{"id":11318,"date":"2025-08-13T16:20:30","date_gmt":"2025-08-13T16:20:30","guid":{"rendered":"https:\/\/blog.clickpanda.com\/?p=11318"},"modified":"2025-08-13T16:20:31","modified_gmt":"2025-08-13T16:20:31","slug":"vibe-hacking-amenazas-ia","status":"publish","type":"post","link":"https:\/\/blog.clickpanda.com\/en\/ia\/vibe-hacking-threats-ia\/","title":{"rendered":"What is Vibe Hacking? Generative AI used by attackers"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11318\" class=\"elementor elementor-11318\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea49737 e-flex e-con-boxed e-con e-parent\" data-id=\"ea49737\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61e3f3e elementor-widget elementor-widget-heading\" data-id=\"61e3f3e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Introduction<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2873236 elementor-widget elementor-widget-text-editor\" data-id=\"2873236\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"573\" data-end=\"1052\">In today's world, cyber threats are evolving rapidly, and cyber attacks are becoming more sophisticated thanks to artificial intelligence (AI). One of the most recent concepts that has emerged in this context is the <strong data-start=\"831\" data-end=\"847\">Vibe Hacking<\/strong>a term that refers to how attackers use generative AI to create advanced hacking tools designed to breach systems more efficiently and harder to detect.<\/p><p data-start=\"1054\" data-end=\"1449\">As generative AI tools become more accessible, attackers can now customize attacks more precisely, adapting to different targets and systems. In this article, we will explore what is <strong data-start=\"1286\" data-end=\"1302\">Vibe Hacking<\/strong>How attackers are using AI for their malicious purposes and what steps you can take to protect your system and data from these new threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06b0e7c elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"06b0e7c\" data-element_type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__06b0e7c\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__06b0e7c\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t<div id=\"elementor-toc__06b0e7c\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c9a834 elementor-widget elementor-widget-text-editor\" data-id=\"4c9a834\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"716\" data-end=\"748\"><strong data-start=\"720\" data-end=\"748\">What is Vibe Hacking?<\/strong><\/h2><p data-start=\"749\" data-end=\"1180\">The <strong data-start=\"752\" data-end=\"768\">Vibe Hacking<\/strong> is an emerging technique in the cybersecurity world that uses generative AI to influence people's emotions and behaviors through manipulative messages. This type of attack uses AI's ability to create highly convincing content, such as spoofed text messages, images and even videos, that exploit users' psychological vulnerabilities.<\/p><p data-start=\"1182\" data-end=\"1548\"><strong data-start=\"1182\" data-end=\"1205\">Origin of the term:<\/strong><br data-start=\"1205\" data-end=\"1208\" \/>The term \"Vibe Hacking\" comes from the idea of \"hacking\" a person's emotional \"vibe\" by altering their decisions through false or manipulated information. This concept is closely related to generative AI, which is used to create manipulated content at a much more advanced level than traditional methods.<\/p><p data-start=\"1550\" data-end=\"1565\"><strong data-start=\"1550\" data-end=\"1563\">Examples:<\/strong><\/p><ol data-start=\"1566\" data-end=\"1860\"><li data-start=\"1566\" data-end=\"1731\"><p data-start=\"1569\" data-end=\"1731\"><strong data-start=\"1569\" data-end=\"1593\">Persuasive Phishing:<\/strong> E-mail messages that appear to come from a trusted source, but are actually attempts to steal personal information.<\/p><\/li><li data-start=\"1732\" data-end=\"1860\"><p data-start=\"1735\" data-end=\"1860\"><strong data-start=\"1735\" data-end=\"1749\">Deepfakes:<\/strong> Fake videos of public figures that are used to spread disinformation or mislead people.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3cc29f elementor-widget elementor-widget-text-editor\" data-id=\"a3cc29f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<blockquote><p><strong data-start=\"1786\" data-end=\"1803\">How it works<\/strong>:<br data-start=\"1804\" data-end=\"1807\" \/>Attackers use <strong data-start=\"1840\" data-end=\"1857\">Generative AI<\/strong>The use of GPT models, such as GPT models, to create hacking scripts, advanced phishing, and malware specifically designed to overcome security barriers. Through this technique, targeted attacks can be generated that are much more difficult to detect.<\/p><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9202047 elementor-widget elementor-widget-image\" data-id=\"9202047\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/diseno-paginas-web?