{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:06:30Z","timestamp":1776060390889,"version":"3.50.1"},"reference-count":63,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T00:00:00Z","timestamp":1693440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Universidad de Las Am\u00e9ricas","award":["INI.PAV.22.02"],"award-info":[{"award-number":["INI.PAV.22.02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services and compromise the integrity of users and organizations. This article describes the most representative vulnerabilities related to cyberattacks that have affected different sectors of countries in the Latin American region. A systematic review of repositories and the scientific literature was conducted, considering journal articles, conference proceedings, and reports from official bodies and leading brands of cybersecurity systems. The cybersecurity vulnerabilities identified in the countries of the Latin American region are low cybersecurity awareness, lack of standards and regulations, use of outdated software, security gaps in critical infrastructure, and lack of training and professional specialization.<\/jats:p>","DOI":"10.3390\/informatics10030071","type":"journal-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T09:12:22Z","timestamp":1693559542000},"page":"71","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America"],"prefix":"10.3390","volume":"10","author":[{"given":"Omar","family":"Flor-Unda","sequence":"first","affiliation":[{"name":"Ingenier\u00eda Industrial, Facultad de Ingenier\u00eda y Ciencias Aplicadas, Universidad de las Am\u00e9ricas, Quito 170125, Ecuador"}]},{"given":"Freddy","family":"Simba\u00f1a","sequence":"additional","affiliation":[{"name":"Maestr\u00eda en Ciberseguridad, Universidad Internacional de la Rioja, 170525 Logro\u00f1o, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5335-5698","authenticated-orcid":false,"given":"Xavier","family":"Larriva-Novo","sequence":"additional","affiliation":[{"name":"ETSI de Telecomunicaci\u00f3n, Departamento de Ingenier\u00eda de Sistemas Telem\u00e1ticos, Universidad Polit\u00e9cnica de Madrid, Avenida Complutense 30, 28040 Madrid, Spain"}]},{"given":"\u00c1ngel","family":"Acu\u00f1a","sequence":"additional","affiliation":[{"name":"Redes y Telecomunicaciones, Instituto Superior Tecnol\u00f3gico Bolivar, Ambato 180109, Ecuador"}]},{"given":"Rolando","family":"Tip\u00e1n","sequence":"additional","affiliation":[{"name":"Redes y Telecomunicaciones, Instituto Superior Tecnol\u00f3gico Bolivar, Ambato 180109, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4210-0117","authenticated-orcid":false,"given":"Patricia","family":"Acosta-Vargas","sequence":"additional","affiliation":[{"name":"Ingenier\u00eda Industrial, Facultad de Ingenier\u00eda y Ciencias Aplicadas, Universidad de las Am\u00e9ricas, Quito 170125, Ecuador"},{"name":"Intelligent and Interactive Systems Laboratory, Universidad de Las Am\u00e9ricas, Quito 170125, Ecuador"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kettani, H., and Cannistra, R.M. (2018, January 18\u201320). On Cyber Threats to Smart Digital Environments. Proceedings of the 2nd International Conference on Smart Digital Environment, Rabat, Morocco.","DOI":"10.1145\/3289100.3289130"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"102516","DOI":"10.1016\/j.cose.2021.102516","article-title":"Cyber security challenges in aviation communication, navigation, and surveillance","volume":"112","author":"Dave","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","article-title":"Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges","volume":"18","author":"Parkinson","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1080\/23738871.2020.1820546","article-title":"Cybersecurity and cyber defence in the emerging democracies","volume":"5","author":"Solar","year":"2020","journal-title":"J. Cyber Policy"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"116","DOI":"10.25046\/aj050215","article-title":"Analysis of Cyberattacks in Public Organizations in Latin America","volume":"5","author":"Toapanta","year":"2020","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1016\/S0308-5961(00)00069-0","article-title":"Telecommunications