{"id":74174,"date":"2024-04-24T12:13:16","date_gmt":"2024-04-24T15:13:16","guid":{"rendered":"https:\/\/abes.org.br\/?p=74174"},"modified":"2024-04-24T12:13:16","modified_gmt":"2024-04-24T15:13:16","slug":"a-invasao-ao-siafi-poderia-ter-sido-evitada","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/","title":{"rendered":"Could the raid on Siafi have been avoided?"},"content":{"rendered":"<p style=\"text-align: center;\"><em>CLM and Vectra AI comment on the initial unsophisticated techniques used in the attack, such as phishing, and others that are already well known, such as stealing credentials with privileged access<\/em><\/p>\n<p><strong>CLM<\/strong>, a Latin American value-added distributor focused on information security, data protection, cloud and infrastructure for data centers, and\u00a0<strong>Vectra AI,<\/strong>\u00a0leader in detection, investigation and response (NDR solution) to attacks, comment on the invasion, carried out by cybercriminals on SIAFI \u2013 Federal Government&#039;s Integrated Financial Administration System.<\/p>\n<p>Companies, which\u00a0<strong>have just closed a distribution agreement for Latin America<\/strong>, realized, from the news released about the incident, how trivial attack techniques, such as phishing, still cause victims, and it is essential to educate users not to click on links, images or other attractions that infect the network. Advanced privileged access controls are also required, if possible, directly at the endpoint.<\/p>\n<div id=\"attachment_74175\" style=\"width: 215px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-74175\" class=\"wp-image-74175\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/Priscila-300x283.jpg\" alt=\"\" width=\"205\" height=\"193\" \/><p id=\"caption-attachment-74175\" class=\"wp-caption-text\">Priscila Orenstein, Vectra AI product manager at CLM<\/p><\/div>\n<p>According to CLM, in the case of the attack on SIAFI, with the little technical information available, it appears that the criminals used the\u00a0<em>identity bypass<\/em>\u00a0in authentication, which integrates automated phishing and credential theft.<\/p>\n<p>According to Priscila Orenstein, product manager for Vectra AI at CLM, intrusions like the one that occurred at SIAFI can indeed be detected and prevented, rather, with cutting-edge technology for detection and response, guided by Artificial Intelligence, such as from Vectra AI.<\/p>\n<p><strong>Vectra NDR detects intrusions months before they happen<\/strong><br \/>\n\u201cAttackers don\u2019t come in and take control of a network overnight.\u00a0<strong>They wait days, months, until they are ready to attack<\/strong>, a technique known as &#039;<strong>dwell time<\/strong>&#039; or &#039;<strong>living off the land<\/strong>????????<\/p>\n<p>Vectra NDR (Network Detection and Response) searches the network for reconnaissance activities used by attackers after doing the\u00a0<em>bypass<\/em>\u00a0of identity tools, called TTPs (tactics, techniques and procedures).<\/p>\n<p>The Vectra AI solution is capable of identifying the use of these identity credentials outside of the organization&#039;s policy and alerting or interrupting a session until an investigation is carried out\u201d, explains Priscila.<\/p>\n<p>The fact is that, without network visibility and agile tools to interpret data, both external attackers and malicious insiders will have the advantage, resulting in significant financial losses.<\/p>\n<p><strong>Vectra NDR \u2013 AI-Driven Network Detection and Response<\/strong><br \/>\nVectra NDR identifies and stops malicious tactics across networks without the need for decryption, enabling organizations to see, understand and effectively respond to threats and attacks that other solutions miss. In this effective way, security teams reduce the time needed to adjust, hunt and investigate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-74176 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/f9a2dad0-b846-29c6-d73b-789d5b6ba02f-297x300.jpg\" alt=\"\" width=\"297\" height=\"300\" \/><\/p>\n<p><strong>Vectra NDR provides:<\/strong><br \/>\n<strong>Accuracy and context<\/strong>: With accurate insights and detailed context on detected threats, enabling an informed and effective response.<\/p>\n<p><strong>Early threat detection:<\/strong>\u00a0Vectra, advanced NDR, can identify malicious activities on the network before they turn into full-blown attacks, enabling a proactive response, mitigating risks. Vectra doesn&#039;t just analyze anomalies, as other NDR tools do, but focuses on TTPs, which are used by advanced attackers.<\/p>\n<p><strong>Comprehensive Network Visibility:<\/strong>\u00a0complete, detailed view of network activity that allows security teams to quickly identify and respond to hidden threats.<\/p>\n<p><strong>Reduced response time:\u00a0<\/strong>Automated detection and response processes reduce the time needed to identify and contain threats, minimizing the impact on the total operation.<\/p>\n<p><strong>Protection against emerging threats<\/strong>: With the ability to continually learn and adapt to new attack patterns, Vectra, next-generation NDR, continuously protects against emerging threats with a high degree of sophistication.<\/p>\n<p><strong>Single place for communication and visibility<\/strong>: IT security tools do not have a central hub where they can all communicate and respond to telemetry using an automated method. Vectra is the Hub that unites all these tools and takes advantage of its Artificial Intelligence to automatically detect and respond to a cyber attack with great speed.