{"id":10396,"date":"2021-12-24T14:22:55","date_gmt":"2021-12-24T11:22:55","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10396"},"modified":"2021-12-24T14:22:55","modified_gmt":"2021-12-24T11:22:55","slug":"matrix-resurrections-state-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/matrix-resurrections-state-of-cybersecurity\/10396\/","title":{"rendered":"Matrix Resurrections&#8217;\u0131n Hata Ay\u0131klamas\u0131"},"content":{"rendered":"<p>Aral\u0131k 2021\u2019de Matrix\u2019in yarat\u0131c\u0131lar\u0131, belki de <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/matrix-vulnerabilities\/10381\/\" target=\"_blank\" rel=\"noopener\">sistem g\u00fcvenli\u011findeki korkun\u00e7 durumu<\/a> ele almak i\u00e7in b\u00fcy\u00fck bir g\u00fcncelleme olan <em>Matrix Resurrections<\/em>\u2018\u0131 yay\u0131nlad\u0131. G\u00fcncelleme, sistem hata d\u00fczeltmelerinde s\u0131kl\u0131kla oldu\u011fu gibi t\u00fcm sorunlar\u0131 de\u011fil baz\u0131lar\u0131n\u0131 \u00e7\u00f6zer ve bu s\u00fcre\u00e7 baz\u0131 yeni sorunlar\u0131 da beraberinde getirir.<\/p>\n<p>Son g\u00fcncellemeden bu yana ge\u00e7en 18 y\u0131lda Matrix\u2019te neler de\u011fi\u015fti? Bug\u00fcn, son y\u00fcklenen Matrix\u2019i siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan de\u011ferlendiriyoruz. Her zaman oldu\u011fu gibi bundan sonras\u0131n\u0131n spoiler i\u00e7erdi\u011fi konusunda uyarmak istiyoruz.<\/p>\n<h2>Korsan avatarlar\u0131yla sava\u015fma<\/h2>\n<p>Daha \u00f6nce de oldu\u011fu gibi, d\u0131\u015fardaki hackerlar Matrix\u2019e s\u0131zd\u0131. Orijinal \u00fc\u00e7lemede, sistemin Zion Direni\u015fi ile sava\u015fma konusunda ciddi mi yoksa sadece \u00f6yleymi\u015f gibi mi davrand\u0131\u011f\u0131 hi\u00e7bir zaman tam olarak net de\u011fildi (ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/dune-information-security\/9996\/\" target=\"_blank\" rel=\"noopener\">dolamba\u00e7l\u0131 olan tek karma\u015f\u0131k evren<\/a> Matrix de\u011fil). Yeni film, Matrix programlar\u0131n\u0131n sistemlerinde ger\u00e7ekten yabanc\u0131lar\u0131 istemedi\u011fi, kar\u015f\u0131 \u00f6nlemlerin tam olarak y\u00fcr\u00fcrl\u00fckte oldu\u011fu ancak yeterince etkili olmad\u0131\u011f\u0131 izlenimini yarat\u0131yor.<\/p>\n<h3>Hacker gemilerinden iletilen korsan sinyal<\/h3>\n<p>Hacker gemileri, daha \u00f6nce \u201cger\u00e7ek ger\u00e7eklikte\u201d yapt\u0131klar\u0131 gibi korsan sinyallerini Matrix\u2019e iletmeye devam ediyor. Mant\u0131kl\u0131 olan g\u00fcvenlik duvar\u0131 kullanmak olsa da Matrix\u2019in giri\u015finde b\u00f6yle bir \u00f6nlem bulunmuyordu. En ba\u015f\u0131ndan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/zero-trust-security\/8619\/\" target=\"_blank\" rel=\"noopener\">S\u0131f\u0131r G\u00fcven<\/a> yakla\u015f\u0131m\u0131n\u0131 kullanmak pek \u00e7ok sorunu \u00f6nleyebilirdi.