{"id":9356,"date":"2021-02-22T13:40:09","date_gmt":"2021-02-22T10:40:09","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9356"},"modified":"2021-02-22T13:40:09","modified_gmt":"2021-02-22T10:40:09","slug":"ransomware-attack-what-to-do","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-attack-what-to-do\/9356\/","title":{"rendered":"Yoksa dosyalar\u0131n\u0131z m\u0131 \u015fifrelendi?"},"content":{"rendered":"<p>A\u011f\u0131n\u0131z\u0131, ger\u00e7ekle\u015fme ihtimali olan her tehditten koruma konusunda yazd\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/category\/threats\/\" target=\"_blank\" rel=\"noopener\">bin bir<\/a> yaz\u0131n\u0131n hepsini okudunuz diyelim. Ama bazen, t\u00fcm \u00f6nlemlere ra\u011fmen a\u011f\u0131n\u0131za vir\u00fcs bula\u015fabilir. Bu ya\u015fand\u0131\u011f\u0131nda ise yapman\u0131z gereken sakin olup h\u0131zl\u0131 ve kararl\u0131 hareket etmektir. Tepkiniz, ya\u015fanan olay\u0131n \u015firketiniz i\u00e7in \u00f6l\u00fcmc\u00fcl bir ba\u015f a\u011fr\u0131s\u0131na veya gurur duyaca\u011f\u0131n\u0131z bir ba\u015far\u0131ya d\u00f6n\u00fc\u015fmesinde etkili olacak.<\/p>\n<p>Kurtarma s\u00fcrecinde uygulanacak ad\u0131mlar\u0131 atarken hem \u00e7al\u0131\u015fanlar\u0131n hem de d\u0131\u015f d\u00fcnyan\u0131n g\u00f6z\u00fcnde \u015feffafl\u0131\u011f\u0131n\u0131z\u0131 korumak i\u00e7in t\u00fcm eylemlerinizi belgelendirmeyi unutmay\u0131n. Ayr\u0131ca ilerleyen zamanlarda sisteminizi hedef alabilecek ba\u015fka k\u00f6t\u00fc ama\u00e7l\u0131 ara\u00e7lar\u0131 tespit etme \u00e7al\u0131\u015fmalar\u0131n\u0131z i\u00e7in m\u00fcmk\u00fcn oldu\u011funca \u00e7ok kan\u0131t toplay\u0131n. Bunun i\u00e7in g\u00fcnl\u00fckleri ve sonraki ara\u015ft\u0131rmalarda faydal\u0131 olabilecek, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131ma ait di\u011fer izleri kaydetmeniz gerekir.<\/p>\n<h2>B\u00f6l\u00fcm bir: Bulun ve izole edin<\/h2>\n<p>Yapaca\u011f\u0131n\u0131z ilk \u015fey, sisteme yap\u0131lan izinsiz giri\u015f eyleminin kapsam\u0131n\u0131 belirlemektir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m a\u011f\u0131n tamam\u0131na yay\u0131lm\u0131\u015f m\u0131? Birden fazla ofise ula\u015fm\u0131\u015f m\u0131?<\/p>\n<p>Kurumsal altyap\u0131da vir\u00fcs\u00fcn bula\u015ft\u0131\u011f\u0131 bilgisayarlar\u0131 ve a\u011f b\u00f6l\u00fcmlerini aramakla ba\u015flay\u0131n ve bulu\u015fmay\u0131 s\u0131n\u0131rland\u0131rmak i\u00e7in tespit etti\u011finiz makineleri a\u011f\u0131n geri kalan\u0131ndan ay\u0131r\u0131n.<\/p>\n<p>\u015eirketinizde fazla say\u0131da bilgisayar yoksa antivir\u00fcs, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/edr-endpoint-detection-response\/\" target=\"_blank\" rel=\"noopener\">EDR<\/a> ve <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/firewall\/\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik duvar\u0131<\/a> <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/log-file\/\" target=\"_blank\" rel=\"noopener\">g\u00fcnl\u00fckleriyle<\/a> ba\u015flay\u0131n. Alternatif olarak uygulama senaryolar\u0131n\u0131n son derece s\u0131n\u0131rl\u0131 oldu\u011fu durumlarda fiziksel olarak makineden makineye y\u00fcr\u00fcyerek makineleri kontrol edebilirsiniz.