{"version":"1.0","provider_name":"AMITI","provider_url":"https:\/\/amiti.org.mx\/en","title":"Cuando Windows deja de ver el ataque - AMITI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2lafdh79xS\"><a href=\"https:\/\/amiti.org.mx\/en\/14245\/cuando-windows-deja-de-ver-el-ataque\/\">Cuando Windows deja de ver el ataque<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/amiti.org.mx\/en\/14245\/cuando-windows-deja-de-ver-el-ataque\/embed\/#?secret=2lafdh79xS\" width=\"600\" height=\"338\" title=\"&#8220;Cuando Windows deja de ver el ataque&#8221; &#8212; AMITI\" data-secret=\"2lafdh79xS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/amiti.org.mx\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/amiti.org.mx\/wp-content\/uploads\/2026\/02\/image.png","thumbnail_width":270,"thumbnail_height":200,"description":"Autor: Eduardo Salmeron, Cyber Threat Research de Silent4Business AMSI y ETW est\u00e1n dise\u00f1ados para detectar actividad maliciosa en Windows. Pero \u00bfqu\u00e9 sucede cuando el propio sistema es manipulado para \u201cno ver\u201d el ataque? Este an\u00e1lisis muestra c\u00f3mo t\u00e9cnicas en memoria, PowerShell y cifrado permiten desactivar mecanismos de monitoreo sin generar alertas evidentes. No es teor\u00eda: [&hellip;]"}