{"id":14184,"date":"2026-01-27T14:37:52","date_gmt":"2026-01-27T11:37:52","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14184"},"modified":"2026-01-27T14:38:25","modified_gmt":"2026-01-27T11:38:25","slug":"brand-impersonation-spoofed-websites-risk-mitigation","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/14184\/","title":{"rendered":"\u0130\u015fletmelerin k\u00f6t\u00fc niyetli dijital ikizlerini takip etmeleri neden gereklidir?"},"content":{"rendered":"<p>Marka, web sitesi ve kurumsal posta kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, siber su\u00e7lular taraf\u0131ndan giderek daha yayg\u0131n olarak kullan\u0131lan bir teknik haline gelmektedir. D\u00fcnya Fikri M\u00fclkiyet \u00d6rg\u00fct\u00fc (WIPO), 2025 y\u0131l\u0131nda bu t\u00fcr olaylarda bir <a href=\"https:\/\/www.ashurst.com\/en\/insights\/a-rise-in-malicious-domain-name-activity\/\" target=\"_blank\" rel=\"noopener nofollow\">art\u0131\u015f<\/a> oldu\u011funu bildirdi. Teknoloji \u015firketleri ve t\u00fcketici markalar\u0131 en s\u0131k hedef al\u0131nanlar olsa da, genel olarak her \u00fclkedeki her sekt\u00f6r risk alt\u0131ndad\u0131r. De\u011fi\u015fen tek \u015fey, sahtekarlar\u0131n sahtecilik y\u00f6ntemlerini nas\u0131l kulland\u0131klar\u0131d\u0131r. Uygulamada, genellikle a\u015fa\u011f\u0131daki sald\u0131r\u0131 senaryolar\u0131yla kar\u015f\u0131la\u015f\u0131r\u0131z:<\/p>\n<ul>\n<li><strong>M\u00fc\u015fterileri ve t\u00fcketicileri sahte bir web sitesine \u00e7ekerek<\/strong> ger\u00e7ek \u00e7evrimi\u00e7i ma\u011fazan\u0131n giri\u015f bilgilerini toplamak veya do\u011frudan h\u0131rs\u0131zl\u0131k amac\u0131yla \u00f6deme bilgileri dahil t\u00fcm ayr\u0131nt\u0131lar\u0131 \u00e7almak.<\/li>\n<li><strong>\u00c7al\u0131\u015fanlar\u0131 ve i\u015f ortaklar\u0131n\u0131 sahte bir kurumsal oturum a\u00e7ma portal\u0131na \u00e7ekerek<\/strong>, kurumsal a\u011fa s\u0131zmak i\u00e7in yasal kimlik bilgilerini ele ge\u00e7irmek.<\/li>\n<li><strong>M\u00fc\u015fterileri ve t\u00fcketicileri \u00e7e\u015fitli bahanelerle doland\u0131r\u0131c\u0131larla ileti\u015fime ge\u00e7meye te\u015fvik etmek<\/strong>; teknik destek almak, geri \u00f6deme i\u015flemek, \u00f6d\u00fcl \u00e7ekili\u015fine kat\u0131lmak veya markay\u0131 ilgilendiren kamuya a\u00e7\u0131k etkinlikler i\u00e7in tazminat talep etmek. Buradaki ama\u00e7, kurbanlar\u0131 kand\u0131rarak onlardan m\u00fcmk\u00fcn oldu\u011funca fazla para almakt\u0131r.<\/li>\n<li><strong>\u0130\u015f ortaklar\u0131n\u0131 ve \u00e7al\u0131\u015fanlar\u0131, \u015firket i\u00e7i sistemleri taklit eden \u00f6zel olarak tasarlanm\u0131\u015f sayfalara \u00e7ekerek<\/strong>, bir \u00f6demeyi onaylamalar\u0131n\u0131 veya yasal bir \u00f6demeyi doland\u0131r\u0131c\u0131lar\u0131n hesab\u0131na y\u00f6nlendirmelerini sa\u011flamak.