{"id":26855,"date":"2023-09-08T11:32:41","date_gmt":"2023-09-08T09:32:41","guid":{"rendered":"https:\/\/sendapp.live\/?p=26855"},"modified":"2023-09-08T11:33:06","modified_gmt":"2023-09-08T09:33:06","slug":"los-piratas-informaticos-controlan-su-seguridad","status":"publish","type":"post","link":"https:\/\/sendapp.live\/es\/2023\/09\/08\/gli-hacker-controllano-la-sicurezza-dellai\/","title":{"rendered":"Los piratas inform\u00e1ticos supervisan la seguridad de la IA"},"content":{"rendered":"<p class=\"entry-title my-4\"><strong>Los piratas inform\u00e1ticos supervisan la seguridad de la IA<\/strong><\/p>\n<p>En la era de la informaci\u00f3n, titanes de la tecnolog\u00eda como Microsoft, Google, Nvidia y Meta est\u00e1n probando sus modelos de inteligencia artificial (IA) como nunca antes. Con el auge de los sistemas de IA generativa, la seguridad se ha convertido en una preocupaci\u00f3n central. Forbes entrevist\u00f3 a los jefes de los equipos rojos de IA de estas empresas y destac\u00f3 c\u00f3mo la seguridad se est\u00e1 convirtiendo en un criterio de marketing clave para estas empresas.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-26857\" src=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462.jpg\" alt=\"\" width=\"810\" height=\"462\" srcset=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462.jpg 810w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-300x171.jpg 300w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-768x438.jpg 768w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-18x10.jpg 18w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker-privacy-password-crack-access-security-infringe-spy_03-w810h462-600x342.jpg 600w\" sizes=\"auto, (max-width: 810px) 100vw, 810px\" \/><\/h3>\n<h3>M\u00e1s vale prevenir que curar: el papel de los equipos rojos en la IA<\/h3>\n<p>Un equipo rojo es un grupo de hackers \u00e9ticos encargados de probar la solidez y seguridad de un sistema. OpenAI, por ejemplo, ha contratado expertos externos para probar posibles fallos y sesgos en sus modelos GPT-3.5 y GPT-4. Estos expertos realizaron pruebas que descubrieron respuestas inaceptables generadas por los modelos, que fueron r\u00e1pidamente corregidas.<\/p>\n<p>De manera similar, otros equipos rojos han examinado versiones preliminares de modelos como GPT-4, pidi\u00e9ndoles que realicen actividades ilegales y maliciosas. Estas pruebas de seguridad llevaron a la identificaci\u00f3n y correcci\u00f3n de varias vulnerabilidades.<\/p>\n<h3>Encontrar el equilibrio adecuado: seguridad frente a utilidad<\/h3>\n<p>Los l\u00edderes de los equipos rojos a menudo se ven obligados a equilibrar la seguridad con la utilidad. Un modelo de IA demasiado restrictivo es seguro pero in\u00fatil; por el contrario, un modelo demasiado permisivo es \u00fatil pero potencialmente peligroso. Se trata de un delicado acto de equilibrio que requiere una atenci\u00f3n constante y meticulosa para mantener los modelos \u00fatiles y seguros.<\/p>\n<h3>T\u00e9cnicas y t\u00e1cticas del equipo rojo en IA<\/h3>\n<p>El concepto de equipo rojo no es nuevo y se remonta a la d\u00e9cada de 1960. Sin embargo, con la llegada de la IA generativa, los m\u00e9todos de prueba y los desaf\u00edos de seguridad han evolucionado. Los equipos rojos emplean una variedad de t\u00e1cticas, desde generar respuestas inapropiadas hasta extraer datos confidenciales y contaminar conjuntos de datos. Daniel Fabian, jefe del nuevo equipo rojo de IA de Google, explica que el equipo utiliza un conjunto diverso de t\u00e9cnicas para mantener los modelos seguros.