{"id":3151,"date":"2017-04-28T02:47:20","date_gmt":"2017-04-28T06:47:20","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=3151"},"modified":"2019-11-15T14:51:34","modified_gmt":"2019-11-15T11:51:34","slug":"sas-2017-best-tweets","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/sas-2017-best-tweets\/3151\/","title":{"rendered":"10 tweet ile #TheSAS2017&#8217;nin \u00f6zeti"},"content":{"rendered":"<p>E\u011fer blo\u011fumuzu d\u00fczenli olarak takip ediyorsan\u0131z her y\u0131l GReAT ekimiz (Global Research and Analysis Team) taraf\u0131ndan d\u00fczenlenen etkinli\u011fimiz olan SAS\u2019a (Security Analyst Summit) verdi\u011fimiz \u00f6nemi <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/sas-2017\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">bilirsiniz<\/a>. Ekibimiz her y\u0131l bu e\u015fsiz etkinlik i\u00e7in sekt\u00f6r\u00fcm\u00fczden en iyi ara\u015ft\u0131rmalar\u0131 se\u00e7iyorlar.<\/p>\n<p>Bu y\u0131l\u0131n etkinli\u011fi de gayet tatmin edici oldu. Ara\u015ft\u0131rmac\u0131lar sadece kendi d\u00fc\u015f\u00fcnd\u00fcklerini de\u011fil, tak\u0131l\u0131mc\u0131lara da sosyal medya arac\u0131l\u0131\u011f\u0131yla d\u00fc\u015f\u00fcnd\u00fcklerini s\u00f6ylettiler. Sosyal medya kanallar\u0131n\u0131 s\u00fcrekli kontrol eden biri olarak, kat\u0131l\u0131mc\u0131lar\u0131n ne kadar aktif olduklar\u0131n\u0131 ilk elden bizzat kendim g\u00f6rd\u00fcm. Tabi pop\u00fcler konu oldu\u011fu i\u00e7in ara ara botlarla gelen spam takip\u00e7i kasma siteleri de g\u00f6z\u00fcmden ka\u00e7mad\u0131.<\/p>\n<p>Bu dolu dolu ge\u00e7en etkinlik hakk\u0131nda uzun uzad\u0131ya blog yaz\u0131s\u0131 yazmaktansa \u00f6zet olabilecek on adet tweeti derlemenin daha iyi olaca\u011f\u0131n\u0131 d\u00fc\u015f\u00fcnd\u00fcm. Binlerce tweet aras\u0131ndan etkinli\u011fi \u00f6zetleyebilecek en iyi tweetleri se\u00e7tim.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3102\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2017\/04\/06013328\/what-is-sas-5.png\" alt=\"\" width=\"951\" height=\"341\"><\/p>\n<p>De\u011ferli takip\u00e7ilerimiz, #TheSAS2017 etiketinden siz de tweetlere g\u00f6z atabilir, bu listede olmas\u0131 gerekti\u011fini d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fcz tweetler varsa bize bildirebilirsiniz.<\/p>\n<p>https:\/\/twitter.com\/RidT\/status\/848932649460781058<\/p>\n<p>https:\/\/twitter.com\/k1k_\/status\/849300684327485441<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">This SWIFT malware used perfect English\u2026 but the \u00a9 and \u00ae symbols used for the Windows ident were the Korean Unicode versions. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a><\/p>\n<p>\u2014 Ryan Duff (@flyryan) <a href=\"https:\/\/twitter.com\/flyryan\/status\/848972425563750400?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 3, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">First rule of tracking Norks is if you are patient they will eventually use a DPRK IP address. <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/jRPfHpfb4o\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/jRPfHpfb4o<\/a><\/p>\n<p>\u2014 John Hultquist (@JohnHultquist) <a href=\"https:\/\/twitter.com\/JohnHultquist\/status\/848973846078271488?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 3, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How Pegasus (lawful intercept) gets installed on  iOS via multi-stage exploit chain. <a href=\"https:\/\/twitter.com\/ablaich?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@ablaich<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a> <a href=\"https:\/\/t.co\/vTv52gvxXC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/vTv52gvxXC<\/a><\/p>\n<p>\u2014 Chris Eng (@chriseng) <a href=\"https:\/\/twitter.com\/chriseng\/status\/849307660306567168?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 4, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Social engineering used against Israeli military \u2013 <a href=\"https:\/\/twitter.com\/IdoNaor1?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@IdoNaor1<\/a> 100+ soldiers infected with malware <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Israel?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Israel<\/a> <a href=\"https:\/\/t.co\/Ja0luLZYDl\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Ja0luLZYDl<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/849368309682360321?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 4, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Researcher found 40 zero-day vulns in Samsung's Tizen OS, which runs on millions of smartTVs\/phone \u2013 <a href=\"https:\/\/t.co\/nvdWJ1ctBG\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/nvdWJ1ctBG<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a><\/p>\n<p>\u2014 Kim Zetter (@KimZetter) <a href=\"https:\/\/twitter.com\/KimZetter\/status\/848893842002718721?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 3, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A Gift from GReAT: a bootleg CAM of <a href=\"https:\/\/twitter.com\/vkamluk?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@vkamluk<\/a>'s legendary <a href=\"https:\/\/twitter.com\/hashtag\/YARA?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#YARA<\/a> 20\u00d720 talk. Thank you all 4 making <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a> GReAT!<a href=\"https:\/\/t.co\/e2yqMglSVJ\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/e2yqMglSVJ<\/a><\/p>\n<p>\u2014 J. A. Guerrero-Saade (@juanandres_gs) <a href=\"https:\/\/twitter.com\/juanandres_gs\/status\/850350871951048704?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>https:\/\/twitter.com\/k8em0\/status\/849284404337930240<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Wanna know what you missed at <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2017?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2017<\/a>? Forget what you did? Here's the recap. Enjoy!<a href=\"https:\/\/t.co\/xW4lxJ8PEQ\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/xW4lxJ8PEQ<\/a><\/p>\n<p>\u2014 Brian Bartholomew (@Mao_Ware) <a href=\"https:\/\/twitter.com\/Mao_Ware\/status\/854365081005682694?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 18, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>E\u011fer blo\u011fumuzu d\u00fczenli olarak takip ediyorsan\u0131z her y\u0131l GReAT ekimiz (Global Research and Analysis Team) taraf\u0131ndan d\u00fczenlenen etkinli\u011fimiz olan SAS\u2019a (Security Analyst Summit) verdi\u011fimiz \u00f6nemi bilirsiniz. Ekibimiz her y\u0131l bu e\u015fsiz etkinlik i\u00e7in sekt\u00f6r\u00fcm\u00fczden en iyi ara\u015ft\u0131rmalar\u0131 se\u00e7iyorlar.<\/p>\n","protected":false},"author":636,"featured_media":3152,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1183,1213,337,1191,537,83],"class_list":{"0":"post-3151","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-thesas2017","9":"tag-etkinlik","10":"tag-sas","11":"tag-sas-2017","12":"tag-tehditler","13":"tag-twitter"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/sas-2017-best-tweets\/3151\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/sas-2017-best-tweets\/11060\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/sas-2017-best-tweets\/8667\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas-2017-best-tweets\/14726\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas-2017-best-tweets\/14726\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas-2017-best-tweets\/14726\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=3151"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3151\/revisions"}],"predecessor-version":[{"id":7064,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3151\/revisions\/7064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/3152"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=3151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=3151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=3151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}