<\/p>\n<p>\u00c7ok say\u0131da bilgisayardan bahsediyorsak <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/siem\/\" target=\"_blank\" rel=\"noopener\">Bilgi G\u00fcvenli\u011fi ve Olay Y\u00f6netimi (SIEM) sistemindeki<\/a> olaylar\u0131 ve g\u00fcnl\u00fckleri analiz etmeniz gerekecektir. Bu, sonras\u0131nda yapaca\u011f\u0131n\u0131z i\u015flerin tamam\u0131n\u0131 ortadan kald\u0131rmasa da b\u00fcy\u00fck resmi g\u00f6rmeniz i\u00e7in iyi bir ba\u015flang\u0131\u00e7 olabilir.<\/p>\n<p>Vir\u00fcs\u00fcn bula\u015ft\u0131\u011f\u0131 makineleri a\u011fdan izole ettikten sonra ilgili makinelerin disk g\u00f6r\u00fcnt\u00fclerini olu\u015fturun ve m\u00fcmk\u00fcnse ara\u015ft\u0131rma bitene kadar bu makineleri ayr\u0131 tutun. (\u015eirketin bilgisayarlarda kesinti s\u00fcresi ya\u015fanmas\u0131n\u0131 kald\u0131racak maddi g\u00fcc\u00fc yoksa disk g\u00f6r\u00fcnt\u00fclerini olu\u015fturduktan sonra ara\u015ft\u0131rmak \u00fczere bellek d\u00f6k\u00fcm\u00fcn\u00fc kaydedin.)<\/p>\n<h2>B\u00f6l\u00fcm iki: Analiz edin ve harekete ge\u00e7in<\/h2>\n<p>Kapsam\u0131 kontrol etmeyi tamamlad\u0131ktan sonra elinizde \u015fifreli dosyalarla dolu makinelerin yer ald\u0131\u011f\u0131 bir listeniz ve bu disklerin g\u00f6r\u00fcnt\u00fcleri olacakt\u0131r. Vir\u00fcs\u00fcn bula\u015ft\u0131\u011f\u0131 t\u00fcm makinelerin a\u011fla ba\u011flant\u0131s\u0131n\u0131 kesti\u011finiz i\u00e7in bunlar art\u0131k tehdit olu\u015fturmaz. Kurtarma s\u00fcrecini hemen &lt;em&gt;<em>ba\u015flatabilirsiniz&lt;\/em&gt;<\/em> ama \u00f6nce a\u011f\u0131n kalan\u0131n\u0131n g\u00fcvende oldu\u011fundan emin olun.<\/p>\n<p>\u015eimdi fidye yaz\u0131l\u0131m\u0131 analiz ederek sisteminize nas\u0131l bula\u015ft\u0131\u011f\u0131n\u0131 ve bu fidye yaz\u0131l\u0131m\u0131 genellikle hangi gruplar\u0131n kulland\u0131\u011f\u0131n\u0131 \u00f6\u011frenme zaman\u0131. Yani, tehdit av\u0131 s\u00fcrecine ba\u015flayaca\u011f\u0131z. Fidye yaz\u0131l\u0131mlar birdenbire ortaya \u00e7\u0131k\u0131vermez. \u00d6nce <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan-droppers\/\" target=\"_blank\" rel=\"noopener\">dosya y\u00fckleyici<\/a>, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-access-trojan-rat\/\" target=\"_blank\" rel=\"noopener\">RAT (Uzaktan Eri\u015fim Truva Atlar\u0131)<\/a>, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/downloader\/\" target=\"_blank\" rel=\"noopener\">Truva at\u0131 y\u00fckleyici<\/a> veya benzeri bir unsurla sisteme kurulurlar. \u0130\u015fte o unsuru bulup k\u00f6k\u00fcn\u00fc kaz\u0131man\u0131z gerekir.<\/p>\n<p>Bunun i\u00e7in kurum i\u00e7inde bir ara\u015ft\u0131rma ger\u00e7ekle\u015ftirin. \u00d6nce hangi bilgisayara sald\u0131r\u0131ld\u0131\u011f\u0131n\u0131 ve ilgili bilgisayar\u0131n sald\u0131r\u0131y\u0131 neden durduramad\u0131\u011f\u0131n\u0131 bulmak i\u00e7in g\u00fcnl\u00fckleri detayl\u0131 olarak inceleyin.<\/p>\n<p>Ara\u015ft\u0131rma sonu\u00e7lar\u0131na g\u00f6re ileri d\u00fczeyde gizlenmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 a\u011fdan uzakla\u015ft\u0131r\u0131n ve m\u00fcmk\u00fcnse i\u015f operasyonlar\u0131n\u0131 geri ba\u015flat\u0131n. Ard\u0131ndan neyin bu sald\u0131r\u0131y\u0131 engelleme potansiyeli oldu\u011funu bulun: G\u00fcvenlik yaz\u0131l\u0131m\u0131 bak\u0131m\u0131ndan eksi\u011finiz ne? Buldu\u011funuz bo\u015fluklar\u0131 doldurun.<\/p>\n<p>Sonraki ad\u0131mda \u00e7al\u0131\u015fanlar\u0131 ya\u015fanan olayla ilgili uyar\u0131n, bu gibi tuzaklar\u0131n tespiti ve \u00f6nlenmesiyle ilgili bilgilendirin ve ilerleyen zamanlarda e\u011fitim verilece\u011fini bildirin.