<\/p>\n<div id=\"attachment_26860\" style=\"width: 903px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-26860\" class=\"size-full wp-image-26860\" src=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01.jpg\" alt=\"\" width=\"893\" height=\"536\" srcset=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01.jpg 893w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-300x180.jpg 300w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-768x461.jpg 768w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-18x12.jpg 18w, https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/hacker01-600x360.jpg 600w\" sizes=\"auto, (max-width: 893px) 100vw, 893px\" \/><p id=\"caption-attachment-26860\" class=\"wp-caption-text\">102010925 \u2013 hacker que utiliza Internet piratea servidor inform\u00e1tico abstracto, base de datos, almacenamiento de red, firewall, cuenta de red social, robo de datos<\/p><\/div>\n<h3>Compartiendo conocimientos y herramientas: la comunidad del Red Team<\/h3>\n<p>Dado que el campo de la seguridad de la IA a\u00fan est\u00e1 en desarrollo, los equipos rojos tienden a compartir sus hallazgos y herramientas. Microsoft ha puesto a disposici\u00f3n del p\u00fablico herramientas de prueba de seguridad de c\u00f3digo abierto, como Counterfit. Este intercambio de recursos y conocimientos ayuda a fortalecer todo el ecosistema de IA.<\/p>\n<h3>Eventos de alto perfil y desaf\u00edos de Red Teaming<\/h3>\n<p>Recientemente, un evento respaldado por la Casa Blanca cont\u00f3 con la participaci\u00f3n de varios gigantes tecnol\u00f3gicos, que pusieron sus modelos de IA a disposici\u00f3n de piratas inform\u00e1ticos externos para que los probaran. Estas pruebas intensivas llevaron al descubrimiento de varias vulnerabilidades nuevas, lo que demuestra la importancia de este tipo de eventos para la seguridad global de la IA.<\/p>\n<h3>La creciente importancia de la seguridad en la IA<\/h3>\n<p>Con una mayor atenci\u00f3n tanto del p\u00fablico como de los gobiernos a la seguridad en la IA, los equipos rojos se est\u00e1n convirtiendo en un componente esencial para el \u00e9xito de las empresas de tecnolog\u00eda. No s\u00f3lo ayudan a identificar y corregir vulnerabilidades, sino que tambi\u00e9n ofrecen una ventaja competitiva, ya que la seguridad y la confianza se vuelven cada vez m\u00e1s cr\u00edticas en el panorama de la IA.<\/p>\n<p>En conclusi\u00f3n, los piratas inform\u00e1ticos controlan la seguridad de la IA en la batalla para hacer que la inteligencia artificial sea m\u00e1s segura. A trav\u00e9s de un conjunto de t\u00e9cnicas avanzadas, eventos de alto perfil e intercambio de conocimientos,<\/p>","protected":false},"excerpt":{"rendered":"<p>Los hackers controlan la seguridad de la IA En la era de la informaci\u00f3n, los titanes tecnol\u00f3gicos como Microsoft, Google, Nvidia y Meta est\u00e1n probando sus modelos de inteligencia artificial (IA) como nunca antes\u2026<\/p>","protected":false},"author":22,"featured_media":26856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daim_seo_power":"","_daim_enable_ail":"","footnotes":""},"categories":[2538],"tags":[2855,3089,840,3617,3009,3119,3618],"class_list":{"0":"post-26855","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-microsoft","9":"tag-ai","10":"tag-google","11":"tag-hacker","12":"tag-meta","13":"tag-nvidia","14":"tag-red-teaming"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gli Hacker Controllano La Sicurezza Dell&#039;AI<\/title>\n<meta name=\"description\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI. Nell&#039;era dell&#039;informazione, i titani tecnologici come Microsoft, Google\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sendapp.live\/es\/2023\/09\/08\/los-piratas-informaticos-controlan-su-seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI\" \/>\n<meta property=\"og:description\" content=\"Gli Hacker Controllano La Sicurezza Dell&#039;AI. Nell&#039;era dell&#039;informazione, i titani tecnologici come Microsoft, Google\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sendapp.live\/es\/2023\/09\/08\/los-piratas-informaticos-controlan-su-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"SendApp - Software Whatsapp Marketing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sendapp.live\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T09:32:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T09:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sendapp_live\" \/>\n<meta name=\"twitter:site\" content=\"@sendapp_live\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"},\"author\":{\"name\":\"Blogger\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/person\\\/d299d0c16bd060adfd11119ff8f7d98b\"},\"headline\":\"Gli