{"id":10408,"date":"2022-01-03T11:36:26","date_gmt":"2022-01-03T08:36:26","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10408"},"modified":"2022-05-05T14:25:12","modified_gmt":"2022-05-05T11:25:12","slug":"security-2021-year-in-memes","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/security-2021-year-in-memes\/10408\/","title":{"rendered":"2021 y\u0131l\u0131 bilgi g\u00fcvenli\u011fi ile ilgili internet mimleri ve tweetler"},"content":{"rendered":"<p>21. y\u00fczy\u0131lda, ayr\u0131nt\u0131l\u0131 <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/poc-proof-of-concept\/\" target=\"_blank\" rel=\"noopener\">kavram kan\u0131tlar\u0131<\/a> ve a\u00e7\u0131klamalar, bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131na insanlar\u0131n dikkatini \u00e7ekmek i\u00e7in yeterli de\u011fildir. Ak\u0131lda kal\u0131c\u0131 bir isme, logoya ve Twitter\u2019da payla\u015f\u0131lan internet mimlerine ihtiyac\u0131n\u0131z var. Her t\u00fcrden ara\u015ft\u0131rmac\u0131, BT gazetecisi, sekt\u00f6r \u00e7al\u0131\u015fan\u0131 ve sempatik kullan\u0131c\u0131, kendi aralar\u0131nda payla\u015ft\u0131\u011f\u0131 komik g\u00f6r\u00fcnt\u00fclerle e\u011fleniyor.<\/p>\n<p>Ve asl\u0131nda genel olarak bak\u0131ld\u0131\u011f\u0131nda bu payla\u015f\u0131mlar faydal\u0131d\u0131r: Bir internet mimi g\u00f6rd\u00fckten sonra, bir\u00e7ok insan yaz\u0131lan\u0131 okur ve bazen g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kapatmak i\u00e7in ad\u0131m atar \u2014 ya da en az\u0131ndan ayn\u0131 hatay\u0131 yapmamak ve bir mime konu olmaktan ka\u00e7\u0131nmak i\u00e7in ellerinden geleni yapar. Ayr\u0131ca, bir olayla ilgili \u00e7\u0131kan internet mim say\u0131s\u0131n\u0131 g\u00f6z \u00f6n\u00fcne alarak sorunun b\u00fcy\u00fckl\u00fc\u011f\u00fc hakk\u0131nda fikir edinebiliriz. Siber g\u00fcvenlikle ilgili en son haberleri \u00f6\u011frenmek i\u00e7in yaln\u0131zca internet mimlerine g\u00fcvenecek olsayd\u0131k, 2021\u2019i \u015fu \u015fekilde hat\u0131rlard\u0131k:<\/p>\n<h2>Ocak: WhatsApp gizlilik politikas\u0131 g\u00fcncellemesi<\/h2>\n<p>2021 y\u0131l\u0131, milyonlarca WhatsApp kullan\u0131c\u0131s\u0131n\u0131n aniden hizmetin gizlilik politikas\u0131nda bir g\u00fcncelleme yap\u0131ld\u0131\u011f\u0131n\u0131 \u00f6\u011frenmesiyle ba\u015flad\u0131. Sonu\u00e7 olarak, kullan\u0131c\u0131 say\u0131s\u0131nda \u00f6nemli art\u0131\u015f <a href=\"https:\/\/www.businessinsider.com\/telegram-hits-500-million-users-after-whatsapp-backlash-2021-1\" target=\"_blank\" rel=\"noopener nofollow\">ya\u015fanan<\/a> <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/telegram-privacy-security\/9221\/\" target=\"_blank\" rel=\"noopener\">Telegram<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/signal-privacy-security\/40377\/\" target=\"_blank\" rel=\"noopener nofollow\">Signal<\/a>\u2018e toplu ge\u00e7i\u015f oldu. Bu internet miminin WhatsApp\u2019\u0131n yeni gizlilik politikas\u0131yla durumu en iyi \u015fekilde \u00f6zetledi\u011fini d\u00fc\u015f\u00fcn\u00fcyoruz:<\/p>\n<p><a href=\"https:\/\/twitter.com\/Onka_Shole\/status\/1348379176437510151\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/Onka_Shole\/status\/1348379176437510151<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>\u015eubat: FootfallCam 3D\u2019nin (ve ek olarak IoT kameralar\u0131n) efsanevi g\u00fcvenlik ar\u0131zas\u0131<\/h2>\n<p>Nesnelerin interneti (IoT), cihaz g\u00fcvenli\u011finin k\u00f6t\u00fc olmas\u0131yla \u00fcnl\u00fcd\u00fcr, ancak her \u015feyi g\u00f6rd\u00fc\u011f\u00fcn\u00fcz\u00fc san\u0131yorken, baz\u0131 