{"id":32553,"date":"2025-09-30T09:13:57","date_gmt":"2025-09-30T07:13:57","guid":{"rendered":"https:\/\/www.abd.es\/?p=32553"},"modified":"2025-09-30T09:13:57","modified_gmt":"2025-09-30T07:13:57","slug":"ciberataques-inteligencia-artificial","status":"publish","type":"post","link":"https:\/\/www.abd.es\/en\/2025\/09\/ciberataques-inteligencia-artificial\/","title":{"rendered":"AI as a new vector for cyberattacks: threats and protection"},"content":{"rendered":"<p class=\"translation-block\"><strong>Artificial intelligence (AI)<\/strong> is not only transforming business, it is also reshaping cybersecurity threats. Increasingly, cybercriminals are using AI to carry out <strong>artificial intelligence\u2013driven cyberattacks<\/strong> that are more sophisticated, harder to detect, and potentially devastating for companies of all sizes.<\/p>\n<p class=\"translation-block\">In this article, we explore how AI enhances threats such as <strong>automated phishing<\/strong>, <strong>deepfakes<\/strong>, and <strong>personalized attacks<\/strong>, and most importantly: <strong>what measures you can take to protect your organization.<\/strong><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-32554 size-full\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.webp\" alt=\"ciberataques con inteligencia artificial\" width=\"1000\" height=\"563\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.webp 1000w, https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988-300x169.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988-768x432.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h2>Artificial intelligence and cybersecurity: a new era of threats?<\/h2>\n<p>AI makes it possible to analyze large volumes of data, identify patterns, and learn autonomously. These capabilities, when applied to cybercrime, have created a new scenario:<\/p>\n<ul>\n<li class=\"translation-block\"><strong>AI\u2011powered phishing<\/strong>: emails, messages, or calls that accurately mimic the language and style of real people.<\/li>\n<li class=\"translation-block\"><strong>Deepfakes and cyberattacks<\/strong>: fake videos or audio used to impersonate identities or manipulate business decisions.<\/li>\n<li class=\"translation-block\"><strong>AI\u2011driven personalized attacks<\/strong>: algorithms that gather public and private information to design tailor\u2011made fraud schemes.<\/li>\n<\/ul>\n<p class=\"translation-block\">According to <strong>ENISA<\/strong>, in 2025 <strong>42% of serious cybersecurity incidents in Europe<\/strong> are linked to attackers\u2019 use of AI.<\/p>\n<h2>Most common threats in AI\u2011driven cyberattacks<\/h2>\n<h3>AI\u2011automated phishing<\/h3>\n<p class=\"translation-block\">Traditionally, phishing was easy to spot due to spelling mistakes or generic messages. Today, <strong>generative language models<\/strong> make it possible to create flawless, personalized emails, increasing their effectiveness.<\/p>\n<p class=\"translation-block\"><strong>Real example<\/strong>: a Spanish company suffered a \u20ac250,000 fraud after receiving fake invoices automatically generated with AI, imitating the style of their usual supplier.<\/p>\n<h3>Deepfakes and identity impersonation<\/h3>\n<p class=\"translation-block\"><strong>Deepfakes in cyberattacks<\/strong> are increasingly used to deceive executives and employees. A fake audio clip can order a transfer, while a manipulated video can damage the company\u2019s reputation.<\/p>\n<p class=\"translation-block\"><strong>Fact<\/strong>: in 2024, a company in the United Kingdom lost \u20ac220,000 after receiving a deepfake call that imitated the CEO\u2019s voice.<\/p>\n<h3>AI\u2011driven personalized attacks<\/h3>\n<p class=\"translation-block\">AI gathers data from social networks, emails, and public documents to launch highly personalized <strong>spear\u2011phishing attacks<\/strong>. The more closely the message matches the victim\u2019s profile, the higher the probability of success.<\/p>\n<h2>How to protect yourself from AI\u2011driven cyberattacks<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-32555 size-full\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180305.206.webp\" alt=\"ciberataques con inteligencia artificial\" width=\"1000\" height=\"563\" srcset=\"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180305.206.webp 1000w, https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180305.206-300x169.webp 300w, https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180305.206-768x432.