Hacker Controllano La Sicurezza Dell&#8217;AI\",\"datePublished\":\"2023-09-08T09:32:41+00:00\",\"dateModified\":\"2023-09-08T09:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"keywords\":[\"#Microsoft\",\"ai\",\"Google\",\"Hacker\",\"meta\",\"nvidia\",\"Red Teaming\"],\"articleSection\":[\"news\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\",\"url\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\",\"name\":\"Gli Hacker Controllano La Sicurezza Dell'AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"datePublished\":\"2023-09-08T09:32:41+00:00\",\"dateModified\":\"2023-09-08T09:33:06+00:00\",\"description\":\"Gli Hacker Controllano La Sicurezza Dell'AI. Nell'era dell'informazione, i titani tecnologici come Microsoft, Google\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"contentUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/pt\\\/2023\\\/09\\\/08\\\/hackers-controlam-a-seguranca-da-ia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sendapp.live\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gli Hacker Controllano La Sicurezza Dell&#8217;AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/sendapp.live\\\/it\\\/\",\"name\":\"SendApp\",\"description\":\"Automate Your Messages &amp; Grow Your Business\",\"publisher\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\"},\"alternateName\":\"SendApp WhatsApp Marketing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sendapp.live\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#organization\",\"name\":\"SendApp\",\"url\":\"https:\\\/\\\/sendapp.live\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Logo-Sendapp-300x60-1.png\",\"contentUrl\":\"https:\\\/\\\/sendapp.live\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Logo-Sendapp-300x60-1.png\",\"width\":300,\"height\":60,\"caption\":\"SendApp\"},\"image\":{\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/sendapp.live\",\"https:\\\/\\\/x.com\\\/sendapp_live\",\"https:\\\/\\\/www.instagram.com\\\/sendapp.live\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC2gaLpi0-OJLG4CFbOr6mLw\",\"https:\\\/\\\/it.trustpilot.com\\\/review\\\/sendapp.live\"],\"description\":\"Piattaforma italiana di WhatsApp Marketing con API ufficiali Meta. Assistente AI, campagne massive, SMS Gateway gratuito, Google Calendar, automazioni. Da \u20ac16\\\/mese senza markup sui messaggi.\",\"email\":\"info@sendapp.live\",\"foundingDate\":\"2016-07-25\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sendapp.live\\\/it\\\/#\\\/schema\\\/person\\\/d299d0c16bd060adfd11119ff8f7d98b\",\"name\":\"Blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g\",\"caption\":\"Blogger\"},\"url\":\"https:\\\/\\\/sendapp.live\\\/es\\\/author\\\/blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Los piratas inform\u00e1ticos supervisan la seguridad de la IA","description":"Los piratas inform\u00e1ticos supervisan la seguridad de la IA. En la era de la informaci\u00f3n, los titanes de la tecnolog\u00eda como Microsoft, Google","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sendapp.live\/es\/2023\/09\/08\/los-piratas-informaticos-controlan-su-seguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Gli Hacker Controllano La Sicurezza Dell'AI","og_description":"Gli Hacker Controllano La Sicurezza Dell'AI. Nell'era dell'informazione, i titani tecnologici come Microsoft, Google","og_url":"https:\/\/sendapp.live\/es\/2023\/09\/08\/los-piratas-informaticos-controlan-su-seguridad\/","og_site_name":"SendApp - Software Whatsapp Marketing","article_publisher":"https:\/\/www.facebook.com\/sendapp.live","article_published_time":"2023-09-08T09:32:41+00:00","article_modified_time":"2023-09-08T09:33:06+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","type":"image\/jpeg"}],"author":"Blogger","twitter_card":"summary_large_image","twitter_creator":"@sendapp_live","twitter_site":"@sendapp_live","twitter_misc":{"Escrito por":"Blogger","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#article","isPartOf":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"},"author":{"name":"Blogger","@id":"https:\/\/sendapp.live\/it\/#\/schema\/person\/d299d0c16bd060adfd11119ff8f7d98b"},"headline":"Gli