{"id":3027,"date":"2025-09-30T15:39:42","date_gmt":"2025-09-30T13:39:42","guid":{"rendered":"https:\/\/cyberoperations.hu\/?p=3027"},"modified":"2025-09-30T15:50:14","modified_gmt":"2025-09-30T13:50:14","slug":"amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje","status":"publish","type":"post","link":"https:\/\/cyberoperations.hu\/es\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","title":{"rendered":"Cuando se acaba la cerveza: un nuevo nivel de ciberataques"},"content":{"rendered":"<p data-start=\"211\" data-end=\"726\">A finales de septiembre, un grave ciberataque paraliz\u00f3 el <strong data-start=\"265\" data-end=\"280\">Grupo Asahi<\/strong> F\u00e1bricas japonesas. El mayor productor de cerveza de Jap\u00f3n, propietario de marcas de renombre mundial como <strong data-start=\"378\" data-end=\"416\">Peroni, Pilsner Urquell y Grolsch<\/strong> \u2013 fue forzado <strong data-start=\"434\" data-end=\"469\">detener completamente la producci\u00f3n<\/strong>y suspender la <strong data-start=\"497\" data-end=\"572\">actividades de procesamiento de pedidos, env\u00edo y servicio al cliente<\/strong>Aunque afortunadamente la cadena de suministro internacional se mantuvo intacta, la p\u00e9rdida del mercado interno fue un grave problema. <strong data-start=\"664\" data-end=\"699\">da\u00f1os econ\u00f3micos y reputacionales<\/strong> reportado a la empresa.<\/p>\n<p data-start=\"728\" data-end=\"925\">Este caso pone de relieve una vez m\u00e1s que los ciberataques ya no son s\u00f3lo problemas inform\u00e1ticos: <strong data-start=\"815\" data-end=\"873\">amenazas estrat\u00e9gicas a las operaciones comerciales<\/strong>, que puede llegar a cualquier persona, independientemente de la industria.<\/p>\n<h2 data-start=\"927\" data-end=\"982\">No es un caso \u00fanico: ejemplos instructivos de otras empresas<\/h2>\n<h2 data-start=\"71\" data-end=\"120\">Fabricante de joyas Pandora (agosto de 2025)<\/h2>\n<p data-start=\"121\" data-end=\"736\">Pandora danesa, uno de los distribuidores de joyas m\u00e1s grandes del mundo <strong data-start=\"180\" data-end=\"248\">confirm\u00f3 a principios de agosto que hab\u00eda sido v\u00edctima de un ciberataque<\/strong>El incidente provoc\u00f3 un acceso no autorizado a los sistemas inform\u00e1ticos de la empresa y comprometi\u00f3 una cantidad significativa de datos. Aunque se desconoce la magnitud total de los da\u00f1os, los expertos afirman que los datos personales de millones de clientes podr\u00edan haberse visto afectados. Tras el ataque, Pandora cerr\u00f3 temporalmente algunos de sus sistemas en l\u00ednea e inici\u00f3 procesos de recuperaci\u00f3n de emergencia. El incidente tambi\u00e9n provoc\u00f3 una grave crisis de reputaci\u00f3n, ya que la confianza del cliente es fundamental para una marca de lujo.<\/p>\n<h2 data-start=\"743\" data-end=\"827\">Aeropuertos europeos (septiembre de 2025)<\/h2>\n<p data-start=\"828\" data-end=\"1509\">Mediados de septiembre <strong data-start=\"847\" data-end=\"910\">Un ciberataque coordinado afecta a varios aeropuertos europeos importantes<\/strong>Los objetivos inclu\u00edan los aeropuertos de Londres Heathrow, Berl\u00edn y Bruselas. Los ataques resultaron en... <strong data-start=\"1021\" data-end=\"1093\">Cientos de vuelos fueron cancelados, decenas de miles de pasajeros quedaron varados en las terminales.<\/strong>Las aerol\u00edneas sufrieron p\u00e9rdidas millonarias. Los expertos afirman que los ataques podr\u00edan haber sido perpetrados por grupos con motivaciones pol\u00edticas que buscaban explorar las vulnerabilidades de la infraestructura cr\u00edtica europea. El incidente pone de relieve c\u00f3mo los sistemas digitales de los aeropuertos son un objetivo prioritario, y los riesgos de ciberseguridad pueden traducirse directamente en preocupaciones sobre la seguridad de los pasajeros.