{"id":2782,"date":"2020-04-05T05:25:46","date_gmt":"2020-04-05T05:25:46","guid":{"rendered":"https:\/\/yagohansen.com\/?post_type=dt_portfolio&#038;p=2782"},"modified":"2020-04-05T10:34:20","modified_gmt":"2020-04-05T10:34:20","slug":"el-pais-periodico","status":"publish","type":"dt_portfolio","link":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/","title":{"rendered":"El Pa\u00eds Peri\u00f3dico"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: \u00abT\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga\u00bb. Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: \u00abT\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga\u00bb. Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2780,"template":"","dt_portfolio_category":[24],"dt_portfolio_tags":[],"class_list":["post-2782","dt_portfolio","type-dt_portfolio","status-publish","has-post-thumbnail","hentry","dt_portfolio_category-prensa-es","dt_portfolio_category-24","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>El Pa\u00eds Peri\u00f3dico - Yago Hansen CV<\/title>\n<meta name=\"description\" content=\"Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: &quot;T\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga&quot;. Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El Pa\u00eds Peri\u00f3dico - Yago Hansen CV\" \/>\n<meta property=\"og:description\" content=\"Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: &quot;T\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga&quot;. Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/\" \/>\n<meta property=\"og:site_name\" content=\"Yago Hansen CV\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-05T10:34:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yagohansen.com\/wp-content\/uploads\/elpais2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1590\" \/>\n\t<meta property=\"og:image:height\" content=\"1177\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/\",\"url\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/\",\"name\":\"El Pa\u00eds Peri\u00f3dico - Yago Hansen CV\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/yagohansen.com\\\/wp-content\\\/uploads\\\/elpais2.png\",\"datePublished\":\"2020-04-05T05:25:46+00:00\",\"dateModified\":\"2020-04-05T10:34:20+00:00\",\"description\":\"Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: \\\"T\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga\\\". Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/yagohansen.com\\\/wp-content\\\/uploads\\\/elpais2.png\",\"contentUrl\":\"https:\\\/\\\/yagohansen.com\\\/wp-content\\\/uploads\\\/elpais2.png\",\"width\":1590,\"height\":1177},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/el-pais-periodico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portafolio\",\"item\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/project\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"El Pa\u00eds Peri\u00f3dico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/#website\",\"url\":\"https:\\\/\\\/yagohansen.com\\\/\",\"name\":\"Yago Hansen CV\",\"description\":\"Yago Hansen Curriculum Vitae and background experience\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yagohansen.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El Pa\u00eds Peri\u00f3dico - Yago Hansen CV","description":"Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: \"T\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga\". Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/","og_locale":"es_ES","og_type":"article","og_title":"El Pa\u00eds Peri\u00f3dico - Yago Hansen CV","og_description":"Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: \"T\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga\". Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.","og_url":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/","og_site_name":"Yago Hansen CV","article_modified_time":"2020-04-05T10:34:20+00:00","og_image":[{"width":1590,"height":1177,"url":"https:\/\/yagohansen.com\/wp-content\/uploads\/elpais2.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/","url":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/","name":"El Pa\u00eds Peri\u00f3dico - Yago Hansen CV","isPartOf":{"@id":"https:\/\/yagohansen.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/#primaryimage"},"image":{"@id":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/#primaryimage"},"thumbnailUrl":"https:\/\/yagohansen.com\/wp-content\/uploads\/elpais2.png","datePublished":"2020-04-05T05:25:46+00:00","dateModified":"2020-04-05T10:34:20+00:00","description":"Yago Hansen, un hacker espa\u00f1ol con experiencia en el sector, explica c\u00f3mo funciona el intercambio: \"T\u00fa le cuentas la vulnerabilidad a estas empresas y ellas la valoran seg\u00fan la capacidad de explotaci\u00f3n que tenga\". Cuando la empresa adquiere la vulnerabilidad la convierte en un exploit, un programa malicioso para aprovechar el fallo descubierto, y la incorpora a su oferta comercial.","breadcrumb":{"@id":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/#primaryimage","url":"https:\/\/yagohansen.com\/wp-content\/uploads\/elpais2.png","contentUrl":"https:\/\/yagohansen.com\/wp-content\/uploads\/elpais2.png","width":1590,"height":1177},{"@type":"BreadcrumbList","@id":"https:\/\/yagohansen.com\/es\/project\/el-pais-periodico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yagohansen.com\/es\/"},{"@type":"ListItem","position":2,"name":"Portafolio","item":"https:\/\/yagohansen.com\/es\/project\/"},{"@type":"ListItem","position":3,"name":"El Pa\u00eds Peri\u00f3dico"}]},{"@type":"WebSite","@id":"https:\/\/yagohansen.com\/#website","url":"https:\/\/yagohansen.com\/","name":"Yago Hansen CV","description":"Yago Hansen Curriculum Vitae and background experience","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yagohansen.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/dt_portfolio\/2782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/dt_portfolio"}],"about":[{"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/types\/dt_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/dt_portfolio\/2782\/revisions"}],"predecessor-version":[{"id":2783,"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/dt_portfolio\/2782\/revisions\/2783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/media\/2780"}],"wp:attachment":[{"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/media?parent=2782"}],"wp:term":[{"taxonomy":"dt_portfolio_category","embeddable":true,"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/dt_portfolio_category?post=2782"},{"taxonomy":"dt_portfolio_tags","embeddable":true,"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/dt_portfolio_tags?post=2782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}