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h3>1. Invest in AI\u2011based cybersecurity technologies<\/h3>\n<p class=\"translation-block\">The best defense against malicious AI is <strong>defensive AI<\/strong>. Advanced detection platforms can identify anomalous patterns and respond in real time.<\/p>\n<h3>2. Ongoing training and awareness<\/h3>\n<p class=\"translation-block\">Employees remain the weakest link. <strong>AI\u2011powered phishing simulation<\/strong> programs help train staff response capabilities.<\/p>\n<h3>3. Robust verification policies<\/h3>\n<ul>\n<li>Multifactor authentication (MFA).<\/li>\n<li>Manual verification for critical operations (e.g., transfers).<\/li>\n<li>Confirmation protocols for sensitive communications.<\/li>\n<\/ul>\n<h3>4. Collaboration with trusted providers<\/h3>\n<p class=\"translation-block\">It is essential to choose partners that integrate <strong>artificial intelligence and cybersecurity<\/strong> into their solutions and operate under the European <strong>data protection<\/strong> regulations.<\/p>\n<h2>ABD and IONOS: digital security and cloud protection<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.abd.es\/wp-content\/uploads\/2024\/04\/46-1024x576.webp\" alt=\"ABD\" \/><\/p>\n<p class=\"translation-block\">At <a href=\"https:\/\/www.abd.es\/en\/\" target=\"_self\"><strong>ABD Consulting and IT Solutions<\/strong><\/a>, together with <strong>IONOS<\/strong>, we offer solutions that integrate <strong>digital sovereignty, <a href=\"https:\/\/www.abd.es\/en\/cloud-privado-vmware\/\" target=\"_self\">private cloud<\/a>, and advanced cybersecurity<\/strong> to protect companies against AI\u2011driven threats.<\/p>\n<p>With us, your organization can count on:<\/p>\n<ul>\n<li class=\"translation-block\"><strong>European data centers<\/strong>, free from external interference.<\/li>\n<li class=\"translation-block\">Tools for <strong>AI\u2011driven cyberattack monitoring and detection<\/strong>.<\/li>\n<li class=\"translation-block\">Personalized consulting to strengthen <strong>digital business resilience<\/strong>.<\/li>\n<\/ul>\n<p>Choosing ABD and IONOS means shielding your business against future risks.<\/p>\n<p class=\"translation-block\"><strong>AI\u2011driven cyberattacks<\/strong> are not a hypothesis; they are a reality already affecting thousands of companies. From <strong>advanced phishing<\/strong> to <strong>deepfakes<\/strong>, threats evolve at the same pace as technology.<\/p>\n<p class=\"translation-block\">The key lies in <strong>anticipating<\/strong>, adopting proactive measures and relying on providers that offer <strong>next\u2011generation digital security.<\/strong><\/p>\n<p class=\"translation-block\">Do you want to assess your company's level of protection against AI\u2011driven attacks? At <strong>ABD and IONOS<\/strong>, we can help you design a robust strategy that combines <strong>cybersecurity, digital sovereignty, and business continuity.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>La inteligencia artificial (IA) no solo est\u00e1 transformando los negocios, tambi\u00e9n est\u00e1 cambiando las amenazas de ciberseguridad. Cada vez m\u00e1s, los ciberdelincuentes emplean IA para ejecutar ciberataques con inteligencia artificial que son m\u00e1s sofisticados, dif\u00edciles de detectar y potencialmente devastadores para empresas de todos los tama\u00f1os. En este art\u00edculo exploramos c\u00f3mo la IA potencia amenazas [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":32556,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[79],"tags":[3563,3554,3557,3556],"class_list":["post-32553","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos","tag-cloud-privado","tag-ionos","tag-ionos-partner","tag-soberania-del-dato"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberataques con inteligencia artificial: c\u00f3mo protegerse<\/title>\n<meta name=\"description\" content=\"Los ciberataques con IA crecen: phishing, deepfakes y ataques personalizados. Descubre c\u00f3mo proteger tu empresa de estas amenazas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abd.es\/en\/2025\/09\/ciberataques-inteligencia-artificial\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberataques con inteligencia artificial: c\u00f3mo protegerse\" \/>\n<meta property=\"og:description\" content=\"Los ciberataques con IA crecen: phishing, deepfakes y ataques personalizados. Descubre c\u00f3mo proteger tu empresa de estas