{"id":5394,"date":"2018-11-14T18:54:30","date_gmt":"2018-11-14T15:54:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5394"},"modified":"2019-11-15T14:36:46","modified_gmt":"2019-11-15T11:36:46","slug":"five-most-notorious-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/five-most-notorious-cyberattacks\/5394\/","title":{"rendered":"Gelmi\u015f ge\u00e7mi\u015f en \u00fcnl\u00fc 5 siber sald\u0131r\u0131"},"content":{"rendered":"<p>Siber sald\u0131r\u0131lar\u0131n bir\u00e7o\u011fu olduk\u00e7a s\u0131radand\u0131r. En k\u00f6t\u00fc durumlarda kullan\u0131c\u0131 ekranda, bilgisayar\u0131n \u015fifrelenmi\u015f oldu\u011funu ve \u00f6deme yap\u0131ld\u0131ktan sonra a\u00e7\u0131labilece\u011fini bildiren bir fidye talebi g\u00f6r\u00fcr. Ancak bu sald\u0131r\u0131lar \u00e7o\u011fu zaman g\u00f6zle g\u00f6r\u00fcl\u00fcr bir \u015fekilde y\u00fcr\u00fct\u00fclmez; bir\u00e7ok k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fc, tespit edilene dek veri h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 en \u00fcst d\u00fczeye \u00e7\u0131karmak i\u00e7in m\u00fcmk\u00fcn oldu\u011funca gizli hareket eder.<\/p>\n<p>Fakat baz\u0131 siber sald\u0131r\u0131lar, \u00f6l\u00e7ekleri veya karma\u015f\u0131kl\u0131klar\u0131 ile dikkatleri \u00fczerine \u00e7eker. Bu yaz\u0131 son on y\u0131l\u0131n en dikkat \u00e7ekici ve en \u00fcnl\u00fc be\u015f siber sald\u0131r\u0131s\u0131na adanm\u0131\u015ft\u0131r.<\/p>\n<h2>WannaCry: Ger\u00e7ek bir salg\u0131n<\/h2>\n<p>WannaCry sald\u0131r\u0131s\u0131 genel olarak, bayt kelimesinin anlam\u0131n\u0131 bile bilmeyenler de dahil herkesin sistemine fidye yaz\u0131l\u0131m\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yerle\u015ftirmi\u015ftir. Shadow Brokers taraf\u0131ndan <a href=\"https:\/\/threatpost.com\/shadowbrokers-windows-zero-days-already-patched\/125009\/\" target=\"_blank\" rel=\"noopener nofollow\">halka a\u00e7\u0131k hale getirilen<\/a> Equation Group bilgisayar korsanl\u0131\u011f\u0131 ekibinin yetkisiz eri\u015fim program\u0131n\u0131 kullanan sald\u0131rganlar \u0130nternet ve yerel a\u011flar \u00fczerinden h\u0131zl\u0131ca yay\u0131labilen bir fidye yaz\u0131l\u0131m\u0131 \u015fifreleyicisi yaratarak \u00e7irkin bir olaya imza atm\u0131\u015ft\u0131r.<\/p>\n<p>D\u00f6rt g\u00fcn s\u00fcren WannaCry salg\u0131n\u0131 150 \u00fclkede 200.000\u2019den fazla bilgisayara bula\u015fm\u0131\u015ft\u0131r. Bu sald\u0131r\u0131, \u00f6nemli bir altyap\u0131ya i\u015faret etmekteydi: Wannacry baz\u0131 hastanelerde t\u0131bbi cihazlar da dahil olmak \u00fczere t\u00fcm cihazlar\u0131 \u015fifrelemi\u015f ve baz\u0131 fabrikalar \u00fcretimlerini durdurmaya zorlanm\u0131\u015ft\u0131r. Son sald\u0131r\u0131lar aras\u0131ndaki en geni\u015f kapsaml\u0131 sald\u0131r\u0131 WannaCry\u2019d\u0131r.