<\/li>\n<li><strong>M\u00fc\u015fterileri, i\u015f ortaklar\u0131n\u0131 ve \u00e7al\u0131\u015fanlar\u0131<\/strong>, sahte bir \u015firketin web sitesinden <a href=\"https:\/\/www.kaspersky.com\/blog\/infostealers-targeted-attacks-business\/52772\/\" target=\"_blank\" rel=\"noopener nofollow\">kurumsal yaz\u0131l\u0131m gibi g\u00f6r\u00fcnen<\/a> bilgi h\u0131rs\u0131z\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 indirmeleri i\u00e7in te\u015fvik etmek.<\/li>\n<\/ul>\n<p>Burada \u201c\u00e7ekmek\u201d ve \u201cte\u015fvik etmek\u201d kelimeleri; e-posta, sohbet uygulamalar\u0131ndaki mesajlar, resmi reklamlara benzeyen sosyal medya g\u00f6nderileri, SEO ara\u00e7lar\u0131yla tan\u0131t\u0131lan benzer web siteleri ve hatta \u00fccretli reklamlar gibi bir dizi takti\u011fi ifade etmektedir.<\/p>\n<p>Bu planlar\u0131n hepsi iki ortak \u00f6zelli\u011fi payla\u015fmaktad\u0131r. \u0130lk olarak, sald\u0131rganlar kurulu\u015fun markas\u0131n\u0131 kullan\u0131r ve resmi web sitesini, alan ad\u0131n\u0131 ve e-postalar\u0131n, reklamlar\u0131n ve sosyal medya g\u00f6nderilerinin kurumsal stilini taklit etmeye \u00e7al\u0131\u015f\u0131rlar. Sahtekarl\u0131k kusursuz olmak zorunda de\u011fildir; en az\u0131ndan baz\u0131 i\u015f ortaklar\u0131 ve m\u00fc\u015fterileri ikna edecek kadar inand\u0131r\u0131c\u0131 olmas\u0131 yeterlidir. \u0130kincisi, kurulu\u015f ve \u00e7evrimi\u00e7i kaynaklar\u0131 do\u011frudan hedef al\u0131nmasa da, bunlar \u00fczerindeki etki yine de \u00f6nemlidir.<\/p>\n<h2>Marka kimli\u011fi taklidi nedeniyle olu\u015fan ticari zarar<\/h2>\n<p>Sahtecilik \u00e7al\u0131\u015fanlar\u0131 hedef almak i\u00e7in yap\u0131ld\u0131\u011f\u0131nda, sald\u0131r\u0131 do\u011frudan maddi kayba yol a\u00e7abilir. Bir \u00e7al\u0131\u015fan, \u015firket fonlar\u0131n\u0131 transfer etmeye ikna edilebilir veya kimlik bilgileri, gizli bilgileri \u00e7almak veya fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 ba\u015flatmak i\u00e7in kullan\u0131labilir.<\/p>\n<p>M\u00fc\u015fterilere y\u00f6nelik sald\u0131r\u0131lar genellikle \u015firketin kasas\u0131na do\u011frudan zarar vermez, ancak a\u015fa\u011f\u0131daki alanlarda \u00f6nemli dolayl\u0131 zararlar yarat\u0131r:<\/p>\n<ul>\n<li><strong>M\u00fc\u015fteri deste\u011fi \u00fczerindeki bask\u0131:<\/strong> Sahte bir siteden \u00fcr\u00fcn \u201csat\u0131n alan\u201d m\u00fc\u015fteriler, sorunlar\u0131n\u0131 ger\u00e7ek m\u00fc\u015fteri destek ekibine ileteceklerdir. Onlar\u0131 asl\u0131nda hi\u00e7bir sipari\u015f vermediklerine ikna etmek zordur, bu da her bir vakan\u0131n birden fazla destek temsilcisi i\u00e7in b\u00fcy\u00fck bir zaman kayb\u0131 anlam\u0131na gelir.