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner1\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wordpress-blogs.s3.us-east-2.amazonaws.com\/wp-content\/uploads\/2019\/03\/23170523\/CTA-BLOG-WEB-1.gif\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee811ac elementor-widget elementor-widget-text-editor\" data-id=\"ee811ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2288\" data-end=\"2336\"><strong data-start=\"2292\" data-end=\"2336\">Use of generative AI in hacking<\/strong><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1e133a elementor-widget elementor-widget-text-editor\" data-id=\"b1e133a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"2338\" data-end=\"2567\"><strong data-start=\"2338\" data-end=\"2367\">Automation of attacks<\/strong>:<br data-start=\"2368\" data-end=\"2371\" \/>Generative AI tools enable attackers to automate complex tasks, such as the creation of <strong data-start=\"2480\" data-end=\"2503\">phishing sites<\/strong> that automatically adapt to the victim's behavior.<\/li><li data-start=\"2569\" data-end=\"2772\"><strong data-start=\"2569\" data-end=\"2601\">Advanced malware creation<\/strong>:<br data-start=\"2602\" data-end=\"2605\" \/>Using AI, attackers can generate <strong data-start=\"2645\" data-end=\"2665\">malicious code<\/strong> that adapts in real time to a system's defenses, creating malware that is difficult to detect and prevent.<\/li><li data-start=\"2774\" data-end=\"2982\"><strong data-start=\"2774\" data-end=\"2804\">Falsification of identity<\/strong>:<br data-start=\"2805\" data-end=\"2808\" \/>AI can also be used to create false identities or impersonate a person's voice, allowing attackers to manipulate their victims with high accuracy.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efda329 elementor-widget elementor-widget-text-editor\" data-id=\"efda329\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Using AI, attackers can generate <strong data-start=\"1300\" data-end=\"1320\">malicious code<\/strong> that adapts in real time to a system's defenses, creating malware that is difficult to detect and prevent. If you want to learn about some free AI tools that allow you to explore the power of artificial intelligence, visit our article on <a class=\"\" href=\"https:\/\/blog.clickpanda.com\/en\/ia\/free-ia-tools-that-you-should-try-out\/\" target=\"_new\" rel=\"noopener\" data-start=\"1579\" data-end=\"1715\"><strong data-start=\"1580\" data-end=\"1632\">free AI tools you should try<\/strong><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e2d9d6 elementor-widget elementor-widget-text-editor\" data-id=\"2e2d9d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"1862\" data-end=\"1931\"><strong data-start=\"1866\" data-end=\"1931\">How Attackers Use Generative AI for Vibe Hacking<\/strong><\/h2><p data-start=\"1932\" data-end=\"2093\">Attackers use generative AI to create highly sophisticated content and manipulation tools. Some of the most common methods include:<\/p><ol data-start=\"2095\" data-end=\"2772\"><li data-start=\"2095\" data-end=\"2328\"><p data-start=\"2098\" data-end=\"2328\"><strong data-start=\"2098\" data-end=\"2159\">Creating persuasive messages and convincing deepfakes<\/strong><br data-start=\"2159\" data-end=\"2162\" \/>AI can generate texts and videos that accurately mimic the communication style of trusted individuals, making it more difficult to identify the attack.<\/p><\/li><li data-start=\"2330\" data-end=\"2563\"><p data-start=\"2333\" data-end=\"2563\"><strong data-start=\"2333\" data-end=\"2395\">Automation of phishing and social engineering attacks<\/strong><br data-start=\"2395\" data-end=\"2398\" \/>Using AI, attackers can customize their attacks to be more credible and targeted to specific individuals, increasing the likelihood of success.<\/p><\/li><li data-start=\"2565\" data-end=\"2772\"><p data-start=\"2568\" data-end=\"2772\"><strong data-start=\"2568\" data-end=\"2637\">Adaptive malware and custom malicious code generation<\/strong><br data-start=\"2637\" data-end=\"2640\" \/>AI can also help develop malware that adapts to systems' defenses, making it harder to stop.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be66e9e elementor-widget elementor-widget-text-editor\" data-id=\"be66e9e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"3181\" data-end=\"3231\"><strong data-start=\"3185\" data-end=\"3231\">Threats posed by Vibe Hacking<\/strong><\/h2><p data-start=\"3233\" data-end=\"3452\"><strong data-start=\"3233\" data-end=\"3257\">Security risks<\/strong>:<br data-start=\"3258\" data-end=\"3261\" \/>With generative AI, attackers can design <strong data-start=\"3312\" data-end=\"3323\">malware<\/strong> or hacking tools that are constantly evolving, making traditional defenses much less effective.<\/p><p data-start=\"3454\" data-end=\"3696\"><strong data-start=\"3454\" data-end=\"3484\">More customized attacks<\/strong>:<br data-start=\"3485\" data-end=\"3488\" \/>Unlike generic phishing attacks, attackers can generate highly personalized and targeted messages to specific individuals or companies, which increases the likelihood of a successful attack.