amenazas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abd.es\/en\/2025\/09\/ciberataques-inteligencia-artificial\/\" \/>\n<meta property=\"og:site_name\" content=\"ABD Consultora Inform\u00e1tica\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T07:13:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andr\u00e9s V\u00e1zquez Flores\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andr\u00e9s V\u00e1zquez Flores\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/\"},\"author\":{\"name\":\"Andr\u00e9s V\u00e1zquez Flores\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/person\\\/bd3469092923b6f52814328e887e927a\"},\"headline\":\"La IA como nuevo vector de ciberataques: amenazas y protecci\u00f3n\",\"datePublished\":\"2025-09-30T07:13:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/\"},\"wordCount\":707,\"publisher\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Empresas-2025-09-25T180247.988.jpg\",\"keywords\":[\"cloud privado\",\"IONOS\",\"IONOS partner\",\"soberan\u00eda del dato\"],\"articleSection\":[\"Articulos\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/\",\"url\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/\",\"name\":\"Ciberataques con inteligencia artificial: c\u00f3mo protegerse\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Empresas-2025-09-25T180247.988.jpg\",\"datePublished\":\"2025-09-30T07:13:57+00:00\",\"description\":\"Los ciberataques con IA crecen: phishing, deepfakes y ataques personalizados. Descubre c\u00f3mo proteger tu empresa de estas amenazas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Empresas-2025-09-25T180247.988.jpg\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Empresas-2025-09-25T180247.988.jpg\",\"width\":1000,\"height\":563,\"caption\":\"ciberataques con inteligencia artificial\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/2025\\\/09\\\/ciberataques-inteligencia-artificial\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.abd.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La IA como nuevo vector de ciberataques: amenazas y protecci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#website\",\"url\":\"https:\\\/\\\/www.abd.es\\\/\",\"name\":\"ABD Consultora Inform\u00e1tica\",\"description\":\"Soluciones Empresariales | Microsoft Gold Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.abd.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#organization\",\"name\":\"ABD Consultora Inform\u00e1tica\",\"url\":\"https:\\\/\\\/www.abd.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/cropped-consultoria-informatica-11.png\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/cropped-consultoria-informatica-11.png\",\"width\":64,\"height\":64,\"caption\":\"ABD Consultora Inform\u00e1tica\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abd-consultor-a-y-soluciones-inform-ticas\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/#\\\/schema\\\/person\\\/bd3469092923b6f52814328e887e927a\",\"name\":\"Andr\u00e9s V\u00e1zquez Flores\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/1e2b895d874c98c700855da371c80a06.jpg?ver=1778008631\",\"url\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/1e2b895d874c98c700855da371c80a06.jpg?ver=1778008631\",\"contentUrl\":\"https:\\\/\\\/www.abd.es\\\/wp-content\\\/litespeed\\\/avatar\\\/1e2b895d874c98c700855da371c80a06.jpg?ver=1778008631\",\"caption\":\"Andr\u00e9s V\u00e1zquez Flores\"},\"description\":\"Soy profesional en Marketing Digital y Social Media en ABD Consultor\u00eda y Soluciones Inform\u00e1ticas. Ayudo a las empresas a alcanzar sus metas a trav\u00e9s de estrategias de marketing digital efectivas y una gesti\u00f3n eficiente de las redes sociales.\",\"sameAs\":[\"https:\\\/\\\/abd.es\\\/\"],\"url\":\"https:\\\/\\\/www.abd.es\\\/en\\\/author\\\/andres\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberataques con inteligencia artificial: c\u00f3mo protegerse","description":"Los ciberataques con IA crecen: phishing, deepfakes y ataques personalizados. Descubre c\u00f3mo proteger tu empresa de estas amenazas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abd.es\/en\/2025\/09\/ciberataques-inteligencia-artificial\/","og_locale":"en_GB","og_type":"article","og_title":"Ciberataques con inteligencia artificial: c\u00f3mo protegerse","og_description":"Los ciberataques con IA crecen: phishing, deepfakes y ataques personalizados. Descubre c\u00f3mo proteger tu empresa de estas amenazas.","og_url":"https:\/\/www.abd.es\/en\/2025\/09\/ciberataques-inteligencia-artificial\/","og_site_name":"ABD