{"id":50347,"date":"2025-01-02T13:30:08","date_gmt":"2025-01-02T12:30:08","guid":{"rendered":"https:\/\/www.tecsens.com\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/"},"modified":"2025-01-02T13:30:22","modified_gmt":"2025-01-02T12:30:22","slug":"principals-ciberatacs-i-tendencies-tecnologiques-de-2024","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/","title":{"rendered":"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024"},"content":{"rendered":"\n<p>El 2024, el panorama de la ciberseguretat ha assolit<strong> nivells de complexitat i desafiament <\/strong>sense precedents. Al llarg de l&#8217;any, les amenaces cibern\u00e8tiques han continuat evolucionant, impulsades per aven\u00e7os tecnol\u00f2gics i la creixent digitalitzaci\u00f3 de les nostres vides. Enguany ha estat testimoni de grans transformacions en les estrat\u00e8gies d&#8217;atac dels ciberdelinq\u00fcents i en les eines de defensa adoptades per les organitzacions. A continuaci\u00f3, es presenta un <strong>balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.<\/strong>   <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Tipus de Ciberatacs m\u00e9s significatius de 2024<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Atacs basats en intel\u00b7lig\u00e8ncia artificial (IA):<\/strong><\/h3>\n\n<p><br\/>La intel\u00b7lig\u00e8ncia artificial ha estat una eina clau per als ciberdelinq\u00fcents, que l&#8217;han fet servir per personalitzar atacs i superar les barreres tradicionals de seguretat. Els correus electr\u00f2nics de phishing i els missatges de spear-phishing generats per IA han assolit nivells de realisme alarmants, augmentant les taxes d&#8217;\u00e8xit d&#8217;aquests enganys. A m\u00e9s, la IA ha perm\u00e8s als atacants identificar i explotar vulnerabilitats amb m\u00e9s rapidesa.  <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Ransomware com a servei (RaaS):<\/strong><\/h3>\n\n<p><br\/>Aquest model ha democratitzat el cibercrim, permetent que fins i tot actors sense coneixements avan\u00e7ats participin en campanyes de ransomware. Plataformes de RaaS han ofert eines preconfigurades que faciliten l&#8217;acc\u00e9s a empreses i dades cr\u00edtiques, augmentant la freq\u00fc\u00e8ncia dels atacs. L&#8217;impacte econ\u00f2mic i operatiu d&#8217;aquestes campanyes ha estat devastador per a moltes organitzacions.  <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Atacs a la cadena de subministrament:<\/strong><\/h3>\n\n<p><br\/>Aquest tipus de ciberatacs ha continuat sent una de les estrat\u00e8gies preferides pels delinq\u00fcents, donada la seva capacitat per infiltrar-se en m\u00faltiples organitzacions a trav\u00e9s d&#8217;un \u00fanic prove\u00efdor comprom\u00e8s. Els esdeveniments d&#8217;enguany han posat de manifest la vulnerabilitat de les cadenes globals, exigint majors controls i col\u00b7laboraci\u00f3 entre les empreses. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\"><strong>Ciberatacs a infraestructures cr\u00edtiques:<\/strong><\/h3>\n\n<p><br\/>Els atacs dirigits a sectors essencials com energia, aigua i telecomunicacions han augmentat tant en freq\u00fc\u00e8ncia com en sofisticaci\u00f3. Aquests incidents no nom\u00e9s han buscat guanys econ\u00f2mics, sin\u00f3 tamb\u00e9 causar interrupcions massives, amb implicacions potencialment desastroses per a governs i economies senceres. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>5 dels Ciberatacs m\u00e9s destacats de 2024<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Malware BadBox a Android<\/strong>: Va infectar m\u00e9s de 30,000 dispositius a Alemanya, robant dades personals i causant fraus publicitaris.<\/li>\n\n\n\n<li><strong>Hackeig a Orange Espanya<\/strong>: Va afectar serveis de telecomunicacions (Orange, Jazztel, Simyo) en modificar par\u00e0metres cr\u00edtics a la xarxa.<\/li>\n\n\n\n<li><strong>Atac a Ticketmaster<\/strong>: Va comprometre dades de 560 milions d&#8217;usuaris, incloent-hi informaci\u00f3 financera, resultant en fraus massius.<\/li>\n\n\n\n<li><strong>Ciberatac a la CNMC (Espanya)<\/strong>: Va impactar sistemes de la Comissi\u00f3 Nacional dels Mercats i la Compet\u00e8ncia, sense detalls espec\u00edfics divulgats.<\/li>\n\n\n\n<li><strong>Filtraci\u00f3 a la Universitat Complutense de Madrid<\/strong>: Va exposar informaci\u00f3 personal d&#8217;estudiants, evidenciant vulnerabilitats en institucions educatives.<\/li>\n<\/ol>\n\n<p>(Font de les dades: INCIBE (Institut Nacional de Ciberseguretat)).<\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Tend\u00e8ncies tecnol\u00f2giques destacades en ciberseguretat<\/strong><\/h2>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Adopci\u00f3 massiva de l&#8217;autenticaci\u00f3 multifactorial (MFA):<\/strong><br\/>La MFA ha consolidat la seva posici\u00f3 com una de les principals mesures preventives de seguretat. El 2024, moltes empreses han adoptat aquesta tecnologia de forma obligat\u00f2ria per protegir sistemes cr\u00edtics i dades sensibles, ajudant a bloquejar accessos no autoritzats fins i tot en casos de robatori de credencials. <\/li>\n\n\n\n<li><strong>Model de seguretat Zero Trust:<\/strong><br\/>L&#8217;enfocament de &#8220;Confian\u00e7a Zero&#8221; ha seguit guanyant terreny, establint-se com un est\u00e0ndard per protegir xarxes cada vegada m\u00e9s distribu\u00efdes. Aquest model ha perm\u00e8s a les empreses refor\u00e7ar les seves defenses en verificar cont\u00ednuament la identitat d&#8217; usuaris i dispositius abans d&#8217; atorgar-los acc\u00e9s a recursos clau. <\/li>\n\n\n\n<li><strong>\u00das d&#8217;intel\u00b7lig\u00e8ncia artificial per a la defensa cibern\u00e8tica:<\/strong><br\/>La IA no nom\u00e9s ha estat utilitzada per atacants, sin\u00f3 tamb\u00e9 per defensors. El 2024, les eines de seguretat basades en IA han demostrat ser essencials per detectar comportaments an\u00f2mals, respondre r\u00e0pidament a incidents i gestionar vulnerabilitats de manera proactiva. <\/li>\n<\/ol>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.tecsens.com\/ca\/serveis-internet-empreses\/seguretat-informatica\/\">M\u00e9s solucions de ciberseguretat<\/a><\/div>\n<\/div>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Lli\u00e7ons i reflexions de 2024<\/strong><\/h2>\n\n<p>El balan\u00e7 de l&#8217;any deixa en clar que la ciberseguretat \u00e9s un camp en constant evoluci\u00f3, on les amenaces es tornen cada vegada m\u00e9s sofisticades i generalitzades. Tanmateix, tamb\u00e9 ha estat un any d&#8217; aven\u00e7os significatius en les estrat\u00e8gies de defensa. Tecnologies emergents com la intel\u00b7lig\u00e8ncia artificial i el model Zero Trust estan asseient les bases per a un futur m\u00e9s segur.  <\/p>\n\n<p>Malgrat els desafiaments, 2024 ha deixat importants lli\u00e7ons: la necessitat de col\u00b7laboraci\u00f3 entre empreses, governs i prove\u00efdors; la inversi\u00f3 en tecnologies avan\u00e7ades; i la urg\u00e8ncia de prioritzar la ciberseguretat com un element central de l&#8217;estrat\u00e8gia organitzacional. Enguany ens recorda que la batalla per la seguretat digital no t\u00e9 treva, per\u00f2 els aven\u00e7os tecnol\u00f2gics i la preparaci\u00f3 estrat\u00e8gica s\u00f3n claus per mitigar els riscos en el panorama cada vegada m\u00e9s interconnectat en qu\u00e8 vivim. <\/p>\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/forms.office.com\/e\/MHLEGxs4Jg\">Evita riscos, solic\u00edtans la teva consultoria IT<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El 2024, el panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Al llarg de l&#8217;any, les amenaces cibern\u00e8tiques han continuat evolucionant, impulsades per aven\u00e7os tecnol\u00f2gics i la creixent digitalitzaci\u00f3 de les nostres vides. Enguany ha estat testimoni de grans transformacions en les estrat\u00e8gies d&#8217;atac dels ciberdelinq\u00fcents i en les eines [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":50296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[496],"tags":[],"class_list":["post-50347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-ca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024 - Tecsens<\/title>\n<meta name=\"description\" content=\"El panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Fem un balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024 - Tecsens\" \/>\n<meta property=\"og:description\" content=\"El panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Fem un balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-02T12:30:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-02T12:30:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1442\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024\",\"datePublished\":\"2025-01-02T12:30:08+00:00\",\"dateModified\":\"2025-01-02T12:30:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\"},\"wordCount\":807,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg\",\"articleSection\":[\"Consulting\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\",\"url\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\",\"name\":\"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024 - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg\",\"datePublished\":\"2025-01-02T12:30:08+00:00\",\"dateModified\":\"2025-01-02T12:30:22+00:00\",\"description\":\"El panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Fem un balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg\",\"width\":2560,\"height\":1442,\"caption\":\"Principals ciberatacs2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024 - Tecsens","description":"El panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Fem un balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/","og_locale":"ca_ES","og_type":"article","og_title":"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024 - Tecsens","og_description":"El panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Fem un balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.","og_url":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/","og_site_name":"Tecsens","article_published_time":"2025-01-02T12:30:08+00:00","article_modified_time":"2025-01-02T12:30:22+00:00","og_image":[{"width":2560,"height":1442,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024","datePublished":"2025-01-02T12:30:08+00:00","dateModified":"2025-01-02T12:30:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/"},"wordCount":807,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg","articleSection":["Consulting"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/","url":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/","name":"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024 - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg","datePublished":"2025-01-02T12:30:08+00:00","dateModified":"2025-01-02T12:30:22+00:00","description":"El panorama de la ciberseguretat ha assolit nivells de complexitat i desafiament sense precedents. Fem un balan\u00e7 dels principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2024\/12\/Principales-ciberataques2024-02-scaled.jpg","width":2560,"height":1442,"caption":"Principals ciberatacs2024"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/ca\/principals-ciberatacs-i-tendencies-tecnologiques-de-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Principals ciberatacs i tend\u00e8ncies tecnol\u00f2giques de 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/50347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/comments?post=50347"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/50347\/revisions"}],"predecessor-version":[{"id":50348,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/50347\/revisions\/50348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media\/50296"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media?parent=50347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/categories?post=50347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/tags?post=50347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}