<\/p><p data-start=\"3698\" data-end=\"3896\"><strong data-start=\"3698\" data-end=\"3732\">Increased difficulty in detecting<\/strong>:<br data-start=\"3733\" data-end=\"3736\" \/>Automated attacks created by AI can go undetected for longer periods of time, allowing attackers to cause more damage before being detected.<\/p><blockquote><p data-start=\"3898\" data-end=\"4089\"><strong data-start=\"3898\" data-end=\"3909\">Example<\/strong>:<br data-start=\"3910\" data-end=\"3913\" \/>Companies can be targeted by <strong data-start=\"3947\" data-end=\"3971\">sophisticated attacks<\/strong> such as social engineering attacks, which trick employees into giving unsuspecting employees access to internal systems.<\/p><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de274d5 elementor-widget elementor-widget-text-editor\" data-id=\"de274d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2774\" data-end=\"2818\"><strong data-start=\"2778\" data-end=\"2818\">Main risks of Vibe Hacking<\/strong><\/h2><p data-start=\"2819\" data-end=\"2917\">Vibe Hacking not only affects privacy, but can have much more serious consequences:<\/p><ol data-start=\"2919\" data-end=\"3554\"><li data-start=\"2919\" data-end=\"3115\"><p data-start=\"2922\" data-end=\"3115\"><strong data-start=\"2922\" data-end=\"2962\">Data loss and identity theft<\/strong><br data-start=\"2962\" data-end=\"2965\" \/>Attackers can use AI-generated tools to steal sensitive data or impersonate individuals and organizations.<\/p><\/li><li data-start=\"3117\" data-end=\"3356\"><p data-start=\"3120\" data-end=\"3356\"><strong data-start=\"3120\" data-end=\"3177\">Manipulation of decisions through false information<\/strong><br data-start=\"3177\" data-end=\"3180\" \/>Attacks may be designed to influence key decisions, such as voting in elections or making financial transactions, based on erroneous or manipulated information.<\/p><\/li><li data-start=\"3358\" data-end=\"3554\"><p data-start=\"3361\" data-end=\"3554\"><strong data-start=\"3361\" data-end=\"3411\">Attacks on personal and corporate reputation<\/strong><br data-start=\"3411\" data-end=\"3414\" \/>The dissemination of deepfakes or false messages can damage the reputation of individuals and companies, affecting their credibility and trustworthiness.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1354125 elementor-widget elementor-widget-text-editor\" data-id=\"1354125\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"3556\" data-end=\"3596\"><strong data-start=\"3560\" data-end=\"3596\">How to protect yourself from Vibe Hacking<\/strong><\/h2><p data-start=\"3597\" data-end=\"3723\">As Vibe Hacking becomes a more sophisticated threat, it is essential to take appropriate protective measures:<\/p><ol data-start=\"3725\" data-end=\"4296\"><li data-start=\"3725\" data-end=\"3924\"><p data-start=\"3728\" data-end=\"3924\"><strong data-start=\"3728\" data-end=\"3766\">Education and digital awareness<\/strong><br data-start=\"3766\" data-end=\"3769\" \/>The first step to protecting yourself is to be informed about the risks. Cybersecurity training is key to recognizing Vibe Hacking attacks.<\/p><\/li><li data-start=\"3926\" data-end=\"4126\"><p data-start=\"3929\" data-end=\"4126\"><strong data-start=\"3929\" data-end=\"3989\">Use of deepfake and phishing detection tools<\/strong><br data-start=\"3989\" data-end=\"3992\" \/>There are advanced tools that use AI to detect manipulated content, which helps prevent Vibe Hacking attacks.<\/p><\/li><li data-start=\"4128\" data-end=\"4296\"><p data-start=\"4131\" data-end=\"4296\"><strong data-start=\"4131\" data-end=\"4190\">Implementing defensive AI-based cybersecurity<\/strong><br data-start=\"4190\" data-end=\"4193\" \/>AI can also be used to detect anomalous patterns and prevent attacks in real time.<\/p><\/li><\/ol><blockquote><p data-start=\"4298\" data-end=\"4332\"><strong data-start=\"4298\" data-end=\"4332\">Examples of safe practices:<\/strong><\/p><ul data-start=\"4333\" data-end=\"4496\"><li data-start=\"4333\" data-end=\"4420\"><p data-start=\"4335\" data-end=\"4420\">Verify the authenticity of e-mails before clicking on links.<\/p><\/li><li data-start=\"4421\" data-end=\"4496\"><p data-start=\"4423\" data-end=\"4496\">Implement multifactor authentication to protect sensitive accounts.<\/p><\/li><\/ul><\/blockquote>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec45f91 elementor-widget elementor-widget-text-editor\" data-id=\"ec45f91\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"4498\" data-end=\"4561\"><strong data-start=\"4502\" data-end=\"4561\">The future of Vibe Hacking and AI in cybersecurity.<\/strong><\/h2><p data-start=\"4562\" data-end=\"4789\">As AI continues to evolve, Vibe Hacking will become even more sophisticated. However, defensive AI is also advancing and it is expected that, in the future, protection tools will become much more effective.<\/p><p data-start=\"4791\" data-end=\"4817\"><strong data-start=\"4791\" data-end=\"4817\">Emerging trends:<\/strong><\/p><ul data-start=\"4818\" data-end=\"4935\"><li data-start=\"4818\" data-end=\"4935\"><p data-start=\"4820\" data-end=\"4935\"><strong data-start=\"4820\" data-end=\"4839\">Explanatory IA:<\/strong> Explanatory AI will be key to understanding the behavior of attacks and how to prevent them.