<\/p>\n<h2 data-start=\"1516\" data-end=\"1603\">Jaguar Land Rover (septiembre de 2025)<\/h2>\n<p data-start=\"1604\" data-end=\"2297\">Jaguar Land Rover <strong data-start=\"1625\" data-end=\"1676\">sufri\u00f3 un ciberataque a gran escala a principios de septiembre<\/strong>, por lo que las f\u00e1bricas de la empresa tienen al menos <strong data-start=\"1720\" data-end=\"1765\">La producci\u00f3n se detuvo por completo el 1 de octubre.<\/strong>Esto supuso la p\u00e9rdida de producci\u00f3n de miles de coches al d\u00eda, as\u00ed como <strong data-start=\"1835\" data-end=\"1872\">Decenas de millones de libras en p\u00e9rdidas<\/strong> causado a la empresa. El ataque no solo afect\u00f3 a JLR: la <strong data-start=\"1930\" data-end=\"1971\">Proveedores que operan en Nitra, Eslovaquia<\/strong> (por ejemplo, el fabricante de sistemas de escape Ebersp\u00e4cher) tambi\u00e9n se vio obligado a cerrar, con sus empleados trabajando a tiempo parcial o de baja. El Centro Nacional de Ciberseguridad (NCSC) del Reino Unido y las autoridades est\u00e1n colaborando para restablecer los sistemas. Los sindicatos temen que, sin la ayuda del gobierno, se produzcan despidos masivos.<\/p>\n<h3 data-start=\"2018\" data-end=\"2046\">\u00bfPor qu\u00e9 sucede todo esto?<\/h3>\n<p data-start=\"2047\" data-end=\"2270\">Los ciberdelincuentes tienen diversas motivaciones: ganar dinero, perseguir objetivos pol\u00edticos o ideol\u00f3gicos, o simplemente desestabilizar infraestructuras cr\u00edticas. Sin embargo, tienen algo en com\u00fan: <strong data-start=\"2228\" data-end=\"2267\">Est\u00e1n buscando el eslab\u00f3n d\u00e9bil de la defensa<\/strong>.<\/p>\n<h2 data-start=\"2272\" data-end=\"2303\">\u00bfQu\u00e9 pueden hacer las empresas?<\/h2>\n<p data-start=\"2305\" data-end=\"2507\">Se acabaron los d\u00edas de antivirus y firewalls obsoletos. Contra los ciberataques actuales, solo... <strong data-start=\"2384\" data-end=\"2417\">protecci\u00f3n proactiva de m\u00faltiples capas<\/strong>, <strong data-start=\"2419\" data-end=\"2449\">Monitoreo de seguridad 24\/7<\/strong> y <strong data-start=\"2453\" data-end=\"2478\">gesti\u00f3n r\u00e1pida de incidentes<\/strong> significa seguridad real.<\/p>\n<p data-start=\"2509\" data-end=\"2602\">EL <strong data-start=\"2511\" data-end=\"2531\">Operaciones cibern\u00e9ticas<\/strong> proporcionado por <strong data-start=\"2547\" data-end=\"2576\">Servicios de seguridad gestionados<\/strong> ofrece lo siguiente:<\/p>\n<p data-start=\"253\" data-end=\"420\">Los servicios gestionados de Cyber Operations combinan tecnolog\u00edas de \u00faltima generaci\u00f3n que pueden <strong data-start=\"355\" data-end=\"389\">prevenir, detectar y tratar<\/strong> Los \u00faltimos ciberataques:<\/p>\n<ul data-start=\"422\" data-end=\"1160\">\n<li data-start=\"422\" data-end=\"706\">\n<p data-start=\"424\" data-end=\"706\"><strong data-start=\"424\" data-end=\"453\">OpenSOC XDR de Stellar Cyber<\/strong>Un centro de ciberdefensa basado en IA que analiza datos de TI, OT y sistemas en la nube en tiempo real. Ofrece visibilidad completa en una \u00fanica interfaz, lo que permite detectar y detener ataques con mayor rapidez.<\/p>\n<\/li>\n<li data-start=\"707\" data-end=\"1002\">\n<p data-start=\"709\" data-end=\"1002\"><strong data-start=\"709\" data-end=\"726\">Instinto profundo<\/strong>:El primer marco de ciberseguridad basado en aprendizaje profundo del mundo que cuesta menos que <strong data-start=\"811\" data-end=\"838\">En 20 milisegundos<\/strong> Tambi\u00e9n puede detener ataques desconocidos de d\u00eda cero. Su ventaja es <strong data-start=\"906\" data-end=\"958\">tasa de falsas alarmas extremadamente baja (&lt;0,1%)<\/strong>, lo que resulta en un funcionamiento m\u00e1s eficiente del SOC.