{"id":6870,"date":"2018-11-06T18:30:00","date_gmt":"2018-11-06T18:30:00","guid":{"rendered":"https:\/\/testing.xplaye.com\/ikusi2\/the-nominal-list-of-the-ine-available-to-cybercriminals\/"},"modified":"2023-08-23T17:50:42","modified_gmt":"2023-08-23T17:50:42","slug":"the-nominal-list-of-the-ine-available-to-cybercriminals","status":"publish","type":"post","link":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/","title":{"rendered":"The nominal list of the INE available to cybercriminals"},"content":{"rendered":"\n<p>Jorge Mora, Presales Engineer Specialist in Security from Ikusi Latam, tells us how it was discovered that the list of people registered in the National Electoral Institute, INE, with confidential information, it was in a <a href=\"https:\/\/www.ikusiredes.com\/en\/infraestructura\/cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud <\/a>service without any authentication system, that is, almost anyone could consult the data and then use it for malicious purposes.<\/p>\n\n\n\n<p>This is the first installment of a videoblogs series where we expose the most important cyber incidents worldwide, which has endangered personal or organizational information, and that have changed <a href=\"https:\/\/www.ikusiredes.com\/en\/soluciones\/wasp-end-user-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity<\/a> mechanisms.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"La lista nominal del INE al alcance de los cibercriminales\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Ef0kf7_gHg8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Jorge Mora, Presales Engineer Specialist in Security from Ikusi Latam, tells us how it was discovered that the list of<\/p>\n","protected":false},"author":2,"featured_media":12755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"temas":[39],"class_list":["post-6870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","temas-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The nominal list of the INE available to cybercriminals - Ikusi EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The nominal list of the INE available to cybercriminals - Ikusi EN\" \/>\n<meta property=\"og:description\" content=\"Jorge Mora, Presales Engineer Specialist in Security from Ikusi Latam, tells us how it was discovered that the list of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Ikusi EN\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-06T18:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T17:50:42+00:00\" \/>\n<meta name=\"author\" content=\"Ikusi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ikusi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/\"},\"author\":{\"name\":\"Ikusi\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\"},\"headline\":\"The nominal list of the INE available to cybercriminals\",\"datePublished\":\"2018-11-06T18:30:00+00:00\",\"dateModified\":\"2023-08-23T17:50:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/\"},\"wordCount\":105,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/06nov2018_inecibercriminales.jpeg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/\",\"name\":\"The nominal list of the INE available to cybercriminals - Ikusi EN\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/06nov2018_inecibercriminales.jpeg\",\"datePublished\":\"2018-11-06T18:30:00+00:00\",\"dateModified\":\"2023-08-23T17:50:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/06nov2018_inecibercriminales.jpeg\",\"contentUrl\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/05\\\/06nov2018_inecibercriminales.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/blog\\\/the-nominal-list-of-the-ine-available-to-cybercriminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The nominal list of the INE available to cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/\",\"name\":\"Ikusi EN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/#\\\/schema\\\/person\\\/bcd06b0e7689b90689815d0b78a2bc2d\",\"name\":\"Ikusi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g\",\"caption\":\"Ikusi\"},\"url\":\"https:\\\/\\\/testing.xplaye.com\\\/ikusi2\\\/en\\\/author\\\/ikusi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The nominal list of the INE available to cybercriminals - Ikusi EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/","og_locale":"en_US","og_type":"article","og_title":"The nominal list of the INE available to cybercriminals - Ikusi EN","og_description":"Jorge Mora, Presales Engineer Specialist in Security from Ikusi Latam, tells us how it was discovered that the list of","og_url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/","og_site_name":"Ikusi EN","article_published_time":"2018-11-06T18:30:00+00:00","article_modified_time":"2023-08-23T17:50:42+00:00","author":"Ikusi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ikusi","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/"},"author":{"name":"Ikusi","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d"},"headline":"The nominal list of the INE available to cybercriminals","datePublished":"2018-11-06T18:30:00+00:00","dateModified":"2023-08-23T17:50:42+00:00","mainEntityOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/"},"wordCount":105,"commentCount":0,"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/06nov2018_inecibercriminales.jpeg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/","name":"The nominal list of the INE available to cybercriminals - Ikusi EN","isPartOf":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/06nov2018_inecibercriminales.jpeg","datePublished":"2018-11-06T18:30:00+00:00","dateModified":"2023-08-23T17:50:42+00:00","author":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d"},"breadcrumb":{"@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#primaryimage","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/06nov2018_inecibercriminales.jpeg","contentUrl":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-content\/uploads\/sites\/2\/2023\/05\/06nov2018_inecibercriminales.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/blog\/the-nominal-list-of-the-ine-available-to-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/testing.xplaye.com\/ikusi2\/en\/"},{"@type":"ListItem","position":2,"name":"The nominal list of the INE available to cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#website","url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/","name":"Ikusi EN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/testing.xplaye.com\/ikusi2\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/testing.xplaye.com\/ikusi2\/en\/#\/schema\/person\/bcd06b0e7689b90689815d0b78a2bc2d","name":"Ikusi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/962736704ad33e8f2d1fd7afc591ab0f78027bd65a33c2312c6d1ef90a4b2e77?s=96&d=mm&r=g","caption":"Ikusi"},"url":"https:\/\/testing.xplaye.com\/ikusi2\/en\/author\/ikusi\/"}]}},"_links":{"self":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/comments?post=6870"}],"version-history":[{"count":1,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6870\/revisions"}],"predecessor-version":[{"id":10335,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/posts\/6870\/revisions\/10335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/media?parent=6870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/categories?post=6870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/tags?post=6870"},{"taxonomy":"temas","embeddable":true,"href":"https:\/\/testing.xplaye.com\/ikusi2\/en\/wp-json\/wp\/v2\/temas?post=6870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}