<\/p><\/li><\/ul><p data-start=\"4937\" data-end=\"5129\"><strong data-start=\"4937\" data-end=\"4973\">Ethical debate on the use of AI:<\/strong><br data-start=\"4973\" data-end=\"4976\" \/>The use of AI to create manipulated content raises ethical dilemmas, especially in terms of the impact it may have on privacy and democracy.<\/p><p data-start=\"5131\" data-end=\"5318\"><strong data-start=\"5131\" data-end=\"5181\">Role of regulation and public policies:<\/strong><br data-start=\"5181\" data-end=\"5184\" \/>Governments and international organizations are likely to implement regulations to mitigate the risks of Vibe Hacking.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5faaea8 elementor-widget elementor-widget-text-editor\" data-id=\"5faaea8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"5840\" data-end=\"6073\"><em><strong data-start=\"5840\" data-end=\"5905\">Do you want to protect your business from Vibe Hacking threats?<\/strong> With <strong data-start=\"5910\" data-end=\"5924\">ClickPanda<\/strong>With the right tools, you can implement the best security and proactive defense tools to protect your digital infrastructure and keep your data safe.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-226e814 elementor-widget elementor-widget-button\" data-id=\"226e814\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/clickpanda.com\/diseno-paginas-web\/?utm_source=blog&#038;utm_medium=text&#038;utm_campaign=blog&#038;utm_term=blog&#038;utm_content=inline_link\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Protect your business with advanced solutions from ClickPanda<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90e6beb elementor-widget elementor-widget-text-editor\" data-id=\"90e6beb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"5320\" data-end=\"5338\"><strong data-start=\"5324\" data-end=\"5338\">Conclusion<\/strong><\/h2><p data-start=\"5339\" data-end=\"5600\">The <strong data-start=\"5227\" data-end=\"5243\">Vibe Hacking<\/strong> represents a new era of <strong data-start=\"5272\" data-end=\"5297\">cyber threats<\/strong> driven by the <strong data-start=\"5316\" data-end=\"5333\">Generative AI<\/strong>This allows attackers to design sophisticated and customized hacking tools. However, by understanding how this threat works and taking appropriate defense measures, such as using advanced AI tools for security, training employees and implementing protective measures, you can significantly reduce the risk. Always stay one step ahead and protect your business from emerging cyber attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a03931 elementor-widget elementor-widget-image\" data-id=\"4a03931\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/diseno-paginas-web?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner2\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/05\/CTA-BLOG-WEB-3-1.gif\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction In today's world, cyber threats are evolving rapidly, and cyber attacks are becoming more sophisticated thanks to artificial intelligence (AI). One of the most recent concepts to emerge in this context is Vibe Hacking, a term that refers to how attackers use generative AI [...]<\/p>","protected":false},"author":2,"featured_media":11322,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"class_list":["post-11318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes - ClickPanda Blog<\/title>\n<meta name=\"description\" content=\"Descubre qu\u00e9 es el Vibe Hacking, amenazas impulsadas por IA y c\u00f3mo protegerte de los nuevos ataques creados con inteligencia artificial.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.clickpanda.com\/en\/ia\/vibe-hacking-threats-ia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes - ClickPanda Blog\" \/>\n<meta property=\"og:description\" content=\"Descubre qu\u00e9 es el Vibe Hacking, amenazas impulsadas por IA y c\u00f3mo protegerte de los nuevos ataques creados con inteligencia artificial.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.clickpanda.com\/en\/ia\/vibe-hacking-threats-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickPanda Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-13T16:20:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T16:20:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carolina Mateus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carolina Mateus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/\"},\"author\":{\"name\":\"Carolina Mateus\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e\"},\"headline\":\"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes\",\"datePublished\":\"2025-08-13T16:20:30+00:00\",\"dateModified\":\"2025-08-13T16:20:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/\"},\"wordCount\":1383,\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png\",\"articleSection\":[\"IA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/\",\"url\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/\",\"name\":\"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes - ClickPanda Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png\",\"datePublished\":\"2025-08-13T16:20:30+00:00\",\"dateModified\":\"2025-08-13T16:20:31+00:00\",\"description\":\"Descubre qu\u00e9 es el Vibe Hacking, amenazas impulsadas por IA y c\u00f3mo protegerte de los nuevos ataques creados con inteligencia artificial.