liberalization and regulatory governance: Lessons from Latin America","volume":"24","author":"Gutierrez","year":"2000","journal-title":"Telecommun. Policy"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Alghazo, J.M., Kazmi, Z., and Latif, G. (December, January 29). Cyber security analysis of internet banking in emerging countries: User and bank perspectives. Proceedings of the 2017 4th IEEE international conference on engineering technologies and applied sciences (ICETAS), Salmabad, Bahrain.","DOI":"10.1109\/ICETAS.2017.8277910"},{"key":"ref_8","first-page":"17","article-title":"La brecha de ciberseguridad en Am\u00e9rica Latina frente al contexto global de ciberamenazas","volume":"6","author":"Antonio","year":"2020","journal-title":"Rev. Estud. Segur. Int."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"467","DOI":"10.7326\/M18-0850","article-title":"PRISMA Extension for Scoping Reviews (PRISMAScR): Checklist and Explanation","volume":"169","author":"Tricco","year":"2018","journal-title":"Ann. Intern. Med."},{"key":"ref_10","first-page":"24","article-title":"Hechos ciberf\u00edsicos: Una propuesta de an\u00e1lisis para ciberamenazas en las Estrategias Nacionales de Ciberseguridad","volume":"25","author":"Antonio","year":"2019","journal-title":"Rev. Latinoam. Estud. Segur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/23738871.2017.1294610","article-title":"Politics of cybersecurity capacity building: Conundrum and opportunity","volume":"2","author":"Pawlak","year":"2017","journal-title":"J. Cyber Policy"},{"key":"ref_12","unstructured":"Flor, O., Acu\u00f1a, A., and Acosta-Vargas, P. (2023). Vulnerabilities Ciberdefense in Latin America, Version 1, Mendeley Data."},{"key":"ref_13","unstructured":"D\u00edaz, R.M. (2023, June 20). State of Cybersecurity in Logistics in Latin America and the Caribbean. Comisi\u00f2n Econ\u00f3mica para Am\u00e9rica Latina y el Caribe 2021. Available online: http:\/\/repositorio.cepal.org\/handle\/11362\/47655."},{"key":"ref_14","unstructured":"Organization of American States (2013). Tendencias en la Seguridad Cibern\u00e9tica en Am\u00e9rica Latina y el Caribe y Respuestas de los Gobiernos, Trend Micro."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.diin.2019.01.006","article-title":"Unauthorized access crime in Jordanian law (comparative study)","volume":"28","author":"Ismail","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","article-title":"A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities","volume":"21","author":"Alshamrani","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","unstructured":"Delloite (2023, June 20). COVID-19s Impact on Cybersecurity. Available online: https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html."},{"key":"ref_18","unstructured":"Hummelholm, A. (2018, January 28\u201329). Cyber Threat Analysis in Smart City Environments. Proceedings of the European Conference on Cyber Warfare and Security (ECCWS 2018), Oslo, Norway."},{"key":"ref_19","unstructured":"\u0106urguz, J. (2016). Computer Science & Information Technology (CS & IT), Academy & Industry Research Collaboration Center (AIRCC)."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hindy, H., Atkinson, R., Tachtatzis, C., Colin, J.-N., Bayne, E., and Bellekens, X. (2020). Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection. Electronics, 9.","DOI":"10.3390\/electronics9101684"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bolgov, R. (2020, January 22\u201324). The UN and Cybersecurity Policy of Latin American Countries. Proceedings of the 2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG), Buenos Aires, Argentina.","DOI":"10.1109\/ICEDEG48599.2020.9096798"},{"key":"ref_22","unstructured":"(2023, June 20). Most Targeted Countries by Cyber Attacks Latin America 2020. Statista. Available online: https:\/\/www.statista.com\/statistics\/818412\/latin-american-countries-highest-share-cyber-attacks\/."},{"key":"ref_23","unstructured":"Vinueza, J. (2023, June 20). Nuevo Ransomware Como Servicio. Available online: https:\/\/csirt.celec.gob.ec\/en\/contenidos\/alertas\/514-nuevo-ransomware-como-servicio-michaelkors-dirigido-a-sistemas-linux-y-vmware-esxi."