<\/p>\n<\/li>\n<li data-start=\"1003\" data-end=\"1160\">\n<p data-start=\"1005\" data-end=\"1160\"><strong data-start=\"1005\" data-end=\"1031\">Monitoreo continuo<\/strong>:Proporcionamos monitorizaci\u00f3n de seguridad y gesti\u00f3n de incidentes 24 horas al d\u00eda, 7 d\u00edas a la semana, con intervenci\u00f3n remota o incluso en sitio, a pedido.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1162\" data-end=\"1201\">\u00bfPor qu\u00e9 es esto beneficioso para las empresas?<\/h3>\n<ul data-start=\"1202\" data-end=\"1696\">\n<li data-start=\"1202\" data-end=\"1298\">\n<p data-start=\"1204\" data-end=\"1298\"><strong data-start=\"1204\" data-end=\"1227\">Transparencia total<\/strong>:Todos los entornos digitales (TI, OT, nube) se pueden monitorear en un solo lugar.<\/p>\n<\/li>\n<li data-start=\"1299\" data-end=\"1410\">\n<p data-start=\"1301\" data-end=\"1410\"><strong data-start=\"1301\" data-end=\"1331\">Respuestas automatizadas<\/strong>:el sistema responde de forma coordinada y r\u00e1pida, minimizando los errores humanos.<\/p>\n<\/li>\n<li data-start=\"1411\" data-end=\"1588\">\n<p data-start=\"1413\" data-end=\"1588\"><strong data-start=\"1413\" data-end=\"1435\">Ventaja tecnol\u00f3gica<\/strong>:una \u00fanica suscripci\u00f3n puede llenar el vac\u00edo tecnol\u00f3gico t\u00edpico del mercado (XDR, SIEM, SOAR, IDS, etc.), por lo que la empresa cumple con los <strong data-start=\"1561\" data-end=\"1582\">Especificaciones del NIS2<\/strong> tambi\u00e9n.<\/p>\n<\/li>\n<li data-start=\"1589\" data-end=\"1696\">\n<p data-start=\"1591\" data-end=\"1696\"><strong data-start=\"1591\" data-end=\"1619\">Soluci\u00f3n rentable<\/strong>:disponible en un modelo de tarifa mensual, escalable al tama\u00f1o de la red protegida.<\/p>\n<\/li>\n<\/ul>\n<ul data-start=\"2604\" data-end=\"3078\">\n<li data-start=\"2604\" data-end=\"2707\">\n<p data-start=\"2606\" data-end=\"2707\"><strong data-start=\"2606\" data-end=\"2665\">Monitoreo continuo del SOC (Centro de Operaciones de Seguridad)<\/strong> con el apoyo de la inteligencia artificial<\/p>\n<\/li>\n<li data-start=\"2708\" data-end=\"2791\">\n<p data-start=\"2710\" data-end=\"2791\"><strong data-start=\"2710\" data-end=\"2758\">Detecci\u00f3n y remediaci\u00f3n de amenazas en tiempo real<\/strong> con las tecnolog\u00edas m\u00e1s modernas<\/p>\n<\/li>\n<li data-start=\"2792\" data-end=\"2891\">\n<p data-start=\"2794\" data-end=\"2891\"><strong data-start=\"2794\" data-end=\"2827\">Cumplimiento de NIS2 e ISO 27001<\/strong> garantizar el cumplimiento de los requisitos reglamentarios<\/p>\n<\/li>\n<li data-start=\"2892\" data-end=\"2971\">\n<p data-start=\"2894\" data-end=\"2971\"><strong data-start=\"2894\" data-end=\"2931\">Ingenieros y consultores experimentados<\/strong> Apoyo inmediato en caso de incidentes<\/p>\n<\/li>\n<li data-start=\"2972\" data-end=\"3078\">\n<p data-start=\"2974\" data-end=\"3078\"><strong data-start=\"2974\" data-end=\"3007\">Gesti\u00f3n de riesgos de la cadena de suministro<\/strong>, que mantiene seguros no solo a la empresa sino tambi\u00e9n a sus socios.<\/p>\n<\/li>\n<\/ul>\n<h2 data-start=\"417\" data-end=\"463\">Tecnolog\u00eda + Seguro = Protecci\u00f3n Completa<\/h2>\n<p data-start=\"465\" data-end=\"697\">Protegerse contra ciberataques no es solo cuesti\u00f3n de tecnolog\u00eda. Incluso con los mejores sistemas de defensa, un ataque puede tener \u00e9xito. En tales casos, <strong data-start=\"625\" data-end=\"694\">Adem\u00e1s de una respuesta r\u00e1pida, la gesti\u00f3n del da\u00f1o financiero tambi\u00e9n es vital<\/strong>.