<\/p>\n<p><em>WannaCry hakk\u0131nda daha fazla bilgi i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-ransomware\/3181\/\" target=\"_blank\" rel=\"noopener\">buraya<\/a>; salg\u0131n\u0131n i\u015fletmeler a\u00e7\u0131s\u0131ndan etkileri i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-for-b2b\/3191\/\" target=\"_blank\" rel=\"noopener\">buraya<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-and-embedded\/16604\/\" target=\"_blank\" rel=\"noopener nofollow\">buraya<\/a> bak\u0131n. Bu arada, Wannacry hala buralarda bir yerlerde, d\u00fcnya \u00fczerindeki bilgisayarlar\u0131 tehlikeye atmaktad\u0131r. Olas\u0131 tehlikelerden korunmak ad\u0131na Windows\u2019u nas\u0131l yap\u0131land\u0131rman\u0131z gerekti\u011fini \u00f6\u011frenmek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-windows-update\/3218\/\" target=\"_blank\" rel=\"noopener\">bu yaz\u0131y\u0131 okuyun<\/a>.<\/em><\/p>\n<h2>NotPetya\/ExPetr: Gelmi\u015f ge\u00e7mi\u015f en maliyetli siber sald\u0131r\u0131<\/h2>\n<p>Bununla birlikte, en maliyetli salg\u0131n unvan\u0131 WannaCry\u2019a de\u011fil, ba\u015fka bir fidye yaz\u0131l\u0131m\u0131 \u015fifreleyicisi olan (teknik olarak bir silici, ancak bu sonucu de\u011fi\u015ftirmez) ve ayn\u0131 zamanda NotPetya olarak da bilinen ExPetr\u2019e ait. \u00c7al\u0131\u015fma prensibi WannaCry ile ayn\u0131yd\u0131: EternalBlue ve EtrernalRomance yetkisiz eri\u015fim programlar\u0131n\u0131 kullanan bu solucan, A\u011f\u2019da gezinerek \u00f6n\u00fcne \u00e7\u0131kan her \u015feyi geri d\u00f6n\u00fclemez bir \u015fekilde \u015fifreliyordu.<\/p>\n<p>Bula\u015ft\u0131\u011f\u0131 toplam bilgisayar say\u0131s\u0131 daha az olmas\u0131na ra\u011fmen NotPetya salg\u0131n\u0131, k\u0131smen, ilk yay\u0131lan vekt\u00f6rler MeDoc finansal yaz\u0131l\u0131m\u0131 i\u00e7erisinden ilerledi\u011fi i\u00e7in temel olarak i\u015fletmeleri hedef alm\u0131\u015ft\u0131r. Siber su\u00e7lular MeDoc g\u00fcncelleme sunucusu \u00fczerinde kontrol\u00fc ele alarak yaz\u0131l\u0131m\u0131 kullanan bir\u00e7ok m\u00fc\u015fterinin bir g\u00fcncelleme olarak maskelenmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 kabul etmesine ve sonras\u0131nda yaz\u0131l\u0131m\u0131n a\u011fda yay\u0131lmas\u0131na neden olmu\u015ftur.<\/p>\n<p>NotPetya siber sald\u0131r\u0131s\u0131n\u0131n neden oldu\u011fu zarar\u0131n <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener nofollow\">10 milyar dolar oldu\u011fu tahmin edilirken<\/a>, WannaCry\u2019in neden oldu\u011fu zarar\u0131n ise \u00e7e\u015fitli tahminlere g\u00f6re, 4 ila 8 milyar dolarl\u0131k bir aral\u0131kta oldu\u011fu bilinmektedir. NotPetya tarihteki en maliyetli k\u00fcresel siber sald\u0131r\u0131 olarak kabul edilir. E\u011fer bu rekor bir g\u00fcn k\u0131r\u0131lacaksa, o g\u00fcn\u00fcn yak\u0131n bir zamanda olmamas\u0131n\u0131 dileyelim.<\/p>\n<p><em>NotPetya\/ExPetr salg\u0131n\u0131 hakk\u0131nda daha fazla bilgi i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/new-ransomware-epidemics\/3319\/\" target=\"_blank\" rel=\"noopener\">buraya<\/a>; i\u015fletmelere mal etti\u011fi zararlara ili\u015fkin detaylar i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/expetr-for-b2b\/3342\/\" target=\"_blank\" rel=\"noopener\">buraya<\/a>; b\u00fcy\u00fck i\u015fletmeleri devre d\u0131\u015f\u0131 b\u0131rakabilen salg\u0131n\u0131n neden yaln\u0131zca bilgisayarlar\u0131na salg\u0131n bula\u015fan insanlar\u0131 de\u011fil, herkesi etkiledi\u011fini g\u00f6rmek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/expetr-for-everyone\/3348\/\" target=\"_blank\" rel=\"noopener\">buraya<\/a> bakabilirsiniz.