{"id":11765,"date":"2023-10-16T10:00:25","date_gmt":"2023-10-16T07:00:25","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11765"},"modified":"2023-10-12T13:55:40","modified_gmt":"2023-10-12T10:55:40","slug":"linux-at-home-threats-and-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/linux-at-home-threats-and-protection\/11765\/","title":{"rendered":"Evlerde Linux&#8217;e y\u00f6nelik \u00fc\u00e7 yayg\u0131n sald\u0131r\u0131"},"content":{"rendered":"<p>Bu y\u00fczy\u0131l\u0131n ilk 23 y\u0131l\u0131nda Linux i\u015fletim sistemi Windows kadar yayg\u0131n hale geldi. \u0130nsanlar\u0131n yaln\u0131zca %3\u2019\u00fc bunu diz\u00fcst\u00fc bilgisayarlar\u0131nda ve ki\u015fisel bilgisayarlar\u0131nda kullanmas\u0131na ra\u011fmen, Linux, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/truelist.co\/blog\/linux-statistics\/\">Nesnelerin \u0130nterneti\u2019ne hakimdir<\/a> ve ayn\u0131 zamanda en pop\u00fcler sunucu i\u015fletim sistemidir. Evinizde neredeyse kesinlikle en az bir Linux cihaz\u0131n\u0131z var: Wi-Fi y\u00f6nlendiriciniz. Ancak asl\u0131nda \u00e7ok daha fazlas\u0131 olmas\u0131 muhtemeldir: Linux genellikle ak\u0131ll\u0131 kap\u0131 zillerinde, g\u00fcvenlik kameralar\u0131nda, bebek telsizlerinde, a\u011fa ba\u011fl\u0131 depolamada (NAS), TV\u2019ler ve benzerlerinde kullan\u0131l\u0131r.<\/p>\n<p>Ayn\u0131 zamanda Linux her zaman \u00f6zel bir bak\u0131m gerektirmeyen ve bilgisayar korsanlar\u0131n\u0131n ilgisini \u00e7ekmeyen \u201csorunsuz\u201d bir i\u015fletim sistemi olma itibar\u0131na sahip olmu\u015ftur. Ne yaz\u0131k ki bunlar\u0131n hi\u00e7biri art\u0131k Linux i\u00e7in ge\u00e7erli de\u011fil. Peki evdeki Linux cihazlar\u0131n\u0131n kar\u015f\u0131la\u015ft\u0131\u011f\u0131 tehditler nelerdir? \u00dc\u00e7 pratik \u00f6rne\u011fi ele alal\u0131m.<\/p>\n<h2>Y\u00f6nlendirici botnet\u2019i<\/h2>\n<p>Sald\u0131rganlar, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 bir y\u00f6nlendiricide, g\u00fcvenlik kameras\u0131nda veya her zaman a\u00e7\u0131k olan ve internete ba\u011fl\u0131 olan ba\u015fka bir cihazda \u00e7al\u0131\u015ft\u0131rarak, bunu \u00e7e\u015fitli siber sald\u0131r\u0131lar bundan faydalanabilirler. Bu t\u00fcr botlar\u0131n kullan\u0131m\u0131 <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ddos-distributed-denial-of-service-attack\/\" rel=\"noopener\">DDoS sald\u0131r\u0131lar\u0131nda<\/a> olduk\u00e7a pop\u00fclerdir. Bu konuda tipik bir \u00f6rnek, son on y\u0131l\u0131n en b\u00fcy\u00fck DDoS sald\u0131r\u0131lar\u0131n\u0131 ba\u015flatmak i\u00e7in kullan\u0131lan <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/\" rel=\"noopener\">Mirai botnet\u2019ti<\/a>.<\/p>\n<p>Vir\u00fcsl\u00fc y\u00f6nlendiricilerin bir di\u011fer pop\u00fcler kullan\u0131m\u0131 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/thehackernews.com\/2023\/07\/avrecon-botnet-leveraging-compromised.html\">da bunlar\u0131n \u00fczerinde bir proxy sunucu \u00e7al\u0131\u015ft\u0131rmakt\u0131r<\/a>. B\u00f6yle bir proxy arac\u0131l\u0131\u011f\u0131yla su\u00e7lular, kurban\u0131n IP adresini kullanarak internete eri\u015febilir ve izlerini gizleyebilir.