{"version":"1.0","provider_name":"Nube Ninja","provider_url":"https:\/\/nube.ninja\/enterate","author_name":"Soporte ANDO","author_url":"https:\/\/nube.ninja\/enterate\/author\/hostmaster","title":"Seguridad reforzada: El impacto del pentesting - Nube Ninja","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"rqMnc0x3UL\"><a href=\"https:\/\/nube.ninja\/enterate\/seguridad-reforzada-el-impacto-del-pentesting\">Seguridad reforzada: El impacto del pentesting<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/nube.ninja\/enterate\/seguridad-reforzada-el-impacto-del-pentesting\/embed#?secret=rqMnc0x3UL\" width=\"600\" height=\"338\" title=\"&#8220;Seguridad reforzada: El impacto del pentesting&#8221; &#8212; Nube Ninja\" data-secret=\"rqMnc0x3UL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/nube.ninja\/enterate\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/nube.ninja\/enterate\/wp-content\/uploads\/2024\/02\/NubeNinja_Seguridad-reforzada.jpg","thumbnail_width":1200,"thumbnail_height":600,"description":"Una prueba de penetraci\u00f3n, tambi\u00e9n conocida como pentest, implica la simulaci\u00f3n de un ataque cibern\u00e9tico en un sistema inform\u00e1tico para evaluar posibles vulnerabilidades explotables. En el contexto de la seguridad ... Leer m\u00e1s"}