<\/em><\/p>\n<h2>Stuxnet: Duman\u0131 t\u00fcten bir siber tabanca<\/h2>\n<p>Muhtemelen en \u00fcnl\u00fc sald\u0131r\u0131, \u0130ran\u2019da uranyum zenginle\u015ftirme santrif\u00fcjlerini engelleyen ve \u00fclkenin n\u00fckleer program\u0131n\u0131 birka\u00e7 y\u0131l yava\u015flatan karma\u015f\u0131k, \u00e7ok y\u00f6nl\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. End\u00fcstriyel sistemlere kar\u015f\u0131 siber silahlar\u0131n kullan\u0131lmas\u0131 hakk\u0131nda ilk kez konu\u015fan Stuxnet olmu\u015ftu.<\/p>\n<p>O zamanlarda karma\u015f\u0131kl\u0131k ya da kurnazl\u0131k konusunda hi\u00e7bir \u015fey Stuxnet ile boy \u00f6l\u00e7\u00fc\u015femezdi; solucan, \u0130nternete ya da yerel bir a\u011fa ba\u011fl\u0131 olmayan bilgisayarlara bile girebilecek \u015fekilde USB flash diskler \u00fczerinden fark edilmeden yay\u0131labiliyordu.<\/p>\n<p>Solucan kontrolden \u00e7\u0131kt\u0131 ve y\u00fcz binlerce bilgisayara bula\u015farak d\u00fcnya \u00e7ap\u0131nda h\u0131zla \u00e7o\u011fald\u0131. Ancak bu solucan bilgisayarlara zarar veremezdi; \u00f6zel bir g\u00f6rev i\u00e7in yarat\u0131lm\u0131\u015ft\u0131. Solucan yaln\u0131zca Siemens programlanabilir denetleyiciler ve yaz\u0131l\u0131mlar taraf\u0131ndan i\u015fletilen bilgisayarlar \u00fczerinde kendini g\u00f6steriyordu. B\u00f6yle bir bilgisayara girdi\u011finde bu denetleyicileri yeniden programl\u0131yordu. Daha sonra, uranyum zenginle\u015ftirme santrif\u00fcjlerinin d\u00f6n\u00fc\u015f h\u0131z\u0131n\u0131 olduk\u00e7a y\u00fcksek bir seviyeye ayarlayarak bu santrif\u00fcjleri fiziksel olarak yok ediyordu.<\/p>\n<p><em><a href=\"https:\/\/www.amazon.com\/Countdown-Zero-Day-Stuxnet-Digital\/dp\/0770436196\/\" target=\"_blank\" rel=\"noopener nofollow\">Bir kitap da dahil<\/a> olmak \u00fczere Stuxnet \u00fczerine \u00e7ok \u015feyler yaz\u0131lm\u0131\u015ft\u0131r, ancak solucan\u0131n nas\u0131l yay\u0131ld\u0131\u011f\u0131 ve nereye bula\u015ft\u0131\u011f\u0131 ile ilgili genel bir bilgi i\u00e7in <a href=\"https:\/\/www.kaspersky.com\/blog\/stuxnet-victims-zero\/6775\/\" target=\"_blank\" rel=\"noopener nofollow\">bu yaz\u0131<\/a> yeterli olacakt\u0131r.<\/em><\/p>\n<h2>DarkHotel: S\u00fcit odalardaki casuslar<\/h2>\n<p>Kafe veya havalimanlar\u0131ndaki halka a\u00e7\u0131k Wi-Fi a\u011flar\u0131n\u0131n \u00e7ok g\u00fcvenli olmad\u0131\u011f\u0131 bir s\u0131r de\u011fildir. Ancak bir\u00e7ok insan otellerde ko\u015fullar\u0131n daha iyi olmas\u0131 gerekti\u011fine inan\u0131yor. Bir otelin a\u011f\u0131 halka a\u00e7\u0131k olsa bile, en az\u0131ndan bir \u00e7e\u015fit yetkilendirme gereklidir.