<\/p>\n<p>Bu hizmetlerin her ikisi de siber su\u00e7 d\u00fcnyas\u0131nda s\u00fcrekli olarak talep g\u00f6rmektedir, dolay\u0131s\u0131yla botnet operat\u00f6rleri bunlar\u0131 di\u011fer siber su\u00e7lulara tekrar satmaktad\u0131r.<\/p>\n<h2>NAS fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>B\u00fcy\u00fck \u015firketlere y\u00f6nelik ana siber sald\u0131r\u0131lar ve ard\u0131ndan gelen fidye talepleri, yani <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/top5-ransomware-groups\/9564\/\" rel=\"noopener\">fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131<\/a>, bize bu yeralt\u0131 end\u00fcstrisinin <a target=\"_blank\" href=\"https:\/\/noransom.kaspersky.com\/tr\/\" rel=\"noopener\">bireysel kullan\u0131c\u0131lara y\u00f6nelik<\/a> \u00e7ok k\u00fc\u00e7\u00fck tehditler ile ba\u015flad\u0131\u011f\u0131n\u0131 neredeyse unutturdu. Bilgisayar\u0131n\u0131z\u0131 \u015fifrelemek ve \u015fifreyi \u00e7\u00f6zmek i\u00e7in y\u00fcz dolar talep etmek \u2013 bunu hat\u0131rlad\u0131n\u0131z m\u0131? Biraz de\u011fi\u015ftirilmi\u015f bir bi\u00e7imde, bu tehdit 2021\u2019de yeniden ortaya \u00e7\u0131kt\u0131 ve 2022\u2019de geli\u015fti; ancak art\u0131k bilgisayar korsanlar\u0131 diz\u00fcst\u00fc bilgisayarlar\u0131 ve masa\u00fcst\u00fc bilgisayarlar\u0131 de\u011fil, evdeki dosya sunucular\u0131n\u0131 ve NAS\u2019\u0131 hedef al\u0131yor. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar en az iki kez QNAP NAS cihazlar\u0131n\u0131n (<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.qnap.com\/en\/how-to\/tutorial\/article\/manually-install-qrescue-to-recover-qlocker-encrypted-files-on-qnap-nas\">Qlocker<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/09\/new-wave-of-data-destroying-ransomware-attacks-hits-qnap-nas-devices\/\">Deadbolt<\/a>) sahiplerine sald\u0131rd\u0131. Synology, LG ve ZyXEL cihazlar\u0131 da sald\u0131r\u0131larla kar\u015f\u0131la\u015ft\u0131. Senaryo her durumda ayn\u0131d\u0131r: Sald\u0131rganlar, parolalar\u0131 kaba kuvvet kullanarak veya yaz\u0131l\u0131m\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanarak internet \u00fczerinden herkesin eri\u015febildi\u011fi a\u011f depolama alan\u0131na sald\u0131r\u0131r. Daha sonra t\u00fcm verileri \u015fifreleyen ve fidye talebi sunan Linux k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n\u0131 \u00e7al\u0131\u015ft\u0131r\u0131yorlar.<\/p>\n<h2>Masa\u00fcst\u00fc bilgisayarlarda casusluk yapmak<\/h2>\n<p>Ubuntu, Mint veya di\u011fer Linux da\u011f\u0131t\u0131mlar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131ran masa\u00fcst\u00fc veya diz\u00fcst\u00fc bilgisayar sahiplerinin de dikkatli olmas\u0131 gerekir. Linux i\u00e7in \u201cMasa\u00fcst\u00fc\u201d k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 <a target=\"_blank\" href=\"https:\/\/securelist.com\/the-myth-of-nix-security\/30511\/\" rel=\"noopener\">uzun s\u00fcredir<\/a> ortal\u0131kta dola\u015f\u0131yor ve art\u0131k bunlarla resmi web sitelerinde bile kar\u015f\u0131la\u015fabilirsiniz. K\u0131sa bir s\u00fcre \u00f6nce, <a target=\"_blank\" href=\"https:\/\/securelist.com\/backdoored-free-download-manager-linux-malware\/110465\/\" rel=\"noopener\">Free Download Manager\u2019\u0131n (FDM) Linux s\u00fcr\u00fcm\u00fcn\u00fcn baz\u0131 kullan\u0131c\u0131lar\u0131n\u0131n, bilgisayarlar\u0131na FDM\u2019nin truva at\u0131 haline getirilmi\u015f bir s\u00fcr\u00fcm\u00fcn\u00fc indirdikleri k\u00f6t\u00fc ama\u00e7l\u0131 bir veri havuzuna y\u00f6nlendirildikleri<\/a> bir sald\u0131r\u0131 ke\u015ffettik.