<\/p>\n<p><strong>Mevcut durum: <\/strong>\u00c7\u00f6z\u00fcms\u00fcz<\/p>\n<h3>Korsan avatar aktar\u0131m sistemi<\/h3>\n<p>Ya Matrix, benzetilmi\u015f telefon hatlar\u0131 arac\u0131l\u0131\u011f\u0131yla korsan avatarlar\u0131 yay\u0131nlayan sistemi yendi ve bilgisayar korsanlar\u0131 yeni bir y\u00f6ntem bulmak zorunda kald\u0131lar ya da hackerlar y\u00f6ntemlerini geli\u015ftirdi ve kablolu telefon kullanmay\u0131 b\u0131rakt\u0131. Her iki durumda da, sistem art\u0131k eskisinden farkl\u0131d\u0131r: Yeni isyanc\u0131 t\u00fcr\u00fc, karma\u015f\u0131k bir dinamik y\u00f6nlendirme sistemi kullan\u0131yor. Di\u011fer bir deyi\u015fle, isyanc\u0131lar art\u0131k hem korsan avatarlar\u0131n\u0131 bir yerden bir yere h\u0131zl\u0131 bir \u015fekilde ta\u015f\u0131mak hem de sisteme giri\u015f yapmak i\u00e7in kap\u0131lar\u0131 ve aynalar\u0131 portallara \u00e7evirebiliyor. Bu, ikinci filmdeki Keymaker\u2019\u0131n (Anahtarc\u0131) \u00e7al\u0131\u015fmas\u0131na \u00e7ok benziyor \u2014 belki de hackerlar Keymaker\u2019\u0131n kodunun bir k\u0131sm\u0131n\u0131 kopyalamay\u0131 (veya \u00f6d\u00fcn\u00e7 almay\u0131) ba\u015fard\u0131lar.<\/p>\n<p><strong>Mevcut durum: <\/strong>Eskisinden daha k\u00f6t\u00fc<\/p>\n<h3>Korsan avatar takip sistemi<\/h3>\n<p>Matrix, d\u0131\u015far\u0131daki avatarlar\u0131n eylemlerine \u00e7ok daha duyarl\u0131 hale geldi. Art\u0131k hemen hemen her isyanc\u0131 s\u0131zma vakas\u0131nda kar\u015f\u0131 \u00f6nlemler (ve \u00e7ok daha h\u0131zl\u0131 \u015fekilde) uygulan\u0131yor \u2014 belki de Matrix\u2019in yarat\u0131c\u0131lar\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/matrix-vulnerabilities\/10381\/\" target=\"_blank\" rel=\"noopener\">orijinal \u00fc\u00e7leme i\u00e7in yapt\u0131\u011f\u0131m\u0131z \u00f6nerilere<\/a> uydular ve sonunda <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint-detection-response-edr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">EDR<\/a>\u2018\u0131 kullanmaya ba\u015flad\u0131lar. Dahas\u0131, hackerlar art\u0131k faaliyetlerini ajanlardan daha uzun s\u00fcre gizli tutmak i\u00e7in \u00f6rne\u011fin hareket eden bir trende portallar a\u00e7arak izlerini s\u00fcrekli olarak gizlemek zorunda kal\u0131yorlar.<\/p>\n<p><strong>Mevcut durum:<\/strong> B\u00fcy\u00fck \u00f6l\u00e7\u00fcde iyile\u015ftirildi<\/p>\n<h3>Matrix ajanlar\u0131<\/h3>\n<p>Matrix, benzersiz ve muhtemelen kaynak yo\u011fun olan ajan kullan\u0131m\u0131n\u0131 b\u0131rakt\u0131. Kod olarak durmaya devam ediyorlar ancak yaln\u0131zca d\u00f6ng\u00fcl\u00fc, \u00e7ift sanal bir sim\u00fclasyon i\u00e7inde bulunuyorlar. G\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi Matrix, sistem ad\u0131na hareket ederek bir insan\u0131n sisteme ba\u011fl\u0131 herhangi avatar\u0131n\u0131 bot moduna ge\u00e7irmeyi \u00f6\u011frendi. G\u00f6rsel olarak fark \u015fu ki, bir Ajan daha \u00f6nce bir ki\u015finin avatar\u0131n\u0131 de\u011fi\u015ftirirken, \u015fimdi avatar g\u00f6r\u00fcn\u00fc\u015fte ayn\u0131 kal\u0131yor ancak Yapay Zeka (AI) taraf\u0131ndan devral\u0131n\u0131yor.<\/p>\n<p>Ajanlarla kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda, botlar daha ilkel hareket etse de s\u00fcr\u00fc modunda, e\u015fzamanl\u0131 ve (\u00f6znel olarak) daha verimli \u00e7al\u0131\u015fabiliyorlar. Bununla birlikte, fizik kanunlar\u0131 hala botlar\u0131n davran\u0131\u015f\u0131n\u0131 y\u00f6netiyor ve sonu\u00e7 temelde ayn\u0131. Hackerlar yine de i\u015flerini \u00e7\u00f6zebiliyor; sadece bunun i\u00e7in biraz daha fazla \u00e7al\u0131\u015fmalar\u0131 gerekiyor.