<\/li>\n<li><strong>\u0130tibar kayb\u0131: <\/strong>Doland\u0131r\u0131lan m\u00fc\u015fteriler genellikle markay\u0131 kendilerini doland\u0131r\u0131c\u0131l\u0131ktan korumad\u0131\u011f\u0131 i\u00e7in su\u00e7lar ve tazminat beklerler. Avrupa\u2019da yap\u0131lan bir ankete g\u00f6re, <a href=\"https:\/\/www.techmonitor.ai\/technology\/cybersecurity\/phishing-scams-can-destroy-consumer-trust\" target=\"_blank\" rel=\"noopener nofollow\">etkilenen al\u0131c\u0131lar\u0131n yakla\u015f\u0131k yar\u0131s\u0131 tazminat beklemektedir<\/a> ve \u015firketin hizmetlerini kullanmay\u0131 b\u0131rakabilir; di\u011fer taraftan \u00e7o\u011fu zaman olumsuz deneyimlerini sosyal medyada payla\u015f\u0131rlar. Bu, kurbanlar aras\u0131nda kamuoyunda tan\u0131nm\u0131\u015f ki\u015filer veya geni\u015f bir takip\u00e7i kitlesine sahip ki\u015filer varsa \u00f6zellikle zarar vericidir.<\/li>\n<li><strong>Planlanmam\u0131\u015f yan\u0131t maliyetleri<\/strong>: Sald\u0131r\u0131n\u0131n \u00f6zelliklerine ve \u00f6l\u00e7e\u011fine ba\u011fl\u0131 olarak, etkilenen \u015firketin <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/incident-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">dijital adli t\u0131p ve olay m\u00fcdahale (DFIR) hizmetlerinin<\/a> yan\u0131 s\u0131ra t\u00fcketici hukuku, fikri m\u00fclkiyet, siber g\u00fcvenlik ve kriz ileti\u015fimi y\u00f6netimi konusunda uzman dan\u0131\u015fmanlara ihtiyac\u0131 olabilir.<\/li>\n<li><strong>Artan sigorta primleri:<\/strong> Siber olaylara kar\u015f\u0131 i\u015fletmeleri sigortalayan \u015firketler, marka taklit\u00e7ili\u011finin yol a\u00e7t\u0131\u011f\u0131 olumsuz etkileri de hesaba katmaktad\u0131r. Artan risk profili, bir i\u015fletme i\u00e7in daha y\u00fcksek prim olarak yans\u0131t\u0131labilir.<\/li>\n<li><strong>Web sitesi performans\u0131n\u0131n d\u00fc\u015fmesi ve reklam maliyetlerinin artmas\u0131: <\/strong>Su\u00e7lular bir markan\u0131n ad\u0131n\u0131 kullanarak \u00fccretli reklamlar yay\u0131nlarsa, resmi sitesinden trafi\u011fi ba\u015fka yerlere y\u00f6nlendirirler. Ayr\u0131ca bir \u015firket, sitesinin reklam\u0131n\u0131 yapmak i\u00e7in \u00f6deme yaparsa, rekabetin artmas\u0131 nedeniyle t\u0131klama ba\u015f\u0131na maliyet y\u00fckselir. Bu, \u00e7evrimi\u00e7i hizmetler satan BT \u015firketleri i\u00e7in \u00f6zellikle ciddi bir sorundur, ancak perakende markalar\u0131 i\u00e7in de ge\u00e7erlidir.<\/li>\n<li><strong>Uzun vadeli metrik d\u00fc\u015f\u00fc\u015f\u00fc<\/strong>: Buna sat\u0131\u015f hacmindeki, pazar pay\u0131ndaki ve piyasa de\u011ferindeki d\u00fc\u015f\u00fc\u015fler dahildir. Bunlar\u0131n hepsi, b\u00fcy\u00fck olaylar\u0131n ard\u0131ndan m\u00fc\u015fteriler ve i\u015f ortaklar\u0131n\u0131n g\u00fcvenini kaybetmenin sonu\u00e7lar\u0131d\u0131r.<\/li>\n<\/ul>\n<h2>Sigorta hasar\u0131 kar\u015f\u0131lar m\u0131?<\/h2>\n<p>Pop\u00fcler siber risk sigorta poli\u00e7eleri genellikle poli\u00e7ede a\u00e7\u0131k\u00e7a tan\u0131mlanan; veri kayb\u0131, i\u015f kesintisi, BT sistemi g\u00fcvenli\u011finin ihlali gibi olaylarla do\u011frudan ba\u011flant\u0131l\u0131 maliyetleri kapsar. Sahte alan adlar\u0131 ve web sayfalar\u0131, \u015firketlerin BT sistemlerine do\u011frudan zarar vermezler, bu nedenle genellikle standart sigorta kapsam\u0131na girmezler. \u0130tibar kayb\u0131 ve kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 eylemleri ayr\u0131 sigorta riskleridir ve bu senaryo i\u00e7in \u00f6zel olarak geni\u015fletilmi\u015f teminat gerektirir.