{"id":68008,"date":"2025-07-08T14:33:03","date_gmt":"2025-07-08T13:33:03","guid":{"rendered":"https:\/\/www.n-able.com\/?p=68008"},"modified":"2025-09-09T17:58:09","modified_gmt":"2025-09-09T16:58:09","slug":"ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead","title":{"rendered":"AI Is Fueling Cyber Threats and How IT Leaders Can Stay Ahead"},"content":{"rendered":"<p><span>It\u2019s not just hype. We\u2019re seeing it happen daily. The same power of AI that can accelerate effective decision-making and drive automation is now being weaponized by cybercriminals. From AI-driven phishing attacks to deepfake scams, these threats are no longer futuristic speculation. They\u2019re here, and they\u2019re growing at an unprecedented pace.<\/span><\/p>\n<p><span>The question isn\u2019t <\/span><em>if<\/em><span> AI will impact your cybersecurity, but <\/span><em>how prepared is your organization to respond?<\/em><span> For MSPs, IT managers, and security teams, the need to stay ahead has reached a critical turning point. But here&#8217;s the good news: the same AI driving these threats can also be your most powerful defense asset.<\/span><\/p>\n<h2><span>Understanding the Rise of AI in Cyber Attacks<\/span><\/h2>\n<p><span>Cybercriminals are leveraging AI to launch more sophisticated, targeted, and scalable attacks. Classic attack models are being replaced by AI-powered techniques that are harder to detect and faster to deploy.<\/span><\/p>\n<h3><span>Examples of AI-Powered Cyber Threats<\/span><\/h3>\n<ul>\n<li><strong>Deepfake phishing &amp; social engineering<\/strong><strong><span>:<\/span><\/strong><span> AI tools can create realistic audio or video imitations of CEOs or team members, tricking employees into sharing sensitive information. Imagine receiving a voice message that sounds exactly like your manager but isn\u2019t.<\/span><\/li>\n<li><strong>Hyper-targeted phishing at scale: <\/strong><span>Large language models like ChatGPT are being used to craft highly personalized phishing emails that bypass traditional security filters.<\/span><\/li>\n<li><strong>Identifying vulnerabilities and misconfigurations:<\/strong><span> AI can scan systems much faster and more accurately than human hackers to identify weak points ripe for exploitation.<\/span><\/li>\n<\/ul>\n<p><em>AI is absolutely being weaponized. We\u2019re seeing it used for phishing, social engineering, and finding system flaws at a scale that\u2019s never existed before.<\/em> <span>These developments are a wake-up call for IT departments. With attackers using round-the-clock automated techniques, relying on traditional manual responses is no longer viable.<\/span><\/p>\n<h2><span>What This Means for IT Leaders<\/span><\/h2>\n<p><span>For IT managers, CIOs, CISOs, and MSPs, the concern is clear. The traditional security models we\u2019ve relied on for years can\u2019t keep up with AI\u2019s speed and sophistication. A more powerful response is needed.<\/span><\/p>\n<h3><span>Why Your Team Needs to Adapt<\/span><\/h3>\n<ul>\n<li><strong>Expanding attack surfaces<\/strong><strong><span>:<\/span><\/strong><span> The explosion of remote work, IoT devices, and cloud adoption has created more entry points for potential attacks.<\/span><\/li>\n<li><strong>Insufficient manual responses: <\/strong><span>Human-led processes lack the urgency and agility necessary to combat AI-powered attacks in real-time.<\/span><\/li>\n<li><strong>AI attacks never sleep: <\/strong><span>Around-the-clock, self-learning AI-driven attackers mean organizations are fighting a threat that\u2019s always operational.<\/span><\/li>\n<\/ul>\n<p><span>Proactive measures and advanced technologies are now necessities to maintain secure systems and ensure competitive resilience.<\/span><\/p>\n<h2><span>Fighting AI With AI<\/span><\/h2>\n<p><span>For every challenge AI presents, it holds equal potential to serve as a force for good. IT leaders can leverage AI to combat cyber threats in ways that were previously impossible.<\/span><\/p>\n<h3><span>AI-Powered Defensive Strategies<\/span><\/h3>\n<p><em>We\u2019re training models on known attack patterns to not just catch threats but anticipate them. Security isn\u2019t just reactive anymore; <\/em><span><a href=\"https:\/\/www.n-able.com\/de\/blog\/how-ai-is-revolutionizing-the-msp-industry-with-predictive-solutions\" target=\"_blank\" rel=\"noopener\">it\u2019s predictive<\/a><\/span><em>. Here are three things that can help you defend the companies you work with.