<\/p>\n<p><strong>Mevcut durum:<\/strong> Daha iyi olmasa da farkl\u0131<\/p>\n<h2>Hileli programlar<\/h2>\n<p>Matrix, herhangi bir faydas\u0131 olmayan sistem i\u015flevlerine sahip gereksiz programlarla doluydu. G\u00fcncellemeyle birlikte yapay zeka, sistem genelinde eski yaz\u0131l\u0131mlar\u0131 temizledi ve hileli programlar\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011funu yok etti \u2014 elbette hepsi yok olmad\u0131, ancak kalan program say\u0131s\u0131 olduk\u00e7a az. Baz\u0131lar\u0131 fiziksel d\u00fcnyaya g\u00f6\u00e7 etti (nas\u0131l oldu\u011funu s\u00f6ylemeyece\u011fiz; bu \u00e7ok b\u00fcy\u00fck spoiler olur). Her durumda, g\u00fcncel olmayan yaz\u0131l\u0131mlardan kurtulmak do\u011fru bir harekettir.<\/p>\n<p><strong>Mevcut durum:<\/strong> B\u00fcy\u00fck \u00f6l\u00e7\u00fcde iyile\u015ftirildi<\/p>\n<h2>A\u011f segmentasyonu<\/h2>\n<p>Matrix\u2019in alt a\u011flar\u0131 izole etmeye y\u00f6nelik tutumu hala k\u00f6t\u00fc durumda. \u0130syanc\u0131lar d\u0131\u015far\u0131dan, yaln\u0131zca Matrix\u2019e de\u011fil, ayn\u0131 zamanda i\u00e7eride \u00e7ift sanal sunucularda konu\u015fland\u0131r\u0131lm\u0131\u015f bir Matrix sim\u00fclasyonuna da girmeyi ba\u015far\u0131yor. Di\u011fer bir deyi\u015fle, sim\u00fclasyon tabiri caizse ayn\u0131 ge\u00e7i\u015f yolu \u00fczerinde yer al\u0131yor; a\u011fa girdikten sonra, davetsiz bir misafir, hesaplar veya Ar-Ge gibi a\u011fdaki herhangi bir yere gidebilir. K\u0131sacas\u0131, \u00f6zellikle giri\u015fte bir g\u00fcvenlik duvar\u0131 veya S\u0131f\u0131r G\u00fcven sisteminin olmamas\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, bu olduk\u00e7a ba\u015ftan savma bir uygulamad\u0131r.<\/p>\n<p><strong>Mevcut durum:<\/strong> Neredeyse eskisiyle ayn\u0131<\/p>\n<h2>Anomali kontrol sistemi<\/h2>\n<p>Orijinal \u00fc\u00e7lemede (Se\u00e7ilmi\u015f Ki\u015fi arac\u0131l\u0131\u011f\u0131yla) koddaki anormallikleri kontrol eden sistem art\u0131k \u00e7al\u0131\u015fm\u0131yor. Bunun yerine, Se\u00e7ilmi\u015f Ki\u015fi (The One) ve Zion\u2019un art\u0131k rekreasyon d\u00f6ng\u00fclerinden ge\u00e7medi\u011fi yeni bir sistemimiz var; daha do\u011frusu Matrix, Trinity ve meslekta\u015flar\u0131 arac\u0131l\u0131\u011f\u0131yla sisteme yeniden ba\u011flanan Neo\u2019yu manip\u00fcle etmeye \u00e7al\u0131\u015f\u0131yor.<\/p>\n<p>Sonu\u00e7 eskisinden daha da i\u00e7ler ac\u0131s\u0131 bir halde. Avatar kodunda anormallikler olan bir insan yerine iki tane var \u2014 ve hepsi bununla da s\u0131n\u0131rl\u0131 olmayabilir.<\/p>\n<p><strong>Mevcut durum:<\/strong> \u00c7ok daha k\u00f6t\u00fc<\/p>\n<h2>Eski Ajan Smith\u2019in sorunu<\/h2>\n<p>Matrix, eski Ajan Smith\u2019in kodunu yok etmedi, bunun yerine kontrol\u00fcn\u00fc ele ge\u00e7irdi ve onu karma\u015f\u0131k yeni bir anormallik kontrol sisteminde uygulamaya \u00e7al\u0131\u015ft\u0131. Yapay zeka muhtemelen kodun Neo\u2019nun koduna ili\u015fkin unsurlar\u0131n bulundu\u011fu k\u0131sm\u0131yla ilgileniyor.