{"id":3770,"date":"2025-07-18T13:56:01","date_gmt":"2025-07-18T13:56:01","guid":{"rendered":"https:\/\/sse.com.co\/?page_id=3770"},"modified":"2025-08-11T21:55:08","modified_gmt":"2025-08-11T21:55:08","slug":"ataques-a-la-cadena-de-suministro-de-software","status":"publish","type":"page","link":"https:\/\/sse.com.co\/en\/ataques-a-la-cadena-de-suministro-de-software\/","title":{"rendered":"Ataques a la Cadena de Suministro de Software"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3770\" class=\"elementor elementor-3770\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6de79f31 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle elementor-invisible\" data-id=\"6de79f31\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5de79f5e\" data-id=\"5de79f5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66a7930 elementor-widget elementor-widget-heading\" data-id=\"66a7930\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Blog<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c41a1f3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c41a1f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">In this space, we will share key information on digital protection,\u00a0<\/span><span style=\"color: #ffffff; font-style: inherit; font-weight: inherit;\">trends in computer security, cyber threat analysis and advice for companies and users. Our goal is to provide you with tools and knowledge that will allow you to navigate with confidence in the digital world.<\/span><\/p><p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Join us and stay up to date with the latest news in information security!\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-a4f13db e-flex e-con-boxed e-con e-parent\" data-id=\"a4f13db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a9499f elementor-widget elementor-widget-shortcode\" data-id=\"6a9499f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_3770\" class=\"pvc_stats all  pvc_load_by_ajax_update\" data-element-id=\"3770\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewbox=\"0 0 502 315\" preserveaspectratio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/sse.com.co\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=\"0\" \/><\/p><div class=\"pvc_clear\"><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e2e558 e-con-full e-flex e-con e-parent\" data-id=\"3e2e558\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2d7cda6 e-con-full e-flex e-con e-child\" data-id=\"2d7cda6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9662a25 elementor-widget elementor-widget-image\" data-id=\"9662a25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-3772\" alt=\"\" srcset=\"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-768x512.jpg 768w, https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-300x200.jpg 300w, https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-1024x683.jpg 1024w, https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e77597e e-con-full e-flex e-con e-child\" data-id=\"e77597e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8b509a8 e-con-full e-flex e-con e-child\" data-id=\"8b509a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8bed34a elementor-widget elementor-widget-heading\" data-id=\"8bed34a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Software Supply Chain Attacks: How to Detect and Mitigate Risks Before They Impact Your Enterprise<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0e09d3 e-con-full e-flex e-con e-child\" data-id=\"f0e09d3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-530262b elementor-widget elementor-widget-text-editor\" data-id=\"530262b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-pm-slice=\"1 1 []\">En un ecosistema digital cada vez m\u00e1s interconectado, los <strong>ciberataques a la cadena de suministro de software<\/strong> se han convertido en una de las amenazas m\u00e1s cr\u00edticas y complejas para las organizaciones. Esta forma de ataque busca infiltrarse en sistemas confiables a trav\u00e9s de vulnerabilidades en proveedores, librer\u00edas de c\u00f3digo, o herramientas de desarrollo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0af0d12 e-flex e-con-boxed e-con e-parent\" data-id=\"0af0d12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1d4189 elementor-widget elementor-widget-text-editor\" data-id=\"f1d4189\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-pm-slice=\"1 1 []\">\u26a1 <span style=\"color: #242a56;\">Tendencia 2025: Riesgos en aumento<\/span><\/h3><p>Durante abril y mayo de 2025, los ataques a la cadena de suministro crecieron un <strong>25 %<\/strong>, seg\u00fan reportes de firmas de ciberinteligencia como Cyble y Sekoia. Este aumento evidencia un cambio de estrategia por parte de los atacantes, quienes ahora prefieren atacar eslabones \u00abm\u00e1s d\u00e9biles\u00bb de forma indirecta.