{"id":82,"date":"2026-03-07T20:41:00","date_gmt":"2026-03-08T01:41:00","guid":{"rendered":"https:\/\/www.gworks-ec.com\/cloud4u\/?page_id=82"},"modified":"2026-03-10T16:59:02","modified_gmt":"2026-03-10T21:59:02","slug":"actores-de-amenazas-2026","status":"publish","type":"page","link":"https:\/\/www.gworks-ec.com\/cloud4u\/actores-de-amenazas-2026\/","title":{"rendered":"Actores de amenazas 2026"},"content":{"rendered":"\n<p><br><\/p>\n\n\n<div id=\"threat-actors-wrapper\">\n<header style=\"text-align:center;margin-bottom:40px;\">\n<div style=\"font-size:11px;letter-spacing:4px;color:#00d2ff;text-transform:uppercase;margin-bottom:12px;opacity:0.8\">CompTIA Security+ \u00b7 Threat Intelligence Update \u00b7 2026<\/div>\n<h1 style=\"font-size:clamp(36px,6vw,56px);font-weight:700;color:#fff;text-transform:uppercase;line-height:1;margin:0 0 14px 0;\">Actores de <span style=\"color:#00d2ff;text-shadow:0 0 30px rgba(0,210,255,0.6)\">Amenaza<\/span><\/h1>\n<p style=\"font-size:15px;color:#4a6080;margin:0 0 20px 0;\">Categor\u00edas actualizadas \u00b7 Motivaci\u00f3n \u00b7 Impacto real \u00b7 Nuevas taxonom\u00edas 2026<\/p>\n<p style=\"font-size:15px;color:#4a6080;margin:0 0 20px 0;\">Cr\u00e9ditos: Sheila I. P\u00e9rez de \u00c1vila<\/p>\n<div style=\"width:80px;height:2px;background:linear-gradient(90deg,transparent,#00d2ff,transparent);margin:0 auto;\"><\/div>\n<\/header>\n<div class=\"stats-grid\">\n<div class=\"stat\"><span class=\"stat-num\">89%<\/span><\/p>\n<div class=\"stat-label\">\u2191 ataques con IA<\/div>\n<\/div>\n<div class=\"stat\"><span class=\"stat-num\">27s<\/span><\/p>\n<div class=\"stat-label\">Tiempo r\u00e9cord breakout<\/div>\n<\/div>\n<div class=\"stat\"><span class=\"stat-num\">85<\/span><\/p>\n<div class=\"stat-label\">Grupos ransomware<\/div>\n<\/div>\n<div class=\"stat\"><span class=\"stat-num\">82%<\/span><\/p>\n<div class=\"stat-label\">Ataques sin malware<\/div>\n<\/div>\n<div class=\"stat\"><span class=\"stat-num\">$4.82M<\/span><\/p>\n<div class=\"stat-label\">Costo brecha cr\u00edtica<\/div>\n<\/div>\n<div class=\"stat\"><span class=\"stat-num\">12.6M<\/span><\/p>\n<div class=\"stat-label\">Emails maliciosos<\/div>\n<\/div>\n<\/div>\n<div class=\"cards-grid\">\n<div class=\"card\" style=\"--card-color:#ff3c6e\">\n<div class=\"card-header\">\n<div class=\"icon\">\ud83d\udcb0<\/div>\n<div>\n<div class=\"card-title\">Cibercriminales &#038; RaaS<\/div>\n<div class=\"badge\">Evoluci\u00f3n cr\u00edtica 2025<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Ganancia financiera.<\/strong> Modelo industrializado con afiliados, RaaS y marketplaces.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\">85 grupos activos. <strong>Doble\/triple extorsi\u00f3n<\/strong> est\u00e1ndar. IA para phishing. <strong>Qilin, DragonForce, FunkSec<\/strong> con modelo cartel-style.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Financiero<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:97%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">97%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Operativo<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:90%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">90%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Reputaci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:85%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">85%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">ransomware<\/span><span class=\"tag\">extorsi\u00f3n<\/span><span class=\"tag\">RaaS<\/span><span class=\"tag\">IA ofensiva<\/span><span class=\"tag\">cloud<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#00d2ff\">\n<div class=\"card-header\">\n<div class=\"icon\">\ud83c\udff4<\/div>\n<div>\n<div class=\"card-title\">Estado-Naci\u00f3n \/ APT<\/div>\n<div class=\"badge\">Amenaza persistente<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Espionaje y geopol\u00edtica.<\/strong> Acceso persistente a infraestructura cr\u00edtica.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Actores 2025<\/div>\n<div class=\"value\"><strong>Salt Typhoon<\/strong> (China): telecom EE.UU. <strong>APT27\/APT31<\/strong>: ToolShell. <strong>Corea del Norte<\/strong>: ransomware contra salud.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Seguridad<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:98%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">98%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Infraestruc.