{"id":83124,"date":"2025-01-10T08:00:25","date_gmt":"2025-01-10T11:00:25","guid":{"rendered":"https:\/\/abes.org.br\/?p=83124"},"modified":"2025-01-06T19:26:36","modified_gmt":"2025-01-06T22:26:36","slug":"hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/","title":{"rendered":"Ethical Hackers: The First Line of Defense in Cybersecurity"},"content":{"rendered":"<p style=\"text-align: center;\"><em>Support for the extrajudicial recovery of guarantees in the context of the legal framework<\/em><\/p>\n<p><span data-olk-copy-source=\"MessageBody\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83125 size-medium alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" \/>In a global scenario where Brazil is the country most attacked by hackers in Latin America and the second most attacked in the world, only behind the United States, cybersecurity is no longer a choice and has become a strategic necessity for companies. Within this scenario, the work of ethical hackers stands out, specialists whose mission is to identify and correct vulnerabilities proactively, ensuring data integrity and customer trust.<\/span><\/p>\n<p>Contrary to what many people think, the term \u201chacker\u201d does not only refer to those who use their skills for illicit purposes. Ethical hackers play a crucial role in preventing attacks by acting in an authorized and responsible manner.<\/p>\n<p>A practical example comes from Alias, a company that offers technological solutions for financial institutions and Detrans, especially in the segment of vehicle financing contract registration. With a focus on innovation, the company is a reference in the segment. It uses advanced technology to protect customer and financial institution data.<\/p>\n<p>\u201cToday, the greatest currency we have is information. Our job is to ensure that it remains secure, even in the face of thousands of daily hacking attempts,\u201d explains Roberto Leonardi, security specialist at Alias.<\/p>\n<p>How do ethical hackers work?<\/p>\n<p>Ethical hackers simulate real cyberattacks in controlled environments to expose potential exploits before they are exploited by malicious hackers. At Alias, these simulations take place in validation environments\u2014replicas of the original system, but with fake, randomly generated data. This ensures that the integrity of sensitive information is not compromised.<\/p>\n<p>Advanced tools such as\u00a0<em>OWASP Zap, OpenVAS, Metasploit\u00a0<\/em>and<em>\u00a0Burp Suite<\/em>, are used to map vulnerabilities. In addition, strict protocols and backups ensure that, even when testing in the production environment, data security is preserved.<\/p>\n<p><strong>Impact on customer confidence<\/strong><\/p>\n<p>Preventative action by ethical hackers not only protects systems, but also reinforces customer trust. A practical example shared by Roberto is the implementation of advanced scripts that immediately detect and block IPs associated with hacking attempts. \u201cWe receive numerous attack attempts every day, and none of them are successful. This reinforces trust in our work and sets us apart in the market in which we operate,\u201d he says.<\/p>\n<p><strong>Challenges and alignment with certifications<\/strong><\/p>\n<p>Cybersecurity faces the challenge of balancing innovation with regulatory compliance, especially in highly demanding sectors such as the market. Alias follows strict standards and, as a positive consequence, has received LGPD compliance certification from\u00a0<em>Comply<\/em>\u00a0LGPD\u00a0<em>Solutions<\/em>.<\/p>\n<p>\u201cOur work is deeply aligned with these certifications. Regular testing ensures that we are compliant with the standards, strengthening our digital defenses and customer confidence,\u201d concludes Roberto Leonardi.<\/p>\n<p>&nbsp;<\/p>\n<p><em><b>About Alias Technology<\/b><\/em><\/p>\n<p><em>With almost two decades of experience, Alias Tecnologia develops solutions that optimize financial processes for the automotive sector, with a focus on automation and innovation. Its platforms connect efficiency and security, offering complete solutions for the credit market.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Apoio \u00e0 recupera\u00e7\u00e3o extrajudicial de garantias no contexto do marco legal Em um cen\u00e1rio global onde o Brasil \u00e9 o pa\u00eds mais atacado por hackers na Am\u00e9rica Latina e o segundo no mundo, apenas atr\u00e1s dos Estados Unidos, a ciberseguran\u00e7a deixou de ser uma escolha e se tornou uma necessidade estrat\u00e9gica para empresas. Dentro desse [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":83125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[6497,270],"class_list":["post-83124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-hackers-eticos","tag-seguranca-cibernetica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica - ABES\" \/>\n<meta property=\"og:description\" content=\"Apoio \u00e0 recupera\u00e7\u00e3o extrajudicial de garantias no contexto do marco legal Em um cen\u00e1rio global onde o Brasil \u00e9 o pa\u00eds mais atacado por hackers na Am\u00e9rica Latina e o segundo no mundo, apenas atr\u00e1s dos Estados Unidos, a ciberseguran\u00e7a deixou de ser uma escolha e se tornou uma necessidade estrat\u00e9gica para empresas. Dentro desse [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-10T11:00:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica\",\"datePublished\":\"2025-01-10T11:00:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/\"},\"wordCount\":567,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/HACKERS-ETICOS.jpg\",\"keywords\":[\"hackers \u00e9ticos\",\"seguran\u00e7a cibern\u00e9tica\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/\",\"name\":\"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/HACKERS-ETICOS.jpg\",\"datePublished\":\"2025-01-10T11:00:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/HACKERS-ETICOS.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/HACKERS-ETICOS.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/","og_locale":"en_US","og_type":"article","og_title":"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica - ABES","og_description":"Apoio \u00e0 recupera\u00e7\u00e3o extrajudicial de garantias no contexto do marco legal Em um cen\u00e1rio global onde o Brasil \u00e9 o pa\u00eds mais atacado por hackers na Am\u00e9rica Latina e o segundo no mundo, apenas atr\u00e1s dos Estados Unidos, a ciberseguran\u00e7a deixou de ser uma escolha e se tornou uma necessidade estrat\u00e9gica para empresas. Dentro desse [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2025-01-10T11:00:25+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica","datePublished":"2025-01-10T11:00:25+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/"},"wordCount":567,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS.jpg","keywords":["hackers \u00e9ticos","seguran\u00e7a cibern\u00e9tica"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/","url":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/","name":"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS.jpg","datePublished":"2025-01-10T11:00:25+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/HACKERS-ETICOS.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/hackers-eticos-a-primeira-linha-de-defesa-na-seguranca-cibernetica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Hackers \u00e9ticos: A primeira linha de defesa na seguran\u00e7a cibern\u00e9tica"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 16:41:23","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/83124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=83124"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/83124\/revisions"}],"predecessor-version":[{"id":83126,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/83124\/revisions\/83126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/83125"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=83124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=83124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=83124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}