<\/p>\n<p data-start=\"699\" data-end=\"814\">Esto se ve facilitado por la <strong data-start=\"724\" data-end=\"783\">Colonnade Insurance Red de Seguridad Virtual Seguro Cibern\u00e9tico<\/strong>, que abarca, entre otros:<\/p>\n<ul data-start=\"815\" data-end=\"1099\">\n<li data-start=\"815\" data-end=\"878\">\n<p data-start=\"817\" data-end=\"878\">los costos de recuperaci\u00f3n de datos y restauraci\u00f3n del sistema,<\/p>\n<\/li>\n<li data-start=\"879\" data-end=\"928\">\n<p data-start=\"881\" data-end=\"928\">p\u00e9rdidas resultantes de la interrupci\u00f3n del negocio,<\/p>\n<\/li>\n<li data-start=\"929\" data-end=\"988\">\n<p data-start=\"931\" data-end=\"988\">pagos de rescate relacionados con ataques de ransomware,<\/p>\n<\/li>\n<li data-start=\"989\" data-end=\"1045\">\n<p data-start=\"991\" data-end=\"1045\">los costes de los procedimientos judiciales y las multas regulatorias,<\/p>\n<\/li>\n<li data-start=\"1046\" data-end=\"1099\">\n<p data-start=\"1048\" data-end=\"1099\">as\u00ed como gastos de relaciones p\u00fablicas y gesti\u00f3n de reputaci\u00f3n.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1101\" data-end=\"1322\">Por lo tanto, el <strong data-start=\"1107\" data-end=\"1164\">Servicios de seguridad gestionados de operaciones cibern\u00e9ticas<\/strong> y el <strong data-start=\"1170\" data-end=\"1200\">Colonnade Cyber Insurance<\/strong> Juntos, son capaces no s\u00f3lo de prevenir sino tambi\u00e9n de gestionar los incidentes m\u00e1s grandes, tanto tecnol\u00f3gicamente como financieramente.<\/p>\n<h2 data-start=\"3080\" data-end=\"3119\">El mayor riesgo: la inacci\u00f3n<\/h2>\n<p data-start=\"3121\" data-end=\"3300\">Hoy en d\u00eda, la cuesti\u00f3n ya no es si \u201cpodr\u00edan ocurrir\u201d, sino si ocurrir\u00e1n. <strong data-start=\"3208\" data-end=\"3217\">Cuando<\/strong> La pregunta es si la empresa estar\u00e1 preparada o no.<\/p>\n<p data-start=\"3302\" data-end=\"3466\">\ud83d\udc49 <strong data-start=\"3305\" data-end=\"3342\">Solicite una consulta gratuita ahora<\/strong>y le mostraremos c\u00f3mo podemos proteger su empresa contra los ciberataques m\u00e1s modernos. <a href=\"https:\/\/cyberoperations.hu\/es\/kapcsolat\/\">https:\/\/cyberoperations.hu\/kapcsolat\/<\/a><\/p>\n<p data-start=\"3302\" data-end=\"3466\">","protected":false},"excerpt":{"rendered":"<p>Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3028,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-egyeb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/es\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\" \/>\n<meta property=\"og:description\" content=\"Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/es\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T13:39:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T13:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sales Cyberoperations\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sales Cyberoperations\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"},\"author\":{\"name\":\"Sales Cyberoperations\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\"},\"headline\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\",\"datePublished\":\"2025-09-30T13:39:42+00:00\",\"dateModified\":\"2025-09-30T13:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"},\"wordCount\":1326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"articleSection\":[\"Egy\u00e9b\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\",\"name\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"datePublished\":\"2025-09-30T13:39:42+00:00\",\"dateModified\":\"2025-09-30T13:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cyber-Attack.png\",\"width\":800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/person\\\/ca194f8232fedc6dfea84a20e83bebbe\",\"name\":\"Sales