<\/p>\n<p>Standart bir sigorta, yukar\u0131da listeledi\u011fimiz dolayl\u0131 kay\u0131plardan, DFIR masraflar\u0131n\u0131 ve baz\u0131 durumlarda ekstra m\u00fc\u015fteri destek masraflar\u0131n\u0131 (durum sigortal\u0131 bir olay olarak kabul edilirse) kar\u015f\u0131layabilir. Ancak g\u00f6n\u00fcll\u00fc m\u00fc\u015fteri geri \u00f6demeleri, sat\u0131\u015f kay\u0131plar\u0131 ve itibar kayb\u0131 neredeyse kesinlikle kapsam d\u0131\u015f\u0131d\u0131r.<\/p>\n<h2>\u015eirketiniz klonlar taraf\u0131ndan sald\u0131r\u0131ya u\u011frad\u0131\u011f\u0131nda ne yapmal\u0131s\u0131n\u0131z?<\/h2>\n<p>Birinin markan\u0131z\u0131n ad\u0131n\u0131 doland\u0131r\u0131c\u0131l\u0131k amac\u0131yla kulland\u0131\u011f\u0131n\u0131 fark ederseniz, a\u015fa\u011f\u0131dakileri yapman\u0131z mant\u0131kl\u0131 olacakt\u0131r:<\/p>\n<ul>\n<li>M\u00fc\u015fterilerinize neler oldu\u011funu, hangi \u00f6nlemlerin al\u0131nd\u0131\u011f\u0131n\u0131 ve resmi web sitelerinin, e-postalar\u0131n ve di\u011fer ileti\u015fim kanallar\u0131n\u0131n ger\u00e7ekli\u011fini nas\u0131l do\u011frulayabileceklerini a\u00e7\u0131klayan a\u00e7\u0131k ve net bildirimler g\u00f6nderin.<\/li>\n<li>Resmi alan adlar\u0131n\u0131z\u0131, sosyal medya hesaplar\u0131n\u0131z\u0131, uygulama ma\u011fazas\u0131 ba\u011flant\u0131lar\u0131n\u0131z\u0131 ve destek ileti\u015fim bilgilerinizi listeleyen basit bir \u201cg\u00fcven merkezi\u201d sayfas\u0131 olu\u015fturun. Kolay bulunabilir olmas\u0131n\u0131 ve g\u00fcncel kalmas\u0131n\u0131 sa\u011flay\u0131n.<\/li>\n<li>Sald\u0131r\u0131 ba\u015flamadan \u00f6nce, marka adlar\u0131n\u0131z\u0131 i\u00e7eren sosyal medya sayfalar\u0131n\u0131n ve alan adlar\u0131n\u0131n yeni kay\u0131tlar\u0131n\u0131 izleyerek klonlar\u0131 tespit edin.<\/li>\n<li>Bir kald\u0131rma prosed\u00fcr\u00fcn\u00fc izleyin. Bu; kan\u0131t toplaman\u0131n yan\u0131 s\u0131ra alan ad\u0131 kay\u0131t kurulu\u015flar\u0131na, bar\u0131nd\u0131rma sa\u011flay\u0131c\u0131lar\u0131na ve sosyal medya y\u00f6neticilerine \u015fikayette bulunmay\u0131 ve sahte i\u00e7erikler tamamen kald\u0131r\u0131lana kadar durumun takibini i\u00e7erir. \u0130hlallerin eksiksiz ve do\u011fru bir kayd\u0131n\u0131 tutmak i\u00e7in URL\u2019leri, ekran g\u00f6r\u00fcnt\u00fclerini, meta verileri ve ihlalin ke\u015ffedildi\u011fi tarih ve saati saklay\u0131n. \u0130deal olarak, sahte sayfalar\u0131n kaynak kodunu da inceleyin, \u00e7\u00fcnk\u00fc bu kodda su\u00e7 operasyonunun di\u011fer bile\u015fenlerine i\u015faret eden ipu\u00e7lar\u0131 bulunabilir.<\/li>\n<li>\u015e\u00fcpheli siteler veya mesajlar i\u00e7in basit bir m\u00fc\u015fteri bildirim formunu resmi web sitenize ve\/veya markal\u0131 uygulaman\u0131za ekleyin. Bu, sorunlar\u0131 erken a\u015famada \u00f6\u011frenmenize yard\u0131mc\u0131 olur.