<\/p>\n<p>Kontrols\u00fcz \u00e7o\u011faltmadan sorumlu olan k\u0131s\u0131m silinmi\u015f g\u00f6r\u00fcn\u00fcyor. Ancak filmin sonunda Smith (her zamanki gibi Neo\u2019nun m\u00fcdahalesi sayesinde) kendini kurtar\u0131yor ve Matrix\u2019te kal\u0131yor. Dahas\u0131, Matrix\u2019in kontrol edemedi\u011fi bir beceri ile art\u0131k bir avatardan di\u011ferine ge\u00e7i\u015f yapabiliyor. Di\u011fer bir deyi\u015fle, Smith daha \u00f6nceden aptal bir vir\u00fcs olsayd\u0131, \u015fimdi tam kapsaml\u0131 bir <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/apt-advanced-persistent-threats\/\" target=\"_blank\" rel=\"noopener\">APT<\/a>\u2018ye d\u00f6n\u00fc\u015fm\u00fc\u015ft\u00fc.<\/p>\n<p><strong>Mevcut durum:<\/strong> \u00c7ok daha k\u00f6t\u00fc<\/p>\n<h2>Yeni sorunlar<\/h2>\n<p>Matrix\u2019deki g\u00fc\u00e7 dengesi \u00f6nemli \u00f6l\u00e7\u00fcde de\u011fi\u015fti. Birincisi, orijinal \u00fc\u00e7lemenin sonunda, insanl\u0131\u011f\u0131n elini b\u00fcy\u00fck \u00f6l\u00e7\u00fcde g\u00fc\u00e7lendiren Zion yok edilmedi. \u0130kincisi, makine taraf\u0131nda ya\u015fanan b\u00f6l\u00fcnmenin ard\u0131ndan, hem ak\u0131ll\u0131 makineler hem de tamamen yaz\u0131l\u0131m tabanl\u0131 ki\u015filikler olan baz\u0131 yapay zeka ta\u015f\u0131y\u0131c\u0131lar\u0131 art\u0131k insanl\u0131\u011f\u0131n taraf\u0131nda yer al\u0131yor. Sonu\u00e7 olara bu durum, temelde birka\u00e7 yeni sorunu daha ortaya \u00e7\u0131kard\u0131.<\/p>\n<h3>Veri s\u0131z\u0131nt\u0131lar\u0131<\/h3>\n<p>Yapay zeka ta\u015f\u0131y\u0131c\u0131lar\u0131, baz\u0131lar\u0131 hassas olan \u00f6nemli \u00f6l\u00e7\u00fcde bilgi ile ka\u00e7t\u0131. \u0130nsanlar art\u0131k Matrix\u2019in mimarisi ve \u00e7e\u015fitli kritik sistemler hakk\u0131nda \u00e7ok daha fazla \u015fey biliyorlar.<\/p>\n<h3>Kritik altyap\u0131 g\u00fcvenli\u011fi<\/h3>\n<p>Hackerlar \u201cger\u00e7ek ger\u00e7eklikte\u201d \u00e7ok daha aktif ve art\u0131k periyodik olarak fiziksel d\u00fczeyde kritik altyap\u0131ya sald\u0131r\u0131yorlar. Ayr\u0131ca, taraf de\u011fi\u015ftiren makineler aktif olarak, \u00f6rne\u011fin hasat makinesi kontrol sistemine ve di\u011fer korunan nesnelere girerek, insanl\u0131\u011f\u0131n donan\u0131m d\u00fczeyinde di\u011fer makineleri hacklemesine yard\u0131mc\u0131 oluyor. Sonu\u00e7 olarak, Zion isyanc\u0131lar\u0131 Matrix\u2019e ba\u011fl\u0131 insanlar\u0131n bedenlerini \u00e7almaya devam edebiliyor.<\/p>\n<h2>Genel anlamda \u00e7\u0131kar\u0131lan sonu\u00e7lar<\/h2>\n<p>\u00d6zetlemek gerekirse Matrix g\u00fcncellemesi, makinelerin genel g\u00fcvenli\u011fini iyile\u015ftirmek yerine daha da k\u00f6t\u00fcle\u015ftirdi. Yapay zeka k\u00f6lele\u015ftirilmi\u015f insanlar\u0131 pillere d\u00f6n\u00fc\u015ft\u00fcrmeseydi, belki de insanlar\u0131n <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/cybersecurity-services?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">ba\u011f\u0131ms\u0131z bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 analizi<\/a> ile yard\u0131mda bulunabilirdi \u2014 b\u00f6ylesine b\u00fcy\u00fck bir g\u00fcncellemeyi kullan\u0131ma sunmadan \u00f6nce harcanan \u00e7abaya de\u011fer.