{"id":5705,"date":"2019-09-05T18:09:44","date_gmt":"2019-09-05T17:09:44","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5705"},"modified":"2021-07-13T12:15:32","modified_gmt":"2021-07-13T11:15:32","slug":"know-your-cybersecurity-different-types-malware","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware","title":{"rendered":"Know Your Cybersecurity: The Different Types of Malware"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>f you want to be taken seriously when providing security services, then you need to make sure you have your terminology down. And even if you think you already know the fundamentals, it helps from time to time to refresh your knowledge. If you can\u2019t remember the difference between a rootkit and a trojan, you could end up looking foolish or even losing a sales pitch to a new client.<\/p>\n<p>Today, we want to get back to the basics and cover the different types of malware. With over\u00a0<a class=\"ext\" href=\"https:\/\/www.av-test.org\/en\/statistics\/malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">350,000 new strains of malware<\/a>\u00a0discovered each day, it\u2019s important to know the types of malware you could run into\u2014and how to deal with them.<\/p>\n<h3>The classes of malware<\/h3>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div class=\"sidebar-width-40\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<aside class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-related-resources paragraph--view-mode--default\">\n<div class=\"related-resources-sidebar clearfix\">\n<div class=\"info-box\">\n<p class=\"text-align-center\"><span style=\"font-size: 16px\">Before we get into individual types, we should start with a basic definition. \u201cMalware\u201d is short for malicious software, and refers to files attempting to gain unauthorized access to a system. Not all cyberthreats are malware-based, but many are. Here are a few types you need to be aware of:\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/aside>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<ul>\n<li><b>Virus<\/b><br \/>\nWhen many people think of cyberthreats, they think of viruses. A virus is an executable file that spreads within a machine. One virus could infect multiple files or programs, and do such things as delete data or modify sensitive information on a machine. Some viruses are harmless, but it\u2019s never worth the risk of leaving one be.<\/li>\n<li><b>Worms<\/b><br \/>\nWhile viruses spread between files on a computer, worms spread to other machines on a network. These can take down networks, or at least create enough bottlenecks to hamper productivity. Worms can be lethal\u2014the 2003 SQL Slammer worm infected\u00a0<a class=\"ext\" href=\"https:\/\/www.theregister.co.uk\/2017\/02\/05\/sql_slammer_back\/\" target=\"_blank\" rel=\"noopener noreferrer\">tens of thousands of servers in minutes<\/a>. In short, if you find a worm, make sure to quarantine the file and fix it before it takes your customers\u2019 networks down.<\/li>\n<li><b>Trojan<\/b><br \/>\nYou may be familiar with the ancient Greek story of the Iliad, by Homer. In the story, the Greeks fight the Trojans in a long siege. At the end of the story, Odysseus creates a horse statue as a surrender gift to the Trojans. However, hidden within are a group of Greek soldiers who escape the statue at night and destroy the city from within. Trojans are named after Odysseus\u2019s invention. They refer to files other than executables that run malicious processes. Typically, they come in the form of something positive, such as an audio file that you\u2019ve requested or a document you downloaded. The point is that these disguised files appear benign, but have a malicious intent.<\/li>\n<li><b>Spyware<\/b><br \/>\nSpyware captures information about a machine and transmits it to another source. Spyware can record almost anything done on a computer, from accessed files to visited websites. One form of spyware includes keyloggers, which record everything typed by the victim. This could easily lead to stolen passwords, bank account information, or health data.<\/li>\n<li><b>Rootkits<\/b><br \/>\nRootkits are the \u201croot canals\u201d of malware\u2014you run into one and you\u2019re going to feel a lot of pain. Rootkits attempt to modify the operating system directly and build a backdoor into the system. They\u2019re hard to discover and, if done correctly, VERY hard to remove.<\/li>\n<li><b>Ransomware<\/b><br \/>\nOver the past few years, we\u2019ve seen a major rise in the number of ransomware attacks. While spyware and several other forms of malware attempt to steal data and resell it, ransomware locks the computer or data and demands a payment to release the machine. Ransomware can often be dealt with by restoring data or the system to a safer state from a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\">backup<\/a>.<\/li>\n<li><b>Cryptominer<\/b><br \/>\nCryptomining\u00a0is an activity where computers attempt to generate new cryptocurrencies like Bitcoin, Ethyreum, or Monero. Generating cryptocurrency requires significant processing power, and many criminals place cryptomining malware on computers to steal processing power for the job. However, just because they steal processing power only doesn\u2019t mean you can ignore them\u2014they could just as easily install other more nefarious malware if they want.<\/li>\n<li><b>Fileless malware<\/b><br \/>\nFileless malware uses legitimate processes or systems within a machine to destroy it from within. These attacks typically run in memory, and typically slip past traditional antivirus and antimalware. A fileless attack may create a new user account with admin rights to establish a foothold in the system, then delete or modify local logs to make them harder to detect.<\/li>\n<\/ul>\n<h3>Malware: betcha\u2019 don\u2019t have just one!<\/h3>\n<p>Understanding the basic attack types can help. But the most successful attacks combine multiple types into a sophisticated attack. Let\u2019s say a hacker is determined to turn a profit off one of your customers (or just ruin their lives). They send an email containing a malicious file. The user downloads this, and the file both establishes a foothold on the machine and installs a keylogger, stealing personal financial data. They sit on the customers\u2019 systems, and gather passwords or sensitive company data. One day, after stealing enough data, they decide to download ransomware to your machines. They may have been silent for a while, but now, they\u2019ve disrupted business operations. You could attempt to remove the ransomware infection or reinstall from a backup, but if you don\u2019t catch the other parts of the attack, they can just do it again.