<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:92%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">92%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Persistencia<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:95%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">95%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">APT<\/span><span class=\"tag\">espionaje<\/span><span class=\"tag\">zero-day<\/span><span class=\"tag\">supply chain<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#7fff00\">\n<div class=\"card-header\">\n<div class=\"icon\">\u270a<\/div>\n<div>\n<div class=\"card-title\">Hacktivistas<\/div>\n<div class=\"badge\">Convergencia con APTs<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Ideolog\u00eda pol\u00edtica.<\/strong> Fusi\u00f3n con operaciones de estados-naci\u00f3n.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\"><strong>SideCopy<\/strong> (Pakistan): espionaje + hacktivismo. <strong>D4RK4RMY<\/strong>: ransomware con propaganda.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Disrupci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:75%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">75%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Reputaci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:80%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">80%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">DDoS<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:70%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">70%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">DDoS<\/span><span class=\"tag\">defacement<\/span><span class=\"tag\">propaganda<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#ffaa00\">\n<div class=\"card-header\">\n<div class=\"icon\">\ud83d\udc64<\/div>\n<div>\n<div class=\"card-title\">Insiders \/ Amenaza Interna<\/div>\n<div class=\"badge\">Vectores ampliados<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Econ\u00f3mica o coerci\u00f3n.<\/strong> Empleados reclutados por ransomware.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\"><strong>Scattered Spider<\/strong> recluta empleados. <strong>82% ataques sin malware<\/strong>. Deepfakes y vishing.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Datos<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:88%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">88%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Detecci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:93%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">93%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Financiero<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:82%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">82%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">credenciales<\/span><span class=\"tag\">vishing<\/span><span class=\"tag\">reclutamiento<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#c084fc\">\n<div class=\"card-header\">\n<div class=\"icon\">\ud83e\udd16<\/div>\n<div>\n<div class=\"card-title\">Actores de Bajo Perfil<\/div>\n<div class=\"badge\">AI-Enabled<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Reconocimiento o ganancia.<\/strong> La IA eleva su capacidad sin habilidad t\u00e9cnica.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\">RaaS + IA democratizados. <strong>AiLock<\/strong> vende ransomware con IA por $400\u2013$1,200 USD.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Volumen<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:90%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">90%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Sofisticaci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:55%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">55%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Crecimiento<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:85%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">85%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">IA ofensiva<\/span><span class=\"tag\">RaaS<\/span><span class=\"tag\">phishing<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#ff6b35\">\n<div class=\"card-header\">\n<div class=\"icon\">\ud83d\udca5<\/div>\n<div>\n<div class=\"card-title\">Ciberterroristas<\/div>\n<div class=\"badge\">Guerra h\u00edbrida<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Terror y desestabilizaci\u00f3n.<\/strong> Ataques a infraestructura cr\u00edtica.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\">L\u00ednea borrada con guerra estatal. Ataques OT\/ICS con firmware. Energ\u00eda: +500% ransomware.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Infraestruc.