Cyberoperations\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/es\\\/author\\\/sales\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cuando se acaba la cerveza: un nuevo nivel de ciberataques - Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/es\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","og_locale":"es_ES","og_type":"article","og_title":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje","og_description":"Szeptember v\u00e9g\u00e9n s\u00falyos kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg az Asahi Group jap\u00e1n \u00fczemeit. Jap\u00e1n legnagyobb s\u00f6rgy\u00e1rt\u00f3ja \u2013 amely vil\u00e1gszerte ismert m\u00e1rk\u00e1kat birtokol, [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/es\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","og_site_name":"Cyber Operations Group Kft.","article_published_time":"2025-09-30T13:39:42+00:00","article_modified_time":"2025-09-30T13:50:14+00:00","og_image":[{"width":800,"height":1200,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","type":"image\/png"}],"author":"Sales Cyberoperations","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Sales Cyberoperations","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#article","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"},"author":{"name":"Sales Cyberoperations","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe"},"headline":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje","datePublished":"2025-09-30T13:39:42+00:00","dateModified":"2025-09-30T13:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"},"wordCount":1326,"commentCount":0,"publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","articleSection":["Egy\u00e9b"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","url":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/","name":"Cuando se acaba la cerveza: un nuevo nivel de ciberataques - Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","datePublished":"2025-09-30T13:39:42+00:00","dateModified":"2025-09-30T13:50:14+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/09\/cyber-Attack.png","width":800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/amikor-a-sor-is-megall-a-kibertamadasok-uj-szintje\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Amikor a s\u00f6r is meg\u00e1ll: a kibert\u00e1mad\u00e1sok \u00faj szintje"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Grupo de Operaciones Cibern\u00e9ticas Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Grupo de Operaciones Cibern\u00e9ticas Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberoperations.hu\/#\/schema\/person\/ca194f8232fedc6dfea84a20e83bebbe","name":"Operaciones cibern\u00e9ticas de ventas","url":"https:\/\/cyberoperations.hu\/es\/author\/sales\/"}]}},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/posts\/3027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/comments?post=3027"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/posts\/3027\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/media\/3028"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/media?parent=3027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/categories?post=3027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/es\/wp-json\/wp\/v2\/tags?post=3027"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}