<\/p>\n<p>Sald\u0131rganlar, bu numaray\u0131 ba\u015farmak i\u00e7in FDM web sitesini hacklediler ve rastgele baz\u0131 ziyaret\u00e7ileri FDM\u2019nin resmi, \u201ctemiz\u201d s\u00fcr\u00fcm\u00fcne, di\u011ferlerini de vir\u00fcsl\u00fc olana y\u00f6nlendiren bir komut dosyas\u0131 yerle\u015ftirdiler. Truva at\u0131 haline getirilmi\u015f s\u00fcr\u00fcm, bilgisayara k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m da\u011f\u0131tarak parolalar\u0131 ve di\u011fer hassas bilgileri \u00e7ald\u0131. Ge\u00e7mi\u015fte de <a target=\"_blank\" href=\"https:\/\/securelist.com\/beware-of-backdoored-linux-mint-isos\/73893\/\" rel=\"noopener\">Linux Mint g\u00f6r\u00fcnt\u00fcleri gibi<\/a> benzer olaylar ya\u015fanm\u0131\u015ft\u0131.<\/p>\n<p>Linux\u2019teki ve pop\u00fcler Linux uygulamalar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n d\u00fczenli olarak ke\u015ffedildi\u011fini unutmamak \u00f6nemlidir (burada yaln\u0131zca Linux \u00e7ekirde\u011fi i\u00e7in bir <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cvedetails.com\/product\/47\/Linux-Linux-Kernel.html?vendor_id=33\">liste<\/a> bulunmaktad\u0131r). Bu nedenle, do\u011fru \u015fekilde yap\u0131land\u0131r\u0131lm\u0131\u015f i\u015fletim sistemi ara\u00e7lar\u0131 ve eri\u015fim rolleri bile bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 tam bir koruma sa\u011flamaz.<\/p>\n<p>Temel olarak, art\u0131k \u201cLinux daha az pop\u00fcler ve hedefe al\u0131nm\u0131yor\u201d, \u201c\u015e\u00fcpheli web sitelerini ziyaret etmiyorum\u201d veya \u201csadece k\u00f6k kullan\u0131c\u0131 olarak \u00e7al\u0131\u015fm\u0131yorum\u201d gibi yayg\u0131n inan\u0131\u015flara g\u00fcvenmeniz tavsiye edilmez. Linux tabanl\u0131 i\u015f istasyonlar\u0131 i\u00e7in koruma, Windows ve MacOS i\u015f istasyonlar\u0131 kadar eksiksiz olmal\u0131d\u0131r.<\/p>\n<h2>Evde Linux sistemleri nas\u0131l korunur<\/h2>\n<p>Y\u00f6nlendiriciniz, NAS\u2019\u0131n\u0131z, bebek telsiziniz ve ev bilgisayarlar\u0131n\u0131z i\u00e7in <strong>g\u00fc\u00e7l\u00fc bir y\u00f6netici \u015fifresi belirleyin<\/strong>. Bu cihazlar\u0131n \u015fifreleri benzersiz olmal\u0131d\u0131r. Kaba kuvvetle zorlama parolalar ve varsay\u0131lan fabrika parolalar\u0131n\u0131 denemek, evde kullan\u0131lan Linux\u2019e sald\u0131rman\u0131n pop\u00fcler y\u00f6ntemleri olmaya devam ediyor. <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/strong-password-day\/5640\/\" rel=\"noopener\">G\u00fc\u00e7l\u00fc (uzun ve karma\u015f\u0131k) \u015fifreleri<\/a> bir <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">\u015fifre y\u00f6neticisinde<\/a> saklamak iyi bir fikirdir, b\u00f6ylece bunlar\u0131 her seferinde manuel olarak yazmak zorunda kalmazs\u0131n\u0131z.