<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:92%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">92%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Vidas<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:70%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">70%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Recuperaci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:88%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">88%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">OT\/ICS<\/span><span class=\"tag\">SCADA<\/span><span class=\"tag\">firmware<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#00ffaa\">\n<div class=\"new-badge\">NUEVO 2025<\/div>\n<div class=\"card-header\">\n<div class=\"icon\">\ud83d\udd11<\/div>\n<div>\n<div class=\"card-title\">Initial Access Brokers<\/div>\n<div class=\"badge\">Nueva categor\u00eda<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Venta de accesos.<\/strong> Credenciales, VPNs, RDPs en darknet.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\">Infostealer como vector principal. <strong>Huione Guarantee<\/strong> proces\u00f3 $27B.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Habilitaci\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:95%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">95%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Escala<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:90%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">90%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Invisibilidad<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:88%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">88%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">infostealer<\/span><span class=\"tag\">credenciales<\/span><span class=\"tag\">darknet<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"card\" style=\"--card-color:#ffd700\">\n<div class=\"new-badge\">NUEVO 2025<\/div>\n<div class=\"card-header\">\n<div class=\"icon\">\ud83e\udde0<\/div>\n<div>\n<div class=\"card-title\">Actores AI-Driven<\/div>\n<div class=\"badge\">Categor\u00eda emergente<\/div>\n<\/div>\n<\/div>\n<div class=\"card-body\">\n<div class=\"label\">Motivaci\u00f3n<\/div>\n<div class=\"value\"><strong>Automatizaci\u00f3n y escala.<\/strong> IA generativa para phishing y malware.<\/div>\n<div class=\"label\" style=\"margin-top:14px\">Novedades 2025<\/div>\n<div class=\"value\">ChatGPT <strong>550% m\u00e1s<\/strong> en foros. <strong>FunkSec y AiLock<\/strong> usan GenAI. Deepfakes.<\/div>\n<div class=\"impact-section\">\n<div class=\"label\">Impacto actual<\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Velocidad<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:98%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">98%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Escala<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:95%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">95%<\/span><\/div>\n<div class=\"bar-row\"><span class=\"bar-name\">Evasi\u00f3n<\/span><\/p>\n<div class=\"bar-track\">\n<div class=\"bar-fill\" style=\"width:90%\"><\/div>\n<\/div>\n<p><span class=\"bar-val\">90%<\/span><\/div>\n<\/div>\n<div class=\"tags\"><span class=\"tag\">GenAI<\/span><span class=\"tag\">deepfake<\/span><span class=\"tag\">malware aut\u00f3nomo<\/span><span class=\"tag\">LLM<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"callout\">\n<div class=\"callout-icon\">\u26a0\ufe0f<\/div>\n<div>\n<div class=\"callout-title\">Tendencia cr\u00edtica 2025\u20132026: Convergencia<\/div>\n<div class=\"callout-text\">La frontera entre categor\u00edas ha desaparecido. <strong>Estado-naci\u00f3n + Ransomware:<\/strong> Storm-2603 mezcla APT con extorsi\u00f3n. <strong>Hacktivistas + APTs:<\/strong> SideCopy opera como esp\u00eda y activista. En 2026: <strong>menor frecuencia, mayor impacto<\/strong>.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"footnote\">\n    Fuentes: CrowdStrike Global Threat Report 2025 \u00b7 Darktrace Mid-Year Review \u00b7 Cyble \u00b7 CYFIRMA \u00b7 CyberProof \u00b7 Deloitte CTI<br \/>\nActualizado: Marzo 2026 \u00b7 CompTIA Security+ SY0-701<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>CompTIA Security+ \u00b7 Threat Intelligence Update \u00b7 2026 Actores de Amenaza Categor\u00edas actualizadas \u00b7 Motivaci\u00f3n \u00b7 Impacto real \u00b7 Nuevas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-82","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/pages\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":19,"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/pages\/82\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/pages\/82\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/www.gworks-ec.com\/cloud4u\/wp-json\/wp\/v2\/media?parent=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}