<\/li>\n<li>Hukuk, siber g\u00fcvenlik ve pazarlama ekipleriniz aras\u0131ndaki faaliyetleri koordine edin. Bu; tutarl\u0131, birle\u015fik ve etkili bir yan\u0131t\u0131 garanti eder.<\/li>\n<\/ul>\n<h2>Marka kimli\u011fine b\u00fcr\u00fcnme sald\u0131r\u0131lar\u0131na kar\u015f\u0131 nas\u0131l savunma yap\u0131l\u0131r?<\/h2>\n<p>\u0130nternetin a\u00e7\u0131k yap\u0131s\u0131 ve bu sald\u0131r\u0131lar\u0131n \u00f6zellikleri nedeniyle bunlar\u0131 tamamen \u00f6nlemek imkans\u0131z olsa da, i\u015fletmeler yeni sahtecilik giri\u015fimlerini takip edebilir ve bunlara kar\u015f\u0131 m\u00fccadele etmek i\u00e7in gerekli ara\u00e7lar\u0131 haz\u0131rlayabilir.<\/p>\n<ul>\n<li>\u00d6zel izleme hizmetlerini kullanarak \u015f\u00fcpheli faaliyetleri s\u00fcrekli olarak takip edin. En bariz g\u00f6sterge, marka ad\u0131n\u0131za benzer alan adlar\u0131n\u0131n tescil edilmesidir, ancak bunun d\u0131\u015f\u0131nda ba\u015fka g\u00f6stergeler de vard\u0131r; \u00f6rne\u011fin, birisinin karanl\u0131k web\u2019de kurulu\u015funuzla ilgili veri tabanlar\u0131n\u0131 sat\u0131n almas\u0131 gibi. T\u00fcm platformlar\u0131n kapsaml\u0131 izlenmesi, <a href=\"https:\/\/dfi.kaspersky.com\/tr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Digital Footprint Intelligence (DFI)<\/a>\u00a0gibi uzman bir hizmet sa\u011flay\u0131c\u0131s\u0131na yapt\u0131r\u0131lmas\u0131 en iyisidir.<\/li>\n<li>Sahte bir web sitesini veya sosyal medya profilini kald\u0131rman\u0131n en h\u0131zl\u0131 ve en basit yolu, ticari marka ihlali \u015fikayeti yapmakt\u0131r. Kay\u0131tl\u0131 ticari marka portf\u00f6y\u00fcn\u00fcz\u00fcn, ihtiya\u00e7 duydu\u011funuzda <a href=\"https:\/\/tr.wikipedia.org\/wiki\/UDRP\" target=\"_blank\" rel=\"noopener nofollow\">UDRP<\/a> prosed\u00fcrleri kapsam\u0131nda \u015fikayette bulunmak i\u00e7in yeterince sa\u011flam oldu\u011fundan emin olun.<\/li>\n<li>Sahte i\u00e7erikleri tespit etti\u011finizde, sahte alan adlar\u0131n\u0131n aktar\u0131lmas\u0131 veya kald\u0131r\u0131lmas\u0131 i\u00e7in derhal UDRP prosed\u00fcrlerini uygulay\u0131n. Sosyal medya i\u00e7in, platformun \u00f6zel ihlal prosed\u00fcr\u00fcn\u00fc izleyin: \u201c[social media name] marka ihlali\u201d (\u00f6rne\u011fin, \u201c<a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/a1337296\" target=\"_blank\" rel=\"noopener nofollow\">LinkedIn<\/a> marka ihlali\u201d) aramas\u0131 yaparak kolayca bulabilirsiniz. Etki alan\u0131n\u0131 yasal sahibine devretmek, silmekten daha tercih edilir, \u00e7\u00fcnk\u00fc bu \u015fekilde doland\u0131r\u0131c\u0131lar\u0131n etki alan\u0131n\u0131 yeniden kaydetmesi engellenir. <a href=\"https:\/\/dfi.kaspersky.com\/tr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Digital Footprint Intelligence<\/a>\u00a0gibi bir\u00e7ok s\u00fcrekli izleme hizmeti, korunan marka ad\u0131na \u015fikayette bulunarak h\u0131zl\u0131 kald\u0131rma hizmeti de sunmaktad\u0131r.