<\/p>\n<p><strong>Y\u00f6nlendiricinizin, NAS\u2019\u0131n\u0131z\u0131n ve di\u011fer cihazlar\u0131n\u0131z\u0131n donan\u0131m yaz\u0131l\u0131m\u0131n\u0131 d\u00fczenli olarak g\u00fcncelleyin.<\/strong> Ayarlarda otomatik g\u00fcncelleme \u00f6zelli\u011fini aray\u0131n; bu \u00f6zellik bu konuda \u00e7ok kullan\u0131\u015fl\u0131d\u0131r. Bu g\u00fcncellemeler, Linux cihazlar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan yayg\u0131n sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flayacakt\u0131r.<\/p>\n<p><strong>Kontrol paneline Web eri\u015fimini devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/strong> \u00c7o\u011fu y\u00f6nlendirici ve NAS cihaz\u0131, kontrol panellerine eri\u015fimi k\u0131s\u0131tlaman\u0131za olanak tan\u0131r. Cihazlar\u0131n\u0131za internetten eri\u015filemedi\u011finden ve yaln\u0131zca ev a\u011f\u0131ndan kullan\u0131labildi\u011finden emin olun.<\/p>\n<p><strong>Gereksiz hizmetleri en aza indirin.<\/strong> NAS cihazlar\u0131, y\u00f6nlendiriciler ve hatta ak\u0131ll\u0131 kap\u0131 zilleri minyat\u00fcr sunucular gibi \u00e7al\u0131\u015f\u0131r. Bunlar genellikle medya bar\u0131nd\u0131rma, FTP dosya eri\u015fimi, herhangi bir ev bilgisayar\u0131 i\u00e7in yaz\u0131c\u0131 ba\u011flant\u0131lar\u0131 ve SSH \u00fczerinden komut sat\u0131r\u0131 kontrol\u00fc gibi ek \u00f6zellikler i\u00e7erir. Yaln\u0131zca ger\u00e7ekten kulland\u0131\u011f\u0131n\u0131z i\u015flevleri etkin tutun.<\/p>\n<p><strong>Bulut i\u015flevselli\u011fini s\u0131n\u0131rlamay\u0131 d\u00fc\u015f\u00fcn\u00fcn.<\/strong> NAS\u2019\u0131n\u0131z\u0131n bulut i\u015flevlerini (WD My Cloud gibi) kullanm\u0131yorsan\u0131z veya bunlar olmadan da yapabiliyorsan\u0131z, bunlar\u0131 tamamen devre d\u0131\u015f\u0131 b\u0131rakmak ve NAS\u2019\u0131n\u0131za yaln\u0131zca yerel ev a\u011f\u0131n\u0131z \u00fczerinden eri\u015fmek en iyisidir. Bu sadece bir\u00e7ok siber sald\u0131r\u0131y\u0131 engellemekle kalmayacak, ayn\u0131 zamanda <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/western-digital-struggles-to-fix-massive-my-cloud-outage-offers-workaround\/\">\u00fcretici taraf\u0131nda meydana gelebilecek olaylara<\/a> kar\u015f\u0131 da sizi koruyacakt\u0131r.<\/p>\n<p><strong>\u00d6zel g\u00fcvenlik ara\u00e7lar\u0131n\u0131 kullan\u0131n.<\/strong> Cihaza ba\u011fl\u0131 olarak, mevcut ara\u00e7lar\u0131n adlar\u0131 ve i\u015flevleri farkl\u0131l\u0131k g\u00f6sterebilir. Linux PC\u2019ler ve diz\u00fcst\u00fc bilgisayarlar\u0131n ve bunlar\u0131n yan\u0131 s\u0131ra baz\u0131 NAS cihazlar\u0131 i\u00e7in, ClamAV gibi d\u00fczenli olarak g\u00fcncellenen a\u00e7\u0131k kaynak se\u00e7enekleri de dahil olmak \u00fczere antivir\u00fcs \u00e7\u00f6z\u00fcmleri mevcuttur. Korsanl\u0131k ama\u00e7l\u0131 programlar\u0131n tespiti gibi daha spesifik g\u00f6revlere y\u00f6nelik ara\u00e7lar da vard\u0131r.