ak\u0131ll\u0131 cihaz \u00fcreticileri t\u00fcm beklentileri a\u015fmay\u0131 ba\u015far\u0131r. Twitter\u2019daki bu tweet zinciri her \u015feyi a\u00e7\u0131kl\u0131yor (utanma konusunda limitlerinizi zorlamamaya dikkat edin):<\/p>\n<p><a href=\"https:\/\/twitter.com\/OverSoftNL\/status\/1357306500386086915\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/OverSoftNL\/status\/1357306500386086915<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Mart: ProxyLogon g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/h2>\n<p>Mart ay\u0131n\u0131n ba\u015flar\u0131nda Microsoft, Exchange i\u00e7in sistemdeki birka\u00e7 ciddi g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 gideren yamalar yay\u0131nlad\u0131. Bu olduk\u00e7a yayg\u0131n bir durum olsa da \u015fu noktaya dikkat \u00e7ekmek gerekiyor: Sald\u0131rganlar, s\u00f6ylendi\u011fine g\u00f6re g\u00f6re halihaz\u0131rda Ocak ay\u0131 veya daha \u00f6ncesinden beri baz\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131ndan aktif olarak yararlan\u0131yordu. Yama yay\u0131nland\u0131\u011f\u0131nda, ABD\u2019deki <a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software\/\" target=\"_blank\" rel=\"noopener nofollow\">30.000\u2019den fazla<\/a> i\u015fletme sald\u0131r\u0131ya u\u011fram\u0131\u015ft\u0131.<\/p>\n<p><a href=\"https:\/\/twitter.com\/cyb3rops\/status\/1369773943188520963\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/cyb3rops\/status\/1369773943188520963<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Nisan: Signal\u2019in Cellebrite\u2019i trollemesi<\/h2>\n<p>Bilmeyenler i\u00e7in Cellebrite, s\u00f6zde yetkili makamlar i\u00e7in ekipman \u00fcreterek, \u00e7al\u0131\u015fanlar\u0131n ak\u0131ll\u0131 telefonlara kolay ve rahat bir \u015fekilde girmelerini ve ilgilendikleri bilgileri almalar\u0131n\u0131 sa\u011flayan bir \u015firket. Bu nedenle \u015firketin, gizlilik savunucular\u0131ndaki yeri bir ba\u015fkad\u0131r. 2020\u2019nin sonlar\u0131nda Cellebrite, \u00fcr\u00fcnlerinin Signal\u2019i desteklemeye ba\u015flad\u0131\u011f\u0131n\u0131 duyurdu. Buna kar\u015f\u0131l\u0131k, Signal ekibi Cellebrite donan\u0131m\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131 \u00fczerine bir \u00e7al\u0131\u015fma yay\u0131nlad\u0131 ve bunu yaparken hi\u00e7 g\u00f6r\u00fclmemi\u015f bir tan\u0131t\u0131m videosu kulland\u0131:<\/p>\n<p><a href=\"https:\/\/twitter.com\/signalapp\/status\/1384906127360548869\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/signalapp\/status\/1384906127360548869<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>May\u0131s: Colonial Pipeline\u2019a d\u00fczenlenen fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131<\/h2>\n<p>Akaryak\u0131t aktar\u0131m\u0131 konusunda ABD\u2019nin en b\u00fcy\u00fck boru hatt\u0131 sistemi olan Colonial Pipeline\u2019a yap\u0131lan bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/pipeline-ransomware-mitigation\/9653\/\" target=\"_blank\" rel=\"noopener\">fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131<\/a>, \u00fclkenin g\u00fcneydo\u011fu k\u0131y\u0131s\u0131 boyunca benzin ve dizel tedari\u011finde kesintiye neden oldu. Olay, bu t\u00fcr i\u015fletmelerin nas\u0131l korunaca\u011f\u0131 konusunda bir\u00e7ok tart\u0131\u015fmaya yol a\u00e7t\u0131 ve \u015firketin yeni bir siber g\u00fcvenlik y\u00f6neticisi aray\u0131\u015f\u0131na ili\u015fkin ilan\u0131, \u201cMuhtemelen art\u0131k bu i\u015f i\u00e7in yeterli b\u00fct\u00e7eleri var\u201d yorumuyla sosyal medyada viral oldu.