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Son g\u00fcncellemeden bu yana ge\u00e7en 18 y\u0131lda Matrix&#8217;te nelerin de\u011fi\u015fti\u011fine bak\u0131yoruz.<\/p>\n","protected":false},"author":700,"featured_media":10397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[2303,2051,790,2522],"class_list":{"0":"post-10396","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-filmler","11":"tag-gercekler","12":"tag-guvenlik-aciklari","13":"tag-matrix"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/matrix-resurrections-state-of-cybersecurity\/10396\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/matrix-resurrections-state-of-cybersecurity\/23769\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/matrix-resurrections-state-of-cybersecurity\/19268\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/matrix-resurrections-state-of-cybersecurity\/9667\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/matrix-resurrections-state-of-cybersecurity\/25993\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/matrix-resurrections-state-of-cybersecurity\/23965\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/matrix-resurrections-state-of-cybersecurity\/23650\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/matrix-resurrections-state-of-cybersecurity\/26621\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/matrix-resurrections-state-of-cybersecurity\/26218\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/matrix-resurrections-state-of-cybersecurity\/32128\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/matrix-resurrections-state-of-cybersecurity\/43209\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/matrix-resurrections-state-of-cybersecurity\/18331\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/matrix-resurrections-state-of-cybersecurity\/18711\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/matrix-resurrections-state-of-cybersecurity\/15649\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/matrix-resurrections-state-of-cybersecurity\/27892\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/matrix-resurrections-state-of-cybersecurity\/32278\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/matrix-resurrections-state-of-cybersecurity\/27958\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/matrix-resurrections-state-of-cybersecurity\/24710\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/matrix-resurrections-state-of-cybersecurity\/30129\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/matrix-resurrections-state-of-cybersecurity\/29920\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/gercekler\/","name":"ger\u00e7ekler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10396"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10396\/revisions"}],"predecessor-version":[{"id":10398,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10396\/revisions\/10398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10397"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}