<\/p>\n<p><strong>Masa\u00fcst\u00fc bilgisayarlar i\u00e7in Qubes i\u015fletim sistemine ge\u00e7meyi d\u00fc\u015f\u00fcn\u00fcn<\/strong>. Tamamen konteynerle\u015ftirme ilkeleri \u00fczerine in\u015fa edilmi\u015ftir ve uygulamalar\u0131 birbirinden tamamen izole etmenize olanak tan\u0131r. Qubes konteynerleri Fedora ve Debian\u2019\u0131 temel al\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm\">\n","protected":false},"excerpt":{"rendered":"<p>Bilmiyor olsan\u0131z bile, muhtemelen evinizde Linux \u00e7al\u0131\u015ft\u0131ran cihazlar\u0131n\u0131z vard\u0131r ve onlar\u0131n da korumaya ihtiyac\u0131 var! \u0130\u015fte BT profesyonellerinin bile s\u0131kl\u0131kla unuttu\u011fu \u00fc\u00e7 Linux tehdidi.<\/p>\n","protected":false},"author":2722,"featured_media":11766,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351,995],"tags":[1350,392,1033,591,744,519,2276,1758,1063,1611,878],"class_list":{"0":"post-11765","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"category-technology","10":"tag-akilli-ev","11":"tag-botnet","12":"tag-ddos","13":"tag-fidye-yazilimi","14":"tag-guvenlik","15":"tag-ipuclari-2","16":"tag-linux","17":"tag-mirai","18":"tag-nesnelerin-interneti","19":"tag-tedarik-zinciri","20":"tag-teknoloji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/linux-at-home-threats-and-protection\/11765\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/linux-at-home-threats-and-protection\/26290\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/linux-at-home-threats-and-protection\/21723\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/linux-at-home-threats-and-protection\/11065\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/linux-at-home-threats-and-protection\/28965\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/linux-at-home-threats-and-protection\/26572\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/linux-at-home-threats-and-protection\/26728\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/linux-at-home-threats-and-protection\/29219\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/linux-at-home-threats-and-protection\/28072\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/linux-at-home-threats-and-protection\/36168\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/linux-at-home-threats-and-protection\/49105\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/linux-at-home-threats-and-protection\/21052\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/linux-at-home-threats-and-protection\/30544\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/linux-at-home-threats-and-protection\/34914\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/linux-at-home-threats-and-protection\/26845\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/linux-at-home-threats-and-protection\/32574\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/linux-at-home-threats-and-protection\/32227\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/linux\/","name":"Linux"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11765"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11765\/revisions"}],"predecessor-version":[{"id":11768,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11765\/revisions\/11768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11766"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}