00e1s all\u00e1 de los controles tradicionales de seguridad. Para l\u00edderes de TI, los ejercicios de Red Teaming representan [&hellip;]"}