<\/em><\/p>\n<ul>\n<li><strong>Behavioral anomaly detection: <\/strong><span>AI tools can analyze typical user behavior patterns and flag deviations indicative of malicious activity. For example, a compromised login happening outside normal hours on a new device could trigger an immediate alert.<\/span><\/li>\n<li><strong>Proactive threat detection:<\/strong><span> Using AI to simulate potential attacks allows businesses to identify vulnerabilities before hackers do.<\/span><\/li>\n<li><strong>Real-time containment: <\/strong><span>By automating response systems, AI can isolate suspicious activity, minimizing impact and mitigating risks instantly.<\/span><\/li>\n<\/ul>\n<h2><span>Real-World Examples<\/span><\/h2>\n<p><span>Leading IT organizations aren\u2019t waiting for the next attack. They\u2019re testing their defenses with AI-based penetration testing and employing predictive security measures, for example:<\/span><\/p>\n<ul>\n<li><strong>Internal simulations<\/strong><span> that simulate potential AI-powered attacks against internal systems, helping teams anticipate vulnerabilities.<\/span><\/li>\n<li><strong>Attack pattern modeling<\/strong><span> that involves training AI tools to think like hackers, enabling predictive security actions to strengthen defenses.<\/span><\/li>\n<\/ul>\n<p><span>These proactive steps aren\u2019t just best practices; they\u2019re becoming non-negotiable for organizations aiming to stay ahead.<\/span><\/p>\n<h2><span>Steps You Can Take Today to Stay Ahead<\/span><\/h2>\n<p><span>Emerging threats require immediate action. Here are five tips on how IT leaders can start adapting to this new cybersecurity landscape:<\/span><\/p>\n<ol>\n<li><span> <\/span><strong>Audit your security stack<\/strong><strong><span>:<\/span><\/strong><span> Evaluate whether your systems use behavior-based AI detection. Legacy tools won\u2019t cut it in today\u2019s AI-driven environment.<\/span><\/li>\n<li><span> <\/span><strong>Establish layered defenses: <\/strong><span>Invest in solutions that combine real-time alerts, anomaly detection, and endpoint intelligence to provide comprehensive protection.<\/span><\/li>\n<li><span> <\/span><strong>Train your teams:<\/strong><span> Ensure your staff understand the nuances of AI-driven phishing emails and deepfake scams. Remember, spotting a phishing attack isn\u2019t about bad spelling anymore; it\u2019s about hyper-personalization.<\/span><\/li>\n<li><span> <\/span><strong>Choose the right vendors: <\/strong><span>Select partners and platforms that not only use AI but are transparent about how they apply it. Ask questions about explainability and ethical AI practices.<\/span><\/li>\n<li><span> <\/span><strong>Monitor emerging regulations: <\/strong><span>Stay informed about laws\u2014like the EU\u2019s AI Act\u2014and how they might impact your operations and compliance needs.<\/span><\/li>\n<\/ol>\n<p><span>Advice to IT leaders is clear and actionable. <\/span><em>Audit, adapt, and educate. Proactivity is the only way forward.<\/em><\/p>\n<h2><span>Empower Your Team With Insights<\/span><\/h2>\n<p><span>The future of cybersecurity demands an evolution in how we approach AI. By understanding its potential for both risk and defense, IT leaders can lay the groundwork for systems designed for the modern threat landscape.<\/span><\/p>\n<p><strong>Want to hear how real security teams are evolving to stay ahead of AI-fueled cyber threats? Don\u2019t miss the full conversation on Beyond the Horizon: The AI Landscape for MSPs \u2013 Managing Governance, Compliance, and Cyber Threats, where I share what I\u2019m seeing from the frontlines and how you can lead with resilience, not fear. <\/strong><\/p>\n<p><strong>Listen to the podcast here: <a href=\"https:\/\/www.youtube.com\/watch?v=BuX3IAs8dtI&amp;list=PLbQNWS_ICkw2D7kCOA5lXFptKmwNZYjpY&amp;index=5\" target=\"_blank\" rel=\"noopener\">YouTube<\/a><a href=\"https:\/\/open.spotify.com\/episode\/6Kjta9iB3BQwuXtKetPDn5\" target=\"_blank\" rel=\"noopener\"><\/a>\u00a0|\u00a0<a href=\"https:\/\/open.spotify.com\/episode\/6Kjta9iB3BQwuXtKetPDn5\" target=\"_blank\" rel=\"noopener\">Spotify<\/a> | <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/the-ai-landscape-for-msps-managing-governance\/id1747403359?i=1000708579151\" target=\"_blank\" rel=\"noopener\">Apple Podcasts<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection &amp; proactive defense to combat AI-driven threats.