<\/p>\n<p><a href=\"https:\/\/twitter.com\/HackingLZ\/status\/1392499874197872646?s=20\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/HackingLZ\/status\/1392499874197872646?s=20<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Haziran: Kongre \u00fcyesi yanl\u0131\u015fl\u0131kla e-posta parolas\u0131n\u0131 ve PIN kodunu payla\u015ft\u0131<\/h2>\n<p>ABD Temsilciler Meclisi Silahl\u0131 Kuvvetler Komitesi \u00fcyesi ve \u00f6zellikle siber g\u00fcvenlikle ilgilenen alt bir komitenin \u00fcyesi olan ABD Kongre \u00dcyesi Mo Brooks, parolalar\u0131n g\u00fcvenli bir \u015fekilde saklanmas\u0131n\u0131n yayg\u0131nla\u015ft\u0131r\u0131lmas\u0131 konusuna al\u0131\u015f\u0131lmad\u0131k bir katk\u0131 yapt\u0131. Ki\u015fisel Twitter hesab\u0131ndan, \u00fczerinde Gmail hesab\u0131n\u0131n \u015fifresi ve bir PIN kodu yazan notun yer ald\u0131\u011f\u0131 monit\u00f6r\u00fcn\u00fcn g\u00f6r\u00fcnd\u00fc\u011f\u00fc bir foto\u011fraf yay\u0131nlad\u0131. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/unusual-ways-to-leak-info\/8521\/\" target=\"_blank\" rel=\"noopener\">Klasiklerden<\/a> bahsediyoruz! Tweet birka\u00e7 saat payla\u015f\u0131mda kald\u0131 ve viral oldu. Brooks sonunda att\u0131\u011f\u0131 tweeti silmi\u015f olsa da, art\u0131k \u00e7ok ge\u00e7ti:<\/p>\n<p><a href=\"https:\/\/twitter.com\/Josh_Moon\/status\/1401678401946243073\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/Josh_Moon\/status\/1401678401946243073<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Temmuz: PrintNightmare g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar, Windows Yazd\u0131rma Biriktiricisi\u2019ndeki <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/printnightmare-vulnerability\/9814\/\" target=\"_blank\" rel=\"noopener\">CVE-2021-34527 ve CVE-2021-1675<\/a> g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak sald\u0131r\u0131 ile ilgili bir kavram kan\u0131t\u0131 yay\u0131nlamak i\u00e7in yanl\u0131\u015fl\u0131kla GitHub\u2019\u0131 kullanm\u0131\u015f olabilir. Yay\u0131nlanan y\u00f6ntemin sald\u0131rganlar taraf\u0131ndan h\u0131zla uygulanmas\u0131ndan korkan Microsoft, Sal\u0131 G\u00fcncellemesini bile beklemeden acil bir yama yay\u0131nlad\u0131. Dahas\u0131, eski olan Windows 7 ve Windows Server 2012 i\u00e7in bile yama \u00e7\u0131kar\u0131ld\u0131. Ancak yamalar sorunu tamamen \u00e7\u00f6zmedi; baz\u0131 yaz\u0131c\u0131lar yama y\u00fcklendikten sonra \u00e7al\u0131\u015fmamaya ba\u015flad\u0131.<\/p>\n<p><a href=\"https:\/\/twitter.com\/techxsigil\/status\/1419336640162680839\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/techxsigil\/status\/1419336640162680839<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>A\u011fustos: Black Hat ve DEF CON<\/h2>\n<p>A\u011fustos, 2021 standartlar\u0131na g\u00f6re olduk\u00e7a sessiz ge\u00e7ti. Elbette, birka\u00e7 olay internet mimleri ile \u00f6l\u00fcms\u00fczle\u015ftirilse de bunlar aras\u0131nda belki de en unutulmaz\u0131, COVID-19 ile ilgili k\u0131s\u0131tlamalar alt\u0131nda bu y\u0131l Las Vegas\u2019a gelemeyen BlackHat ve DEF CON m\u00fcdavimlerinin ma\u011fduriyeti oldu.