Hacker Controllano La Sicurezza Dell&#8217;AI","datePublished":"2023-09-08T09:32:41+00:00","dateModified":"2023-09-08T09:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/sendapp.live\/it\/#organization"},"image":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","keywords":["#Microsoft","ai","Google","Hacker","meta","nvidia","Red Teaming"],"articleSection":["news"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/","url":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/","name":"Los piratas inform\u00e1ticos supervisan la seguridad de la IA","isPartOf":{"@id":"https:\/\/sendapp.live\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"image":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","datePublished":"2023-09-08T09:32:41+00:00","dateModified":"2023-09-08T09:33:06+00:00","description":"Los piratas inform\u00e1ticos supervisan la seguridad de la IA. En la era de la informaci\u00f3n, los titanes de la tecnolog\u00eda como Microsoft, Google","breadcrumb":{"@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#primaryimage","url":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","contentUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2023\/09\/024633963-b4281fbc-1d99-4223-bcb0-78b2c52cb0cf.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/sendapp.live\/pt\/2023\/09\/08\/hackers-controlam-a-seguranca-da-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sendapp.live\/"},{"@type":"ListItem","position":2,"name":"Gli Hacker Controllano La Sicurezza Dell&#8217;AI"}]},{"@type":"WebSite","@id":"https:\/\/sendapp.live\/it\/#website","url":"https:\/\/sendapp.live\/it\/","name":"SendApp","description":"Automatice sus mensajes y haga crecer su negocio","publisher":{"@id":"https:\/\/sendapp.live\/it\/#organization"},"alternateName":"SendApp WhatsApp Marketing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sendapp.live\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sendapp.live\/it\/#organization","name":"SendApp","url":"https:\/\/sendapp.live\/it\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sendapp.live\/it\/#\/schema\/logo\/image\/","url":"https:\/\/sendapp.live\/wp-content\/uploads\/2025\/04\/Logo-Sendapp-300x60-1.png","contentUrl":"https:\/\/sendapp.live\/wp-content\/uploads\/2025\/04\/Logo-Sendapp-300x60-1.png","width":300,"height":60,"caption":"SendApp"},"image":{"@id":"https:\/\/sendapp.live\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sendapp.live","https:\/\/x.com\/sendapp_live","https:\/\/www.instagram.com\/sendapp.live","https:\/\/www.youtube.com\/channel\/UC2gaLpi0-OJLG4CFbOr6mLw","https:\/\/it.trustpilot.com\/review\/sendapp.live"],"description":"Plataforma italiana de marketing por WhatsApp con API Meta oficial. Asistente de IA, campa\u00f1as masivas, pasarela SMS gratuita, Google Calendar, automatizaciones. Desde 16 \u20ac\/mes sin recargo por mensaje.","email":"info@sendapp.live","foundingDate":"2016-07-25"},{"@type":"Person","@id":"https:\/\/sendapp.live\/it\/#\/schema\/person\/d299d0c16bd060adfd11119ff8f7d98b","name":"Blogger","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ce6c79c7d549254e170ba7e532db68391b034b95559bd744349aee442ecdad7?s=96&d=mm&r=g","caption":"Blogger"},"url":"https:\/\/sendapp.live\/es\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/posts\/26855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/comments?post=26855"}],"version-history":[{"count":1,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/posts\/26855\/revisions"}],"predecessor-version":[{"id":26862,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/posts\/26855\/revisions\/26862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/media\/26856"}],"wp:attachment":[{"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/media?parent=26855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/categories?post=26855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sendapp.live\/es\/wp-json\/wp\/v2\/tags?post=26855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}