<\/p>\n","protected":false},"author":120,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-68008","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Is Fueling Cyber Threats: How IT Leaders Can Stay Ahead<\/title>\n<meta name=\"description\" content=\"Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection &amp; proactive defense to combat AI-driven threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Is Fueling Cyber Threats: How IT Leaders Can Stay Ahead\" \/>\n<meta property=\"og:description\" content=\"Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection &amp; proactive defense to combat AI-driven threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-08T13:33:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T16:58:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/07\/060925_BB_Weaponized-AI_Final_1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicole Reineke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicole Reineke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\"},\"author\":{\"name\":\"Nicole Reineke\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/5754c73eb83576cd5d2b13d9c821af07\"},\"headline\":\"AI Is Fueling Cyber Threats and How IT Leaders Can Stay Ahead\",\"datePublished\":\"2025-07-08T14:33:03+01:00\",\"dateModified\":\"2025-09-09T16:58:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\"},\"wordCount\":925,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\",\"name\":\"AI Is Fueling Cyber Threats: How IT Leaders Can Stay Ahead\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2025-07-08T14:33:03+01:00\",\"dateModified\":\"2025-09-09T16:58:09+00:00\",\"description\":\"Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection & proactive defense to combat AI-driven threats.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/5754c73eb83576cd5d2b13d9c821af07\",\"name\":\"Nicole Reineke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3e4c7027d7c4c91503fe2fa142b6ea51b7180eef5d6fb93e098a4ce897f7814b?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3e4c7027d7c4c91503fe2fa142b6ea51b7180eef5d6fb93e098a4ce897f7814b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3e4c7027d7c4c91503fe2fa142b6ea51b7180eef5d6fb93e098a4ce897f7814b?s=96&d=mm&r=g\",\"caption\":\"Nicole Reineke\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI Is Fueling Cyber Threats: How IT Leaders Can Stay Ahead","description":"Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection & proactive defense to combat AI-driven threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead","og_locale":"es_ES","og_type":"article","og_title":"AI Is Fueling Cyber Threats: How IT Leaders Can Stay Ahead","og_description":"Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection & proactive defense to combat AI-driven threats.","og_url":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-07-08T13:33:03+00:00","article_modified_time":"2025-09-09T16:58:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/07\/060925_BB_Weaponized-AI_Final_1200x628.jpg","type":"image\/jpeg"}],"author":"Nicole Reineke","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Nicole Reineke","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead"},"author":{"name":"Nicole Reineke","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/5754c73eb83576cd5d2b13d9c821af07"},"headline":"AI Is Fueling Cyber Threats and How IT Leaders Can Stay Ahead","datePublished":"2025-07-08T14:33:03+01:00","dateModified":"2025-09-09T16:58:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead"},"wordCount":925,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead","url":"https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead","name":"AI Is Fueling Cyber Threats: How IT Leaders Can Stay Ahead","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2025-07-08T14:33:03+01:00","dateModified":"2025-09-09T16:58:09+00:00","description":"Explore how AI is changing the cybersecurity game. Learn how IT leaders can use behavior-based detection & proactive defense to combat AI-driven threats.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/ai-is-fueling-cyber-threats-and-how-it-leaders-can-stay-ahead"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/5754c73eb83576cd5d2b13d9c821af07","name":"Nicole Reineke","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/3e4c7027d7c4c91503fe2fa142b6ea51b7180eef5d6fb93e098a4ce897f7814b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3e4c7027d7c4c91503fe2fa142b6ea51b7180eef5d6fb93e098a4ce897f7814b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e4c7027d7c4c91503fe2fa142b6ea51b7180eef5d6fb93e098a4ce897f7814b?s=96&d=mm&r=g","caption":"Nicole Reineke"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/68008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=68008"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/68008\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=68008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}