<\/p>\n<p>This is an extreme example, but many successful attacks use multiple methods to breach their victims. It\u2019s no longer as simple as quarantining a virus and removing the infected file.<\/p>\n<h3>What to do about it<\/h3>\n<p>Ultimately, you need multiple layers of security to prevent issues from taking hold. However, one essential tool in your arsenal needs to be endpoint protection like\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/remote-management\/endpoint-detection-and-response\">SolarWinds<sup>\u00ae<\/sup>\u00a0Endpoint Detection and Response (EDR)<\/a>, powered by SentinelOne. EDR is built to help detect, respond to, and remediate malicious activity on the endpoint, whether malware-based or not. If it detects ransomware, it can spring into action and even roll back the system to a safe state on your behalf. Make sure your customers are covered\u2014get a free\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/remote-management\/endpoint-detection-and-response\">demo of SolarWinds EDR<\/a>, available in SolarWinds RMM, today.<\/p>\n<div class=\"sidebar-width-40\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<aside class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-related-resources paragraph--view-mode--default\">\n<div class=\"related-resources-sidebar clearfix\">\n<div class=\"info-box\">\n<p class=\"xs-margin-bottom-0 text-align-center\">Want to know more about how to spot an attack then download our free ebook on Indications of Compromise:<\/p>\n<div class=\"related-resources\">\n<article class=\"resource-teaser\">\n<h5 class=\"h5\" style=\"text-align: center\"><a href=\"https:\/\/www.solarwindsmsp.com\/resources\/eb-indications-compromise-part-1-lifecycle-cyberattack?promo=blog\">Indications of Compromise Part 1: The Lifecycle of a Cyberattack<\/a><\/h5>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/aside>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<p>&nbsp;<\/p>\n<\/div>\n<p><em>Tim Brown is VP of Security for SolarWinds MSP. He has over 20 years of experience developing and implementing security technology,\u00a0including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Tim\u2019s experience has made him an in-demand expert on cybersecurity, and has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. Additionally, Tim has been central in driving advancements in identity frameworks, has worked with the US government on security initiatives, and holds 18 patents on security-related topics.\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need&#8230;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5705","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Know Your Cybersecurity: The Different Types of Malware - N-able<\/title>\n<meta name=\"description\" content=\"Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need to know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Know Your Cybersecurity: The Different Types of Malware - N-able\" \/>\n<meta property=\"og:description\" content=\"Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need to know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T17:09:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T11:15:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tim Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\"},\"author\":{\"name\":\"Tim Brown\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\"},\"headline\":\"Know Your Cybersecurity: The Different Types of Malware\",\"datePublished\":\"2019-09-05T18:09:44+01:00\",\"dateModified\":\"2021-07-13T11:15:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\"},\"wordCount\":1133,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\",\"name\":\"Know Your Cybersecurity: The Different Types of Malware - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2019-09-05T18:09:44+01:00\",\"dateModified\":\"2021-07-13T11:15:32+00:00\",\"description\":\"Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need to know.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Know Your Cybersecurity: The Different Types of Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8\",\"name\":\"Tim Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g\",\"caption\":\"Tim Brown\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Know Your Cybersecurity: The Different Types of Malware - N-able","description":"Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need to know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware","og_locale":"es_ES","og_type":"article","og_title":"Know Your Cybersecurity: The Different Types of Malware - N-able","og_description":"Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need to know.","og_url":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-09-05T17:09:44+00:00","article_modified_time":"2021-07-13T11:15:32+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Tim Brown","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Tim Brown","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware"},"author":{"name":"Tim Brown","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8"},"headline":"Know Your Cybersecurity: The Different Types of Malware","datePublished":"2019-09-05T18:09:44+01:00","dateModified":"2021-07-13T11:15:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware"},"wordCount":1133,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware","url":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware","name":"Know Your Cybersecurity: The Different Types of Malware - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2019-09-05T18:09:44+01:00","dateModified":"2021-07-13T11:15:32+00:00","description":"Knowing your rootkit from your Trojans is critical if you want to look the part when you\u2019re offering security services. Tim Brown looks at the key malware types you need to know.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/know-your-cybersecurity-different-types-malware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Know Your Cybersecurity: The Different Types of Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/65b11c76d7eceabc6a98f67feafee6e8","name":"Tim Brown","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd73820610a5263c4429c2a99094e0c2e82401bbe39bf42457e891670b6566?s=96&d=mm&r=g","caption":"Tim Brown"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5705"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5705\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}