Consultora Inform\u00e1tica","article_published_time":"2025-09-30T07:13:57+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.jpg","type":"image\/jpeg"}],"author":"Andr\u00e9s V\u00e1zquez Flores","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Andr\u00e9s V\u00e1zquez Flores","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#article","isPartOf":{"@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/"},"author":{"name":"Andr\u00e9s V\u00e1zquez Flores","@id":"https:\/\/www.abd.es\/#\/schema\/person\/bd3469092923b6f52814328e887e927a"},"headline":"La IA como nuevo vector de ciberataques: amenazas y protecci\u00f3n","datePublished":"2025-09-30T07:13:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/"},"wordCount":707,"publisher":{"@id":"https:\/\/www.abd.es\/#organization"},"image":{"@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.jpg","keywords":["cloud privado","IONOS","IONOS partner","soberan\u00eda del dato"],"articleSection":["Articulos"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/","url":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/","name":"Ciberataques con inteligencia artificial: c\u00f3mo protegerse","isPartOf":{"@id":"https:\/\/www.abd.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#primaryimage"},"image":{"@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.jpg","datePublished":"2025-09-30T07:13:57+00:00","description":"Los ciberataques con IA crecen: phishing, deepfakes y ataques personalizados. Descubre c\u00f3mo proteger tu empresa de estas amenazas.","breadcrumb":{"@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#primaryimage","url":"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.jpg","contentUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2025\/09\/Empresas-2025-09-25T180247.988.jpg","width":1000,"height":563,"caption":"ciberataques con inteligencia artificial"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abd.es\/2025\/09\/ciberataques-inteligencia-artificial\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.abd.es\/"},{"@type":"ListItem","position":2,"name":"La IA como nuevo vector de ciberataques: amenazas y protecci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/www.abd.es\/#website","url":"https:\/\/www.abd.es\/","name":"ABD IT Consulting","description":"Business Solutions | Microsoft Gold Partner","publisher":{"@id":"https:\/\/www.abd.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abd.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.abd.es\/#organization","name":"ABD IT Consulting","url":"https:\/\/www.abd.es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.abd.es\/wp-content\/uploads\/2023\/09\/cropped-consultoria-informatica-11.png","contentUrl":"https:\/\/www.abd.es\/wp-content\/uploads\/2023\/09\/cropped-consultoria-informatica-11.png","width":64,"height":64,"caption":"ABD Consultora Inform\u00e1tica"},"image":{"@id":"https:\/\/www.abd.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/abd-consultor-a-y-soluciones-inform-ticas\/"]},{"@type":"Person","@id":"https:\/\/www.abd.es\/#\/schema\/person\/bd3469092923b6f52814328e887e927a","name":"Andr\u00e9s V\u00e1zquez Flores","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/1e2b895d874c98c700855da371c80a06.jpg?ver=1778008631","url":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/1e2b895d874c98c700855da371c80a06.jpg?ver=1778008631","contentUrl":"https:\/\/www.abd.es\/wp-content\/litespeed\/avatar\/1e2b895d874c98c700855da371c80a06.jpg?ver=1778008631","caption":"Andr\u00e9s V\u00e1zquez Flores"},"description":"Soy profesional en Marketing Digital y Social Media en ABD Consultor\u00eda y Soluciones Inform\u00e1ticas. Ayudo a las empresas a alcanzar sus metas a trav\u00e9s de estrategias de marketing digital efectivas y una gesti\u00f3n eficiente de las redes sociales.","sameAs":["https:\/\/abd.es\/"],"url":"https:\/\/www.abd.es\/en\/author\/andres\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/32553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/comments?post=32553"}],"version-history":[{"count":0,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/posts\/32553\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/media\/32556"}],"wp:attachment":[{"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/media?parent=32553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/categories?post=32553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abd.es\/en\/wp-json\/wp\/v2\/tags?post=32553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}