},{"key":"ref_24","unstructured":"(2023, June 20). SIM Swap Fraud Grows as the Biggest Cybersecurity Threat. Available online: https:\/\/www.dnkinfotelecom.com.br\/en\/sim-swap-fraud-grows-as-the-biggest-cybersecurity-threat\/."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Toapanta, S.M.T., Pesantes, R.P.R., and Gallegos, L.E.M. (2020, January 27\u201328). Impact of Cybersecurity Applied to IoT in Public Organizations in Latin America. Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK.","DOI":"10.1109\/WorldS450073.2020.9210416"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Foldvari, A., Biczok, G., Kocsis, I., Gonczy, L., and Pataricza, A. (2021, January 22\u201326). Impact Assessment of IT Security Breaches in Cyber-Physical Systems: Short paper. Proceedings of the 2021 10th Latin-American Symposium on Dependable Computing (LADC), Florian\u00f3polis, Brazil.","DOI":"10.1109\/LADC53747.2021.9672582"},{"key":"ref_27","first-page":"8","article-title":"Ciberseguridad. Presentaci\u00f3n del dossier\/Cybersecurity. Introduction to Dossier","volume":"20","author":"Sancho","year":"2017","journal-title":"Rev. Latinoam. Estud. Segur."},{"key":"ref_28","unstructured":"(2023, June 20). 10 Most Common Types of Cyber Attacks Today\u2014CrowdStrike. Available online: https:\/\/www.crowdstrike.com\/cybersecurity-101\/cyberattacks\/most-common-types-of-cyberattacks\/."},{"key":"ref_29","unstructured":"SecureSoft (2023, June 01). Securesoft 54 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/HQwJ9KL."},{"key":"ref_30","unstructured":"SecureSoft (2023, June 01). 55 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/ZPfxZ."},{"key":"ref_31","unstructured":"SecureSoft (2023, June 01). 56 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/e0KFSRc."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"284","DOI":"10.15359\/rca.56-1.15","article-title":"Cu\u00e1n importante es la seguridad cibern\u00e9tica para lograr la seguridad h\u00eddrica?","volume":"56","author":"Donoso","year":"2022","journal-title":"Rev. Cienc. Ambient."},{"key":"ref_33","unstructured":"SecureSoft (2023, June 01). 57 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/URUTp8."},{"key":"ref_34","unstructured":"SecureSoft (2023, June 01). 58 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/edMq."},{"key":"ref_35","unstructured":"SecureSoft (2023, June 01). 59 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/88lxRGj."},{"key":"ref_36","unstructured":"SecureSoft (2023, June 01). 61 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/lmqjOg."},{"key":"ref_37","unstructured":"SecureSoft (2023, June 01). 62 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/tHxb."},{"key":"ref_38","unstructured":"SecureSoft (2023, June 01). 63 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/FmvR."},{"key":"ref_39","unstructured":"SecureSoft (2023, June 01). 64 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/F5FzT."},{"key":"ref_40","unstructured":"SecureSoft (2023, June 01). 65 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/zJ7v9."},{"key":"ref_41","unstructured":"SecureSoft (2023, June 01). 66 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/PW7ipc."},{"key":"ref_42","unstructured":"SecureSoft (2023, June 01). 67 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/YzgdNK."},{"key":"ref_43","unstructured":"SecureSoft (2023, June 01). 68 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/WNTj."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"SecureSoft (2023, June 01). 69 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/lgGYC19.","DOI":"10.1007\/978-3-031-21651-0_5"},{"key":"ref_45","unstructured":"SecureSoft (2023, June 01). 70 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/IQsYxN."},{"key":"ref_46","unstructured":"SecureSoft (2023, June 01). 71 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/2zJFf."},{"key":"ref_47","unstructured":"SecureSoft (2023, June 01). 72 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/nA73."},{"key":"ref_48","unstructured":"SecureSoft (2023, June 01). 73 Biweekly Cyber Intelligence Report. Available online: https:\/\/shorturl.at\/finB0."