<\/p><p>El <strong>Foro Econ\u00f3mico Mundial<\/strong> incluso posiciona este tipo de amenazas como una prioridad urgente: m\u00e1s del <strong>50 % de las empresas encuestadas<\/strong> admiten que no cuentan con controles adecuados sobre sus proveedores de software.<\/p><h3>\ud83e\udde8 <span style=\"color: #242a56;\">\u00bfC\u00f3mo funcionan estos ataques?<\/span><\/h3><p>Un ataque a la cadena de suministro puede tomar diversas formas:<\/p><ul data-spread=\"false\"><li><p><strong>Inserci\u00f3n de c\u00f3digo malicioso<\/strong> en librer\u00edas open-source ampliamente usadas.<\/p><\/li><li><p><strong>Compromiso de herramientas de desarrollo<\/strong> (CI\/CD) que alteran el software durante su construcci\u00f3n.<\/p><\/li><li><p><strong>Uso de actualizaciones falsas<\/strong> o modificadas distribuidas desde servidores de terceros.<\/p><\/li><li><p><strong>Fugas de credenciales de acceso<\/strong> a plataformas SaaS utilizadas por empresas.<\/p><\/li><\/ul><p>Un caso emblem\u00e1tico fue el ataque a SolarWinds en 2020, pero en 2025 se han reportado incidentes similares contra cadenas de suministro en sectores como fintech, salud y telecomunicaciones.<\/p><h3>\ud83d\udcc8 <span style=\"color: #242a56;\">Impacto en las organizaciones<\/span><\/h3><p>Los ataques de esta naturaleza comprometen la <strong>integridad del software<\/strong> desde su origen. Algunas consecuencias incluyen:<\/p><ul data-spread=\"false\"><li><p>Robo de informaci\u00f3n confidencial de clientes y empleados.<\/p><\/li><li><p>Interrupci\u00f3n de operaciones cr\u00edticas.<\/p><\/li><li><p>P\u00e9rdida de reputaci\u00f3n y confianza del mercado.<\/p><\/li><li><p>Demandas legales por negligencia en la gesti\u00f3n de riesgos.<\/p><\/li><\/ul><h3>\ud83e\udd1d<span style=\"color: #242a56;\"> Recomendaciones para prevenir y mitigar<\/span><\/h3><ol start=\"1\" data-spread=\"true\"><li><p><strong>Realiza auditor\u00edas de proveedores y terceros<\/strong>: Eval\u00faa sus pr\u00e1cticas de seguridad y exige cumplimiento de normas internacionales como <a href=\"https:\/\/sse.com.co\/en\/que-es-la-iso-iec-27001\/\">ISO 27001.<\/a><\/p><\/li><li><p><strong>Utiliza SBOM (Software Bill of Materials)<\/strong>: Documenta todas las dependencias de software para monitorear cambios, actualizaciones y posibles compromisos.<\/p><\/li><li><p><strong>Fortalece la seguridad en entornos CI\/CD<\/strong>: Aplica autenticaci\u00f3n multifactor, escaneo de vulnerabilidades y control de versiones.<\/p><\/li><li><p><strong>Monitoreo continuo y detecci\u00f3n de anomal\u00edas<\/strong>: Implementa soluciones que analicen el comportamiento de aplicaciones y alerten sobre desviaciones.<\/p><\/li><li><p><strong><a href=\"https:\/\/sse.com.co\/en\/servicios\/capacitaciones\/\">Capacitaci\u00f3n a los equipos<\/a> de desarrollo y adquisiciones<\/strong>: Sensibiliza sobre riesgos asociados a dependencias externas y mejores pr\u00e1cticas.<\/p><\/li><\/ol><h3>\ud83d\udee1\ufe0f <span style=\"color: #242a56;\">\u00bfC\u00f3mo puede ayudarte SSE?<\/span><\/h3><p>En <strong>SSE<\/strong> ayudamos a las organizaciones a evaluar y fortalecer su seguridad frente a amenazas externas y eslabones vulnerables en su cadena de software:<\/p><ul data-spread=\"false\"><li><p><a href=\"https:\/\/sse.com.co\/en\/servicios\/estudios-de-confiabilidad\/\">Reliability studies<\/a> a proveedores tecnol\u00f3gicos.<\/p><\/li><li><p>Pruebas de penetraci\u00f3n a entornos de desarrollo.<\/p><\/li><li><p>Acompa\u00f1amiento para la implementaci\u00f3n de SBOM y controles en CI\/CD.<\/p><\/li><li><p>Capacitaciones especializadas para equipos t\u00e9cnicos y de adquisiciones.<\/p><\/li><\/ul><h3>\ud83d\udce2<span style=\"color: #242a56;\"> Conclusi\u00f3n<\/span><\/h3><p>La cadena de suministro de software ya no es un aspecto secundario de la <a href=\"https:\/\/sse.com.co\/en\/ciberseguridad-para-principiantes\/\">ciberseguridad<\/a>; es un frente cr\u00edtico que requiere acci\u00f3n inmediata. Anticiparse a las amenazas, auditar a los proveedores y trabajar con aliados expertos es la mejor forma de blindar tu organizaci\u00f3n ante los riesgos del presente y del futuro.<\/p><div><hr \/><\/div><p>\u00a0<\/p><p><strong>\u2709\ufe0f \u00bfQuieres saber si tu cadena de suministro est\u00e1 expuesta? Escr\u00edbenos y realiza una evaluaci\u00f3n gratuita de confiabilidad de software.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-15d7ec0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15d7ec0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60c9801\" data-id=\"60c9801\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76b8880 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76b8880\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c6e043a\" data-id=\"c6e043a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28ab6b3 elementor-widget elementor-widget-heading\" data-id=\"28ab6b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Would you like to start a project with us?