<\/li>\n<li>Kurumsal sistemlerinizde sahte alan adlar\u0131n\u0131 engellemek i\u00e7in h\u0131zl\u0131ca harekete ge\u00e7in. Bu, i\u015f ortaklar\u0131n\u0131z\u0131 veya m\u00fc\u015fterilerinizi korumayacakt\u0131r, ancak kendi \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 hedef alan sald\u0131r\u0131lara engel olacakt\u0131r.<\/li>\n<li>\u015eirketinizin web sitesi ad\u0131n\u0131 ve yayg\u0131n varyasyonlar\u0131n\u0131 (\u00f6rne\u011fin, tireli ve tirsiz) .com gibi t\u00fcm \u00f6nemli \u00fcst d\u00fczey alan adlar\u0131nda ve yerel uzant\u0131larda proaktif olarak kaydettirmeyi d\u00fc\u015f\u00fcn\u00fcn. Bu, i\u015f ortaklar\u0131n\u0131 ve m\u00fc\u015fterileri yayg\u0131n yaz\u0131m hatalar\u0131ndan ve basit taklit sitelerden korumaya yard\u0131mc\u0131 olur.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"11732\">\n","protected":false},"excerpt":{"rendered":"<p>Doland\u0131r\u0131c\u0131lar; m\u00fc\u015fterilerinize, i\u015f ortaklar\u0131n\u0131za ve \u00e7al\u0131\u015fanlar\u0131n\u0131za sald\u0131rmak i\u00e7in markan\u0131z\u0131 taklit ediyor. Klonlar\u0131n sald\u0131r\u0131s\u0131n\u0131 nas\u0131l tespit eder ve durdurursunuz?<\/p>\n","protected":false},"author":2722,"featured_media":14185,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2840,1921,2841,519,1274,1074,2842,791,901,537,2717],"class_list":{"0":"post-14184","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-dfi","10":"tag-e-posta","11":"tag-e-posta-kampanyalari","12":"tag-ipuclari-2","13":"tag-is","14":"tag-kimlik-avi","15":"tag-kotu-amacli-reklam","16":"tag-reklam","17":"tag-riskler","18":"tag-tehditler","19":"tag-web-siteleri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/14184\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/30088\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/25151\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/29967\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/28887\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/31768\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/30397\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/41148\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/55142\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/24653\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/33095\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/brand-impersonation-spoofed-websites-risk-mitigation\/30161\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/35852\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/brand-impersonation-spoofed-websites-risk-mitigation\/35507\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tehditler\/","name":"tehditler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14184"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14184\/revisions"}],"predecessor-version":[{"id":14190,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14184\/revisions\/14190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14185"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}