<\/p>\n<p><a href=\"https:\/\/twitter.com\/Djax_Alpha\/status\/1423741831968342016\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/Djax_Alpha\/status\/1423741831968342016<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Eyl\u00fcl: OMIGOD g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/h2>\n<p>Microsoft Azure kullan\u0131c\u0131lar\u0131 aniden, bir dizi hizmeti se\u00e7tiklerinde, platformun sanal Linux makinesini olu\u015ftururken bir A\u00e7\u0131k Y\u00f6netim Altyap\u0131s\u0131 (Open Management Infrastructure \u2013 OMI) arac\u0131s\u0131 da y\u00fckledi\u011fini <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/vulnerabilities-in-omi-azure\/10060\/\" target=\"_blank\" rel=\"noopener\">ke\u015ffetti<\/a>. (a) Arac\u0131n\u0131n uzun s\u00fcredir bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131 olmasayd\u0131, (b) istemcilere arac\u0131 kurulumu hakk\u0131nda bilgi verilseydi, (c) OMI normal bir otomatik g\u00fcncelleme sistemine sahip olsayd\u0131 ve (d) g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanmak \u00e7ok kolay olmasayd\u0131 bu durum o kadar da korkutucu olmazd\u0131.<\/p>\n<p><a href=\"https:\/\/twitter.com\/cyb3rops\/status\/1438424466661511182\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/cyb3rops\/status\/1438424466661511182<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Ekim: Facebook kendini internetten sildi<\/h2>\n<p>Ya\u015fanan b\u00fcy\u00fck Facebook kesintisi, Ekim\u2019i ger\u00e7ekten unutulmaz hale getirdi. Acil m\u00fcdahale ekiplerinin raporlar\u0131na g\u00f6re, yap\u0131lan bir g\u00fcncelleme, Facebook\u2019un DNS sunucular\u0131n\u0131 internette eri\u015filemez hale getirdi. Sonu\u00e7 olarak, Facebook ve Messenger, Instagram ve WhatsApp dahil olmak \u00fczere \u015firketin di\u011fer bir dizi hizmetinin kullan\u0131c\u0131lar\u0131 alt\u0131 saatten fazla bunlara giri\u015f yapamad\u0131. Kullan\u0131c\u0131lar durumdan \u015fikayet etmek i\u00e7in alternatif a\u011flar\u0131 ve di\u011fer mesajla\u015fma uygulamalar\u0131n\u0131 kullan\u0131rken (bunlara a\u015f\u0131r\u0131 y\u00fcklenirken), internet\u2019te, \u015firket y\u00f6neticilerinin eri\u015fim sistemleri Facebook\u2019a ba\u011fl\u0131 oldu\u011fu i\u00e7in sunuculara ula\u015famad\u0131klar\u0131 gibi \u00e7\u0131lg\u0131n s\u00f6ylentiler dola\u015fmaya ba\u015flad\u0131.<\/p>\n<p><a href=\"https:\/\/twitter.com\/most__wanted___\/status\/1445066280009027592\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/most__wanted___\/status\/1445066280009027592<\/a><\/p>\n<p>\u00a0<\/p>\n<h2>Kas\u0131m: Sahte Ye\u015fil Ge\u00e7i\u015f Sertifikalar\u0131<\/h2>\n<p>Avrupa dijital a\u015f\u0131 sertifikalar\u0131ndaki ge\u00e7erli sahtecilik Ekim ay\u0131n\u0131n sonunda \u00e7ok ses getirdi, ancak as\u0131l bomba Kas\u0131m ay\u0131nda, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/whats-wrong-with-forged-green-pass\/10236\/\" target=\"_blank\" rel=\"noopener\">sahte Ye\u015fil Ge\u00e7i\u015f Sertifikalar\u0131n\u0131n internette sat\u0131\u015fa sunulmas\u0131yla<\/a> patlad\u0131. Sahte sertifikalar\u0131n da ge\u00e7erli oldu\u011fu do\u011fruland\u0131 \u2014 ve \u00f6rnek olarak, sat\u0131c\u0131lar Adolf Hitler, Mickey Mouse ve SpongeBob SquarePants i\u00e7in olu\u015fturduklar\u0131 sertifikalar\u0131 g\u00f6sterdi. Haberlere bak\u0131l\u0131rsa, sahte Ye\u015fil Ge\u00e7i\u015f Sertifikalar\u0131n\u0131n yay\u0131lmas\u0131 sorunu <a href=\"https:\/\/www.euronews.com\/2021\/12\/29\/italian-police-suspend-17-online-profiles-selling-fake-covid-certificates\" target=\"_blank\" rel=\"noopener nofollow\">hala ge\u00e7erlili\u011fi koruyor<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/astig0spe\/status\/1456637598991101952\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/astig0spe\/status\/1456637598991101952<\/a><\/p>\n<h2><\/h2>\n<h2>Aral\u0131k: Log4Shell g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/h2>\n<p>Aral\u0131k ay\u0131n\u0131n neredeyse tamam\u0131, Apache Log4j k\u00fct\u00fcphanesinin kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan Log4Shell\u2019i