<\/p>\n<p><strong>Phishing and EndPoint Security<\/strong><\/p>\n<p>CLM and VECTRA AI, who have just closed a distribution agreement for Latin America, analyzed the attack on SIAFI and once again show how trivial attack techniques, such as phishing, still claim victims, making it essential to educate users not to click in links, images or other attractions that infect the network. Advanced privileged access controls are also required, if possible, directly at the endpoint<\/p>","protected":false},"excerpt":{"rendered":"<p>CLM e Vectra AI comentam as t\u00e9cnicas iniciais pouco sofisticadas, usadas no ataque, como o phishing, e outras j\u00e1 bastante conhecidas, como o roubo de credenciais com acesso privilegiado CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, e\u00a0Vectra AI,\u00a0l\u00edder em detec\u00e7\u00e3o, investiga\u00e7\u00e3o [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":74177,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[3661,106,5459,901],"class_list":["post-74174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ameacas-emergentes","tag-clm","tag-insiders-maliciosos","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A invas\u00e3o ao Siafi poderia ter sido evitada? - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A invas\u00e3o ao Siafi poderia ter sido evitada? - ABES\" \/>\n<meta property=\"og:description\" content=\"CLM e Vectra AI comentam as t\u00e9cnicas iniciais pouco sofisticadas, usadas no ataque, como o phishing, e outras j\u00e1 bastante conhecidas, como o roubo de credenciais com acesso privilegiado CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, e\u00a0Vectra AI,\u00a0l\u00edder em detec\u00e7\u00e3o, investiga\u00e7\u00e3o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T15:13:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/vectra-CLM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"908\" \/>\n\t<meta property=\"og:image:height\" content=\"509\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"A invas\u00e3o ao Siafi poderia ter sido evitada?\",\"datePublished\":\"2024-04-24T15:13:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/\"},\"wordCount\":809,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/vectra-CLM.jpg\",\"keywords\":[\"amea\u00e7as emergentes\",\"CLM\",\"insiders maliciosos\",\"Phishing\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/\",\"name\":\"A invas\u00e3o ao Siafi poderia ter sido evitada? - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/vectra-CLM.jpg\",\"datePublished\":\"2024-04-24T15:13:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/vectra-CLM.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/vectra-CLM.jpg\",\"width\":908,\"height\":509},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/a-invasao-ao-siafi-poderia-ter-sido-evitada\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A invas\u00e3o ao Siafi poderia ter sido evitada?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Could the invasion of Siafi have been avoided? - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/","og_locale":"en_US","og_type":"article","og_title":"A invas\u00e3o ao Siafi poderia ter sido evitada? - ABES","og_description":"CLM e Vectra AI comentam as t\u00e9cnicas iniciais pouco sofisticadas, usadas no ataque, como o phishing, e outras j\u00e1 bastante conhecidas, como o roubo de credenciais com acesso privilegiado CLM, distribuidor latino-americano de valor agregado com foco em seguran\u00e7a da informa\u00e7\u00e3o, prote\u00e7\u00e3o de dados, cloud e infraestrutura para data centers, e\u00a0Vectra AI,\u00a0l\u00edder em detec\u00e7\u00e3o, investiga\u00e7\u00e3o [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-04-24T15:13:16+00:00","og_image":[{"width":908,"height":509,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/vectra-CLM.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"A invas\u00e3o ao Siafi poderia ter sido evitada?","datePublished":"2024-04-24T15:13:16+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/"},"wordCount":809,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/vectra-CLM.jpg","keywords":["amea\u00e7as emergentes","CLM","insiders maliciosos","Phishing"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/","url":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/","name":"Could the invasion of Siafi have been avoided? - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/vectra-CLM.jpg","datePublished":"2024-04-24T15:13:16+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/vectra-CLM.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/04\/vectra-CLM.jpg","width":908,"height":509},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/a-invasao-ao-siafi-poderia-ter-sido-evitada\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"A invas\u00e3o ao Siafi poderia ter sido evitada?"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-26 18:24:11","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/74174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=74174"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/74174\/revisions"}],"predecessor-version":[{"id":74178,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/74174\/revisions\/74178"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/74177"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=74174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=74174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=74174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}