{"version":"1.0","provider_name":"Unit 42","provider_url":"https:\/\/unit42.paloaltonetworks.com\/es-la\/","author_name":"Sheida Azimi","author_url":"https:\/\/unit42.paloaltonetworks.com\/es-la\/author\/sheida-azimi\/","title":"\u00bfPensaba que se hab\u00eda acabado? La coacci\u00f3n de la autenticaci\u00f3n sigue evolucionando","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"xyfhgYe4cz\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/es-la\/authentication-coercion\/\">\u00bfPensaba que se hab\u00eda acabado? La coacci\u00f3n de la autenticaci\u00f3n sigue evolucionando<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/unit42.paloaltonetworks.com\/es-la\/authentication-coercion\/embed\/#?secret=xyfhgYe4cz\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfPensaba que se hab\u00eda acabado? La coacci\u00f3n de la autenticaci\u00f3n sigue evolucionando\u00bb \u2014 Unit 42\" data-secret=\"xyfhgYe4cz\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/unit42.paloaltonetworks.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2025\/11\/07_Vulnerabilities_1920x900.jpg","thumbnail_width":1920,"thumbnail_height":900,"description":"El contrabando de sesiones de agentes es una t\u00e9cnica novedosa en la que se hace un uso indebido de la comunicaci\u00f3n entre agentes de IA. Mostramos dos ejemplos de prueba de concepto."}