kontrol alt\u0131na alamadan ge\u00e7ti. Bu kitapl\u0131\u011f\u0131n Java uygulamalar\u0131nda yayg\u0131n olarak kullan\u0131lmas\u0131, milyonlarca program\u0131 ve cihaz\u0131 savunmas\u0131z hale getirdi. Apache Vakf\u0131 birka\u00e7 yama yay\u0131nlad\u0131 ve ara\u015ft\u0131rmac\u0131lar kar\u015f\u0131 \u00f6nlemleri birka\u00e7 kez a\u015fman\u0131n yollar\u0131n\u0131 buldular. Yama ilk yay\u0131nland\u0131\u011f\u0131 g\u00fcnlerde, botnet\u2019ler internet\u2019teki savunmas\u0131z programlar\u0131 taramaya ba\u015flad\u0131 ve fidye yaz\u0131l\u0131m\u0131 yazan sald\u0131rganlar bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararland\u0131. Log4Shell temal\u0131 o kadar \u00e7ok ba\u015far\u0131l\u0131 internet mimi ortaya \u00e7\u0131kt\u0131 ki, birileri toplu halde bu <a href=\"https:\/\/log4jmemes.com\/\" target=\"_blank\" rel=\"noopener nofollow\">mimlerin yer ald\u0131\u011f\u0131 bir internet sitesi<\/a> bile olu\u015fturdu.<\/p>\n<p><a href=\"https:\/\/twitter.com\/secbro1\/status\/1469328495847346177\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/twitter.com\/secbro1\/status\/1469328495847346177<\/a><\/p>\n<p>\u00a0<\/p>\n<p>2022 y\u0131l\u0131n\u0131n \u00e7ok daha sakin ge\u00e7mesini umal\u0131m. Siz de\u011ferli okuyucular\u0131m\u0131za mutlu bir y\u0131l diliyoruz!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0130nternet mimleri ve tweetler ile 2021&#8217;in en ilgin\u00e7 bilgi g\u00fcvenli\u011fi olaylar\u0131n\u0131 hat\u0131rl\u0131yoruz.<\/p>\n","protected":false},"author":2706,"featured_media":10409,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287],"tags":[790],"class_list":{"0":"post-10408","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-guvenlik-aciklari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/security-2021-year-in-memes\/10408\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security-2021-year-in-memes\/23787\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-2021-year-in-memes\/19286\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-2021-year-in-memes\/26014\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-2021-year-in-memes\/23991\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-2021-year-in-memes\/23692\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-2021-year-in-memes\/26662\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-2021-year-in-memes\/26257\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-2021-year-in-memes\/32150\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-2021-year-in-memes\/43237\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-2021-year-in-memes\/18376\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/security-2021-year-in-memes\/18737\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/security-2021-year-in-memes\/15654\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/security-2021-year-in-memes\/27934\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/security-2021-year-in-memes\/27985\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-2021-year-in-memes\/24728\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-2021-year-in-memes\/30147\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-2021-year-in-memes\/29938\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10408"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10408\/revisions"}],"predecessor-version":[{"id":10410,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10408\/revisions\/10410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10409"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}