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png\",\"width\":1536,\"height\":1024,\"caption\":\"Vibe Hacking: amenazas impulsadas por IA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.clickpanda.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"name\":\"ClickPanda Blog\",\"description\":\"Noticias y novedades del mundo digital con ClickPanda\",\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\",\"name\":\"ClickPanda Blog\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"width\":1000,\"height\":541,\"caption\":\"ClickPanda Blog\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e\",\"name\":\"Carolina Mateus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g\",\"caption\":\"Carolina Mateus\"},\"url\":\"https:\/\/blog.clickpanda.com\/en\/author\/carolina-mateus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes - ClickPanda Blog","description":"Descubre qu\u00e9 es el Vibe Hacking, amenazas impulsadas por IA y c\u00f3mo protegerte de los nuevos ataques creados con inteligencia artificial.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.clickpanda.com\/en\/ia\/vibe-hacking-threats-ia\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes - ClickPanda Blog","og_description":"Descubre qu\u00e9 es el Vibe Hacking, amenazas impulsadas por IA y c\u00f3mo protegerte de los nuevos ataques creados con inteligencia artificial.","og_url":"https:\/\/blog.clickpanda.com\/en\/ia\/vibe-hacking-threats-ia\/","og_site_name":"ClickPanda Blog","article_published_time":"2025-08-13T16:20:30+00:00","article_modified_time":"2025-08-13T16:20:31+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png","type":"image\/png"}],"author":"Carolina Mateus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Carolina Mateus","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#article","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/"},"author":{"name":"Carolina Mateus","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e"},"headline":"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes","datePublished":"2025-08-13T16:20:30+00:00","dateModified":"2025-08-13T16:20:31+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/"},"wordCount":1383,"publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png","articleSection":["IA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/","url":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/","name":"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes - ClickPanda Blog","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage"},"image":{"@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png","datePublished":"2025-08-13T16:20:30+00:00","dateModified":"2025-08-13T16:20:31+00:00","description":"Descubre qu\u00e9 es el Vibe Hacking, amenazas impulsadas por IA y c\u00f3mo protegerte de los nuevos ataques creados con inteligencia artificial.","breadcrumb":{"@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#primaryimage","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-13-ago-2025-11_14_59.png","width":1536,"height":1024,"caption":"Vibe Hacking: amenazas impulsadas por IA"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.clickpanda.com\/ia\/vibe-hacking-amenazas-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.clickpanda.com\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es el Vibe Hacking? IA generativa usada por atacantes"}]},{"@type":"WebSite","@id":"https:\/\/blog.clickpanda.com\/en\/#website","url":"https:\/\/blog.clickpanda.com\/en\/","name":"ClickPanda Blog","description":"Noticias y novedades del mundo digital con ClickPanda","publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.clickpanda.com\/en\/#organization","name":"ClickPanda Blog","url":"https:\/\/blog.clickpanda.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","width":1000,"height":541,"caption":"ClickPanda Blog"},"image":{"@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e","name":"Carolina Mateus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g","caption":"Carolina Mateus"},"url":"https:\/\/blog.clickpanda.com\/en\/author\/carolina-mateus\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/comments?post=11318"}],"version-history":[{"count":6,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11318\/revisions"}],"predecessor-version":[{"id":11325,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11318\/revisions\/11325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media\/11322"}],"wp:attachment":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media?parent=11318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/categories?post=11318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/tags?post=11318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}