{"id":1943,"date":"2026-03-21T07:31:46","date_gmt":"2026-03-21T07:31:46","guid":{"rendered":"https:\/\/mscyber.tech\/?page_id=1943"},"modified":"2026-03-24T05:23:00","modified_gmt":"2026-03-24T05:23:00","slug":"informacion-sobre-amenazas-2","status":"publish","type":"page","link":"https:\/\/mscyber.tech\/es\/informacion-sobre-amenazas-2\/","title":{"rendered":"Inteligencia sobre amenazas"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1943\" class=\"elementor elementor-1943\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a63fab e-flex e-con-boxed e-con e-parent\" data-id=\"0a63fab\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4bebe1f e-con-full e-flex e-con e-child\" data-id=\"4bebe1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-e30d883 e-con-full e-flex e-con e-child\" data-id=\"e30d883\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-ec0b8ca e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ec0b8ca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-413a757 e-con-full e-flex e-con e-child\" data-id=\"413a757\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba33db4 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ba33db4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Inicio \/<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1d99d3 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f1d99d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Soluciones \/<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-429b355 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"429b355\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Inteligencia sobre amenazas<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e573a9 e-con-full e-flex e-con e-child\" data-id=\"2e573a9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77b91c6 elementor-widget-tablet_extra__width-initial elementor-widget elementor-widget-heading\" data-id=\"77b91c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inteligencia sobre ciberamenazas y supervisi\u00f3n de riesgos digitales<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b685574 e-con-full e-flex e-con e-child\" data-id=\"b685574\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d24669d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d24669d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Mercurius Threat Intelligence identifica las amenazas emergentes, los actores maliciosos y la exposici\u00f3n digital antes de que los ataques afecten a su organizaci\u00f3n.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707eafc elementor-widget elementor-widget-button\" data-id=\"707eafc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wa.me\/56994096012\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ponte en contacto<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-612bfc0 e-con-full e-flex e-con e-child\" data-id=\"612bfc0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-a909749 e-con-full solution_counter_box e-flex e-con e-child\" data-id=\"a909749\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-e463e4d e-con-full number_card animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"e463e4d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-864814e elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"864814e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">01<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5872df elementor-widget__width-inherit number_overlay elementor-widget elementor-widget-image\" data-id=\"e5872df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"286\" height=\"433\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png\" class=\"attachment-full size-full wp-image-1955\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png 286w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-198x300.png 198w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-8x12.png 8w\" sizes=\"(max-width: 286px) 100vw, 286px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f6a3ee e-con-full number_card animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"8f6a3ee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9edfa59 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"9edfa59\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">02<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5fbfbb elementor-widget__width-inherit number_overlay elementor-widget elementor-widget-image\" data-id=\"f5fbfbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"286\" height=\"433\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png\" class=\"attachment-full size-full wp-image-1955\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png 286w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-198x300.png 198w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-8x12.png 8w\" sizes=\"(max-width: 286px) 100vw, 286px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7e707c e-con-full number_card animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"f7e707c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:500,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c84f209 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"c84f209\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">03<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4a1bc3 elementor-widget__width-inherit number_overlay active elementor-widget elementor-widget-image\" data-id=\"b4a1bc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"286\" height=\"433\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png\" class=\"attachment-full size-full wp-image-1955\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png 286w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-198x300.png 198w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-8x12.png 8w\" sizes=\"(max-width: 286px) 100vw, 286px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-514cfdb e-con-full number_card animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"514cfdb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:600,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f9d3a6 elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"0f9d3a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">04<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9191b8 elementor-widget__width-inherit number_overlay  elementor-widget elementor-widget-image\" data-id=\"f9191b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"286\" height=\"433\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png\" class=\"attachment-full size-full wp-image-1955\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522.png 286w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-198x300.png 198w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Rectangle-6522-8x12.png 8w\" sizes=\"(max-width: 286px) 100vw, 286px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13d295d elementor-widget__width-initial elementor-absolute elementor-widget