<\/p>\n<p>Bu yanl\u0131\u015f d\u00fc\u015f\u00fcnceler baz\u0131 \u00fcst d\u00fczey m\u00fcd\u00fcr ve \u00e7al\u0131\u015fanlara pahal\u0131ya mal olmu\u015ftur. Bir otel a\u011f\u0131na ba\u011flan\u0131rken, pop\u00fcler bir yaz\u0131l\u0131m i\u00e7in g\u00f6r\u00fcn\u00fc\u015fte yasal bir g\u00fcncelleme y\u00fcklemeye y\u00f6nlendirilmi\u015fler ve hemen sonras\u0131nda cihazlar\u0131na, sald\u0131rganlar\u0131n misafirlerin otelde konaklamalar\u0131ndan birka\u00e7 g\u00fcn \u00f6nce a\u011fa yerle\u015ftirdikleri ve birka\u00e7 g\u00fcn sonras\u0131nda kald\u0131rd\u0131klar\u0131 DarkHotel casus yaz\u0131l\u0131m\u0131 bula\u015fm\u0131\u015ft\u0131. Gizli casus, yaz\u0131l\u0131m tu\u015f vuru\u015flar\u0131n\u0131 kaydetmi\u015f ve siber su\u00e7lular\u0131n hedefli doland\u0131r\u0131c\u0131l\u0131k sald\u0131r\u0131lar\u0131 yapmalar\u0131na imkan sa\u011flam\u0131\u015ft\u0131r.<\/p>\n<p><em>DarkHotel enfeksiyonu ve sonu\u00e7lar\u0131 ile ilgili daha fazla bilgiye <a href=\"https:\/\/www.kaspersky.com\/blog\/darkhotel-apt\/6613\/\" target=\"_blank\" rel=\"noopener nofollow\">buradan<\/a> ula\u015fabilirsiniz.<\/em><\/p>\n<h2>Mirai: \u0130nternetin d\u00fc\u015f\u00fc\u015f\u00fc<\/h2>\n<p>Botnetler uzun zamand\u0131r etraf\u0131m\u0131zda, ancak Nesnelerin \u0130nterneti\u2019nin ortaya \u00e7\u0131kmas\u0131 Botnetlere yeni bir soluk getirmi\u015ftir. Daha \u00f6nce g\u00fcvenli\u011fi hi\u00e7 d\u00fc\u015f\u00fcn\u00fclmemi\u015f olan ve i\u00e7erisinde hi\u00e7bir antivir\u00fcs program\u0131 bulunmayan cihazlara bir anda b\u00fcy\u00fck \u00f6l\u00e7ekte vir\u00fcs bula\u015fmaya ba\u015flam\u0131\u015ft\u0131r. Daha sonra bu cihazlar, kendi t\u00fcrlerindeki cihazlar\u0131 takip ederek vir\u00fcs\u00fc bula\u015ft\u0131rmaya devam etmi\u015ftir. Romantik bir bi\u00e7imde Japonca\u2019da \u201cgelecek\u201d anlam\u0131na gelen Mirai olarak adland\u0131r\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131m \u00fczerinden kurulan bu zombi donanma, talimatlar\u0131 beklerken b\u00fcy\u00fcd\u00fck\u00e7e b\u00fcy\u00fcm\u00fc\u015f;<\/p>\n<p>21 Ekim 2016\u2019da, bu dev zombi a\u011f\u0131n\u0131n sahipleri yeteneklerini test etmeye karar vermi\u015f ve milyonlarca dijital video kaydedici, y\u00f6nlendirici, IP kameras\u0131 ve di\u011fer \u201cak\u0131ll\u0131\u201d cihazlar\u0131n DNS servis sa\u011flay\u0131c\u0131s\u0131 Dyn\u2019ye \u00e7ok say\u0131da talep g\u00f6ndermesine neden olmu\u015ftur.<\/p>\n<p>Dyn, bu kadar b\u00fcy\u00fck bir DDoS sald\u0131r\u0131s\u0131na dayanamam\u0131\u015f; DNS ve buna ba\u011fl\u0131 hizmetler kullan\u0131lmaz hale gelmi\u015ftir: PayPal, Twitter, Netflix, Spotify, PlayStation \u00e7evrimi\u00e7i hizmetleri ve ABD\u2019deki di\u011fer pek \u00e7ok ki\u015fi bu sald\u0131r\u0131dan etkilenmi\u015ftir. Sonu\u00e7 olarak Dyn toparlanm\u0131\u015f ancak Mirai sald\u0131r\u0131s\u0131n\u0131n b\u00fcy\u00fck \u00f6l\u00e7ekte olmas\u0131, d\u00fcnyay\u0131 \u201cak\u0131ll\u0131\u201d cihazlar\u0131n g\u00fcvenli\u011fi hakk\u0131nda oturup d\u00fc\u015f\u00fcnmeye y\u00f6neltmi\u015ftir. Bu sald\u0131r\u0131, uyar\u0131 alarmlar\u0131n\u0131n en ba\u015f\u0131nda gelmi\u015ftir.