},{"key":"ref_49","unstructured":"SecureSoft (2023, June 01). 74 Biweekly Cyber Intelligence Report. Available online: https:\/\/goo.su\/7wUpBe."},{"key":"ref_50","unstructured":"(2023, May 15). ESSET 2022. ESET-Security-Report-LATAM202. Available online: https:\/\/goo.su\/AXeiDL."},{"key":"ref_51","unstructured":"(2023, June 01). Cyberthreat Real Time. Available online: https:\/\/cybermap.kaspersky.com."},{"key":"ref_52","first-page":"739","article-title":"The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace","volume":"Volume 15","author":"Smys","year":"2019","journal-title":"International Conference on Computer Networks and Communication Technologies"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Toapanta, S., Pe\u00f1afiel, L., and Mafla, L. (2019, January 18\u201320). Prototype to Mitigate the Risks of the Integrity of Cyberattack Information in Electoral Processes in Latin America. Proceedings of the 2019 2nd International Conference on Education Technology Management (ICETM\u201919), Barcelona, Spain.","DOI":"10.1145\/3375900.3375915"},{"key":"ref_54","first-page":"e1926","article-title":"Valley of Death: Factors Hindering the Success of Technological Innovations","volume":"7","author":"Jimenez","year":"2021","journal-title":"Rev. CEA"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"99339","DOI":"10.1109\/ACCESS.2021.3097144","article-title":"Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review","volume":"9","author":"Kalhoro","year":"2021","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"De Azambuja, A.J.G., Plesker, C., Sch\u00fctzer, K., Anderl, R., Schleich, B., and Almeida, V.R. (2023). Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0\u2014A Survey. Electronics, 12.","DOI":"10.3390\/electronics12081920"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1108\/JFC-01-2020-0008","article-title":"Active cyber defence strategies and techniques for banks and financial institutions","volume":"27","author":"Creado","year":"2020","journal-title":"J. Financ. Crime"},{"key":"ref_58","unstructured":"(2023, June 20). Ataque del Ransomware LockBit Afect\u00f3 al Poder Judicial de Chile|WeLiveSecurity. Available online: https:\/\/www.welivesecurity.com\/la-es\/2022\/09\/28\/ataque-ransomware-lockbit-poder-judicial-chile\/."},{"key":"ref_59","unstructured":"(2023, June 20). Fraud and Cybercrime in Latin America: An Evolving Threat Landscape\u2014Blueliv.\u2014Kippeo Technologies. Available online: https:\/\/kippeo.com\/fraud-and-cybercrime-in-latin-america-an-evolving-threat-landscape-blueliv\/."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"92","DOI":"10.15517\/isucr.v24i49.50765","article-title":"Ransomware, una amenaza latente en Latinoam\u00e9rica","volume":"24","year":"2023","journal-title":"Intersedes"},{"key":"ref_61","unstructured":"Organization of American States (2015). Report on Cybersecurity and Critical Infrastructure in the Americas, Trend Micro."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Buzzio-Garcia, J., Salazar-Vilchez, V., Moreno-Torres, J., and Leon-Estofanero, O. (2021, January 12\u201315). Review of Cybersecurity in Latin America during the COVID-19 Pandemic: A brief Overview. Proceedings of the 2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador.","DOI":"10.1109\/ETCM53643.2021.9590693"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"101804","DOI":"10.1016\/j.inffus.2023.101804","article-title":"Artificial intelligence for cybersecurity: Literature review and future research directions","volume":"97","author":"Kaur","year":"2023","journal-title":"Inf. Fusion"}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/10\/3\/71\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:44:19Z","timestamp":1760129059000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/10\/3\/71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,31]]},"references-count":63,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["informatics10030071"],"URL":"https:\/\/doi.org\/10.3390\/informatics10030071","relation":{},"ISSN":["2227-9709"],"issn-type":[{"value":"2227-9709","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,31]]}}}