elementor-widget-image\" data-id=\"13d295d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1237\" height=\"351\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Vector-3270.png\" class=\"attachment-full size-full wp-image-1956\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Vector-3270.png 1237w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Vector-3270-300x85.png 300w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Vector-3270-1024x291.png 1024w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Vector-3270-768x218.png 768w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Vector-3270-18x5.png 18w\" sizes=\"(max-width: 1237px) 100vw, 1237px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49d4394 e-con-full e-flex e-con e-child\" data-id=\"49d4394\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;position&quot;:&quot;absolute&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-32dbbb2 e-con-full single_item  animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"32dbbb2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:300,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e90147c elementor-widget elementor-widget-heading\" data-id=\"e90147c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">01<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deecc5d elementor-widget elementor-widget-heading\" data-id=\"deecc5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CTI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa1245f elementor-widget elementor-widget-text-editor\" data-id=\"aa1245f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Seguimiento de los actores de las amenazas, las campa\u00f1as de ataque y las vulnerabilidades.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff9a203 e-con-full single_item  animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"ff9a203\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b31330 elementor-widget elementor-widget-heading\" data-id=\"4b31330\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">02<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71300a9 elementor-widget elementor-widget-heading\" data-id=\"71300a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Web oscura<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5d7613 elementor-widget elementor-widget-text-editor\" data-id=\"f5d7613\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Detecci\u00f3n de credenciales filtradas, datos robados y activos comprometidos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-601812a e-con-full single_item active animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"601812a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:500,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cb1ce3 elementor-widget elementor-widget-heading\" data-id=\"5cb1ce3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">03<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e0cea1 elementor-widget elementor-widget-heading\" data-id=\"1e0cea1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protecci\u00f3n de marca<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f04d15 elementor-widget elementor-widget-text-editor\" data-id=\"8f04d15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Identificaci\u00f3n de dominios de phishing y suplantaci\u00f3n digital<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4acb6fa e-con-full single_item  animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"4acb6fa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:600,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb83cc elementor-widget elementor-widget-heading\" data-id=\"0bb83cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">04<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecd928f elementor-widget elementor-widget-heading\" data-id=\"ecd928f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Inteligencia en materia de fraude<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8d0209 elementor-widget elementor-widget-text-editor\" data-id=\"f8d0209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Seguimiento de campa\u00f1as de fraude dirigidas a organizaciones e instituciones financieras.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea24af2 elementor-absolute elementor-widget-tablet__width-initial hero_left_shape elementor-widget elementor-widget-image\" data-id=\"ea24af2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"641\" height=\"827\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153010-1.webp\" class=\"attachment-full size-full wp-image-1810\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153010-1.webp 641w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153010-1-233x300.webp 233w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153010-1-9x12.webp 9w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12d0aca elementor-absolute elementor-widget-tablet__width-initial hero_left_shape elementor-widget elementor-widget-image\" data-id=\"12d0aca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"641\" height=\"827\" src=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153006-1.webp\" class=\"attachment-full size-full wp-image-1811\" alt=\"\" srcset=\"https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153006-1.webp 641w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153006-1-233x300.webp 233w, https:\/\/mscyber.tech\/wp-content\/uploads\/2026\/03\/Group-1261153006-1-9x12.webp 9w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9d4372 elementor-widget elementor-widget-html\" data-id=\"b9d4372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t\n\n\n\n\n<script>\njQuery(window).on('load', function() {\n    jQuery('.hero_left_shape').css('display', 'block').hide().fadeIn(800);\n});\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home \/ Solutions \/ Threat Intelligence Cyber Threat Intelligence &amp; Digital Risk Monitoring Mercurius Threat Intelligence identifies emerging threats, malicious actors and digital exposure before attacks impact your organization. Get in Touch 01 02 03 04 01 CTI Monitoring of threat actors, attack campaigns and vulnerabilities. 02 Dark Web Detection of leaked credentials, stolen data [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1015,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1943","page","type-page","status-publish","has-post-thumbnail","hentry"],"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"_links":{"self":[{"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/pages\/1943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/comments?post=1943"}],"version-history":[{"count":34,"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/pages\/1943\/revisions"}],"predecessor-version":[{"id":2259,"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/pages\/1943\/revisions\/2259"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/media\/1015"}],"wp:attachment":[{"href":"https:\/\/mscyber.tech\/es\/wp-json\/wp\/v2\/media?parent=1943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}