{"id":70787,"date":"2025-03-06T08:00:00","date_gmt":"2025-03-06T07:00:00","guid":{"rendered":"https:\/\/entelgy.com\/sin-categoria\/seguridad-en-aplicaciones-la-batalla-contra-los-bots\/"},"modified":"2026-02-23T11:52:23","modified_gmt":"2026-02-23T10:52:23","slug":"seguridad-en-aplicaciones-la-batalla-contra-los-bots","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/present\/seguridad-en-aplicaciones-la-batalla-contra-los-bots\/","title":{"rendered":"Seguridad en Aplicaciones: La batalla contra los bots \u00a0"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>La implementaci\u00f3n de tecnolog\u00edas disruptivas (IA, Nube, RPAs, etc) por parte de adversarios es una realidad palpable. Hoy en d\u00eda, los ataques a portales son cada vez m\u00e1s sofisticados. No se trata solo de &#8220;simples&#8221; denegaciones de servicio, sino de la explotaci\u00f3n de vulnerabilidades para extraer informaci\u00f3n, permitiendo la enumeraci\u00f3n de usuarios y contrase\u00f1as. <\/strong><\/h4>\n\n\n\n<p><em>Por\u00a0Rimel Fraile Fonseca, Cybersecurity Director Am\u00e9rica\u00a0<\/em><\/p>\n\n\n\n<p>Todos sabemos que bases de datos con nombres, correos electr\u00f3nicos y n\u00fameros de tel\u00e9fono son explotadas indiscriminadamente en diversos portales para obtener credenciales de acceso y utilizarlas en fraudes. Desde<strong> Entelgy Security Am\u00e9rica <\/strong>te mostramos c\u00f3mo esta amenaza, cada vez m\u00e1s frecuente y sofisticada, permite a los adversarios explotarla con recursos automatizados y t\u00e9cnicas avanzadas, dificultando su detecci\u00f3n. M\u00e9todos tradicionales como la fuerza bruta o el password spray se potencian con Bots en la nube, complicando el rastreo. <strong>Las \u00e1reas de defensa enfrentan limitaciones de visibilidad que impiden detectar estos abusos<\/strong>. Aunque existen controles como captchas, bloqueos y WAF, suelen ser superados por la anal\u00edtica y t\u00e1cticas de los atacantes, generando fricci\u00f3n para los usuarios leg\u00edtimos.\u00a0<\/p>\n\n\n\n<p><strong>\ufe0fLa defensa debe centrarse en dificultar al atacante su acci\u00f3n<\/strong>. Tecnolog\u00edas como biometr\u00eda comportamental, an\u00e1lisis de usuario, acceso sin contrase\u00f1as y visibilidad integral ayudan a anticipar amenazas y frenar bots maliciosos.\u00a0<\/p>\n\n\n\n<p>Aunque suene ut\u00f3pico, hoy d\u00eda la inteligencia artificial se est\u00e1 utilizando para combatir bots que roban credenciales. <strong>El reto operativo actual para los defensores Blue Team<\/strong>.\u00a0<\/p>\n\n\n\n<p>Incluir<strong> IA y Machine Learning <\/strong>en el an\u00e1lisis de telemetr\u00eda y cruzarlo con inteligencia de amenazas permite identificar t\u00e1cticas adversarias. Sumado a monitoreo continuo y expertos en cacer\u00eda de amenazas, ayuda a cerrar brechas. Aunque la amenaza persiste,<strong> la clave es fortalecer la resiliencia<\/strong> para mitigar su impacto.\u00a0<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La implementaci\u00f3n de tecnolog\u00edas disruptivas (IA, Nube, RPAs, etc) por parte de adversarios es una realidad palpable. Hoy en d\u00eda, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":69426,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8656,8653],"tags":[8991,8906,8981,8924,8982,8908],"class_list":["post-70787","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-entelgy-security-america-en","category-present","tag-entelgy-en-argentina-es-en","tag-entelgy-en-brasil-es-en","tag-entelgy-en-chile-es-en","tag-entelgy-en-colombia-es-en","tag-entelgy-en-peru-es-en","tag-entelgy-security-america-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/70787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=70787"}],"version-history":[{"count":1,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/70787\/revisions"}],"predecessor-version":[{"id":79413,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/70787\/revisions\/79413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/69426"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=70787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=70787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=70787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}