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-658ce51 elementor-widget elementor-widget-text-editor\" data-id=\"658ce51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We're here to help you boost your business and protect your digital assets. Let's begin this journey to security together!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c096dd1\" data-id=\"c096dd1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c45d27 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"9c45d27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wa.me\/message\/BTQ3H2YT7BCQK1\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-whatsapp\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M380.9 97.1C339 55.1 283.2 32 223.9 32c-122.4 0-222 99.6-222 222 0 39.1 10.2 77.3 29.6 111L0 480l117.7-30.9c32.4 17.7 68.9 27 106.1 27h.1c122.3 0 224.1-99.6 224.1-222 0-59.3-25.2-115-67.1-157zm-157 341.6c-33.2 0-65.7-8.9-94-25.7l-6.7-4-69.8 18.3L72 359.2l-4.4-7c-18.5-29.4-28.2-63.3-28.2-98.2 0-101.7 82.8-184.5 184.6-184.5 49.3 0 95.6 19.2 130.4 54.1 34.8 34.9 56.2 81.2 56.1 130.5 0 101.8-84.9 184.6-186.6 184.6zm101.2-138.2c-5.5-2.8-32.8-16.2-37.9-18-5.1-1.9-8.8-2.8-12.5 2.8-3.7 5.6-14.3 18-17.6 21.8-3.2 3.7-6.5 4.2-12 1.4-32.6-16.3-54-29.1-75.5-66-5.7-9.8 5.7-9.1 16.3-30.3 1.8-3.7.9-6.9-.5-9.7-1.4-2.8-12.5-30.1-17.1-41.2-4.5-10.8-9.1-9.3-12.5-9.5-3.2-.2-6.9-.2-10.6-.2-3.7 0-9.7 1.4-14.8 6.9-5.1 5.6-19.4 19-19.4 46.3 0 27.3 19.9 53.7 22.6 57.4 2.8 3.7 39.1 59.7 94.8 83.8 35.2 15.2 49 16.5 66.6 13.9 10.7-1.6 32.8-13.4 37.4-26.4 4.6-13 4.6-24.1 3.2-26.4-1.3-2.5-5-3.9-10.5-6.6z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">315 0378792<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3770\" class=\"pvc_stats all\" data-element-id=\"3770\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewbox=\"0 0 502 315\" preserveaspectratio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/sse.com.co\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=\"0\" \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p>Blog En este espacio, compartiremos informaci\u00f3n clave sobre protecci\u00f3n digital,\u00a0tendencias en seguridad inform\u00e1tica, an\u00e1lisis de ciberamenazas y consejos para empresas y usuarios. Nuestro objetivo es brindarte herramientas y conocimientos que te permitan navegar con confianza en el mundo digital. \u00a1Acomp\u00e1\u00f1anos y mantente al d\u00eda con las \u00faltimas novedades en seguridad de la informaci\u00f3n!\u00a0 Ataques a [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3770","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ataques a la Cadena de Suministro de Software<\/title>\n<meta name=\"description\" content=\"Descubre c\u00f3mo los ataques a la cadena de suministro de software est\u00e1n afectando a las empresas en 2025 y aprende a proteger tu organizaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sse.com.co\/en\/ataques-a-la-cadena-de-suministro-de-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataques a la Cadena de Suministro de Software\" \/>\n<meta property=\"og:description\" content=\"Descubre c\u00f3mo los ataques a la cadena de suministro de software est\u00e1n afectando a las empresas en 2025 y aprende a proteger tu organizaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sse.com.co\/en\/ataques-a-la-cadena-de-suministro-de-software\/\" \/>\n<meta property=\"og:site_name\" content=\"SSE Security Solutions &amp; Education\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SSEcolombia\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-11T21:55:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@SSELtda\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/\",\"url\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/\",\"name\":\"Ataques a la Cadena de Suministro de Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sse.com.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sse.com.co\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/code-1839406_1280-768x512.jpg\",\"datePublished\":\"2025-07-18T13:56:01+00:00\",\"dateModified\":\"2025-08-11T21:55:08+00:00\",\"description\":\"Descubre c\u00f3mo los ataques a la cadena de suministro de software est\u00e1n afectando a las empresas en 2025 y aprende a proteger tu organizaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sse.com.co\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/code-1839406_1280-768x512.jpg\",\"contentUrl\":\"https:\\\/\\\/sse.com.co\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/code-1839406_1280-768x512.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sse.com.co\\\/ataques-a-la-cadena-de-suministro-de-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/sse.com.