<\/p>\n<p><em>Mirai, Dyn ve \u201c\u0130nterneti iflas ettiren sald\u0131r\u0131\u201d hakk\u0131nda daha fazla bilgiye <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/\" target=\"_blank\" rel=\"noopener\">bu yaz\u0131dan<\/a> ula\u015fabilirsiniz.<\/em><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"gandalf30\">\n","protected":false},"excerpt":{"rendered":"<p>Siber sald\u0131r\u0131lar\u0131n bir\u00e7o\u011fu olduk\u00e7a s\u0131radand\u0131r. Ancak bu sald\u0131r\u0131lar \u00e7o\u011fu zaman g\u00f6zle g\u00f6r\u00fcl\u00fcr bir \u015fekilde y\u00fcr\u00fct\u00fclmez; bir\u00e7ok k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fc, tespit edilene dek veri h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 en \u00fcst d\u00fczeye \u00e7\u0131karmak i\u00e7in m\u00fcmk\u00fcn oldu\u011funca gizli hareket eder.<\/p>\n","protected":false},"author":696,"featured_media":5395,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[493,1757,392,980,1756,1033,1262,591,615,36,1758,1263,447,1109,1755,921,196,537,1227],"class_list":{"0":"post-5394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apt","9":"tag-ararli-yazilim","10":"tag-botnet","11":"tag-cryptor","12":"tag-darkhotel","13":"tag-ddos","14":"tag-expetr","15":"tag-fidye-yazilimi","16":"tag-hedefli-saldiri","17":"tag-malware-2","18":"tag-mirai","19":"tag-notpetya","20":"tag-ransomware","21":"tag-saldirilar","22":"tag-siber-silah","23":"tag-sifreleyici","24":"tag-stuxnet","25":"tag-tehditler","26":"tag-wannacry"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/five-most-notorious-cyberattacks\/5394\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/five-most-notorious-cyberattacks\/14716\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/13613\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/five-most-notorious-cyberattacks\/17277\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/five-most-notorious-cyberattacks\/16543\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/five-most-notorious-cyberattacks\/21607\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/24506\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/five-most-notorious-cyberattacks\/11130\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/five-most-notorious-cyberattacks\/11042\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/five-most-notorious-cyberattacks\/10015\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/five-most-notorious-cyberattacks\/18055\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/five-most-notorious-cyberattacks\/9965\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/five-most-notorious-cyberattacks\/21943\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/five-most-notorious-cyberattacks\/17566\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/saldirilar\/","name":"sald\u0131r\u0131lar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5394"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5394\/revisions"}],"predecessor-version":[{"id":6888,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5394\/revisions\/6888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5395"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}