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ataques a la Cadena de Suministro de Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sse.com.co\\\/#website\",\"url\":\"https:\\\/\\\/sse.com.co\\\/\",\"name\":\"SSE S.A.S\",\"description\":\"Seguridad de la informaci\u00f3n para PYME\",\"publisher\":{\"@id\":\"https:\\\/\\\/sse.com.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sse.com.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sse.com.co\\\/#organization\",\"name\":\"SSE S.A.S\",\"url\":\"https:\\\/\\\/sse.com.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sse.com.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sse.com.co\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Logo_SSE_sse.png\",\"contentUrl\":\"https:\\\/\\\/sse.com.co\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Logo_SSE_sse.png\",\"width\":965,\"height\":568,\"caption\":\"SSE S.A.S\"},\"image\":{\"@id\":\"https:\\\/\\\/sse.com.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/SSEcolombia\\\/\",\"https:\\\/\\\/x.com\\\/SSELtda\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/security-solutions-education\\\/about\\\/?viewAsMember=true\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ataques a la Cadena de Suministro de Software","description":"Descubre c\u00f3mo los ataques a la cadena de suministro de software est\u00e1n afectando a las empresas en 2025 y aprende a proteger tu organizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sse.com.co\/en\/ataques-a-la-cadena-de-suministro-de-software\/","og_locale":"en_US","og_type":"article","og_title":"Ataques a la Cadena de Suministro de Software","og_description":"Descubre c\u00f3mo los ataques a la cadena de suministro de software est\u00e1n afectando a las empresas en 2025 y aprende a proteger tu organizaci\u00f3n.","og_url":"https:\/\/sse.com.co\/en\/ataques-a-la-cadena-de-suministro-de-software\/","og_site_name":"SSE Security Solutions &amp; Education","article_publisher":"https:\/\/www.facebook.com\/SSEcolombia\/","article_modified_time":"2025-08-11T21:55:08+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@SSELtda","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/","url":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/","name":"Ataques a la Cadena de Suministro de Software","isPartOf":{"@id":"https:\/\/sse.com.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/#primaryimage"},"image":{"@id":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/#primaryimage"},"thumbnailUrl":"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-768x512.jpg","datePublished":"2025-07-18T13:56:01+00:00","dateModified":"2025-08-11T21:55:08+00:00","description":"Descubre c\u00f3mo los ataques a la cadena de suministro de software est\u00e1n afectando a las empresas en 2025 y aprende a proteger tu organizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/#primaryimage","url":"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-768x512.jpg","contentUrl":"https:\/\/sse.com.co\/wp-content\/uploads\/2025\/07\/code-1839406_1280-768x512.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sse.com.co\/ataques-a-la-cadena-de-suministro-de-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/sse.com.co\/"},{"@type":"ListItem","position":2,"name":"Ataques a la Cadena de Suministro de Software"}]},{"@type":"WebSite","@id":"https:\/\/sse.com.co\/#website","url":"https:\/\/sse.com.co\/","name":"SSE S.A.S","description":"Seguridad de la informaci\u00f3n para PYME","publisher":{"@id":"https:\/\/sse.com.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sse.com.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sse.com.co\/#organization","name":"SSE S.A.S","url":"https:\/\/sse.com.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sse.com.co\/#\/schema\/logo\/image\/","url":"https:\/\/sse.com.co\/wp-content\/uploads\/2024\/02\/Logo_SSE_sse.png","contentUrl":"https:\/\/sse.com.co\/wp-content\/uploads\/2024\/02\/Logo_SSE_sse.png","width":965,"height":568,"caption":"SSE S.A.S"},"image":{"@id":"https:\/\/sse.com.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SSEcolombia\/","https:\/\/x.com\/SSELtda","https:\/\/www.linkedin.com\/company\/security-solutions-education\/about\/?viewAsMember=true"]}]}},"_links":{"self":[{"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/pages\/3770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/comments?post=3770"}],"version-history":[{"count":14,"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/pages\/3770\/revisions"}],"predecessor-version":[{"id":3873,"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/pages\/3770\/revisions\/3873"}],"wp:attachment":[{"href":"https:\/\/sse.com.co\/en\/wp-json\/wp\/v2\/media?parent=3770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}