<\/p>\n<p>Son olarak \u015fu andan ba\u015flayarak g\u00fcncelleme ve yamalar\u0131 zaman\u0131nda kurun. G\u00fcncellemeler ve yama y\u00f6netimi BT y\u00f6neticilerinin \u00f6nemli \u00f6nceliklerindendir ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar genellikle mevcut bir yamayla \u00f6nlenebilecek g\u00fcvenlik a\u00e7\u0131klar\u0131ndan sisteme s\u0131zar.<\/p>\n<h2>B\u00f6l\u00fcm \u00fc\u00e7: Temizleyin ve geri y\u00fckleyin<\/h2>\n<p>Bu a\u015famaya kadar a\u011fdaki tehdidi ve tehdidin i\u00e7eri s\u0131zd\u0131\u011f\u0131 deli\u011fi hallettiniz. \u015eimdi dikkatinizi \u00e7al\u0131\u015fma d\u0131\u015f\u0131 kalan bilgisayarlara \u00e7evirme zaman\u0131. Ara\u015ft\u0131rma i\u00e7in bu makinelere ihtiya\u00e7 kalmad\u0131ysa s\u00fcr\u00fcc\u00fcleri bi\u00e7imlendirin ve verileri, en son temiz yedekten geri y\u00fckleyin.<\/p>\n<p>Ama yedek kopyan\u0131z yoksa s\u00fcr\u00fcc\u00fclerdeki her \u015feyi de\u015fifre etmeye \u00e7al\u0131\u015fman\u0131z gerekir. Kaspersky\u2019nin <a href=\"https:\/\/noransom.kaspersky.com\/tr\/\" target=\"_blank\" rel=\"noopener\">No Ransom<\/a> web sitesi ile ba\u015flayabilirsiniz. Kar\u015f\u0131la\u015ft\u0131\u011f\u0131n\u0131z fidye yaz\u0131l\u0131m i\u00e7in gereken \u015fifre \u00e7\u00f6z\u00fcc\u00fc bu sitede mevcut olabilir. Arad\u0131\u011f\u0131n\u0131z \u015fifre \u00e7\u00f6z\u00fcc\u00fc burada yoksa yard\u0131m almak i\u00e7in siber g\u00fcvenlik sa\u011flay\u0131c\u0131n\u0131zla ileti\u015fime ge\u00e7in. Ne olursa olsun \u015fifrelenen dosyalar\u0131 silmeyin. Zaman zaman yeni \u015fifre \u00e7\u00f6z\u00fcc\u00fcler yay\u0131nlanmaktad\u0131r. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/shade-decryptor-2020\/8188\/\" target=\"_blank\" rel=\"noopener\">Daha \u00f6nce oldu\u011fu gibi<\/a> yar\u0131n yeni bir \u015fifre \u00e7\u00f6z\u00fcc\u00fc yay\u0131nlanabilir.<\/p>\n<p>Durum her ne olursa olsun sald\u0131rganlara \u00f6deme yapmay\u0131n. Yaparsan\u0131z bir su\u00e7 faaliyetine sponsor olmu\u015f olursunuz ve \u00f6deme yapsan\u0131z bile verilerinizin \u015fifresinin \u00e7\u00f6z\u00fclme ihtimali pek y\u00fcksek de\u011fildir. Verilerinizi engellemekten ayr\u0131 olarak fidye yaz\u0131l\u0131m sald\u0131rganlar\u0131 verilerinizi \u015fantaj amac\u0131yla <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-incidents-2020\/9019\/\" target=\"_blank\" rel=\"noopener\">\u00e7alm\u0131\u015f<\/a> olabilir. Bu durumda a\u00e7 g\u00f6zl\u00fc siber su\u00e7lulara \u00f6deme yapman\u0131z onlar\u0131 daha fazlas\u0131n\u0131 istemeye te\u015fvik eder. Ge\u00e7mi\u015fte ya\u015fanan baz\u0131 <a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/05\/25\/ransomware-hit-hospital-faces-second-demand-despite-paying-up\/\" target=\"_blank\" rel=\"noopener nofollow\">olaylarda<\/a> sisteme izinsiz giren sald\u0131rganlar \u00f6deme ald\u0131ktan birka\u00e7 ay sonra geri gelip daha fazla para talep etmi\u015f ve ilgili kurumu \u00f6deme yap\u0131lmad\u0131\u011f\u0131 takdirde her \u015feyi yay\u0131nlamakla tehdit etmi\u015fti.<\/p>\n<p>Genel anlamda \u00e7al\u0131nan her t\u00fcrl\u00fc veriyi halka a\u00e7\u0131k bilgi olarak kabul edin ve veri s\u0131z\u0131nt\u0131s\u0131yla ba\u015fa \u00e7\u0131kmaya haz\u0131rl\u0131kl\u0131 olun. Olay hakk\u0131nda er ya da ge\u00e7 konu\u015fman\u0131z gerekecek: \u00e7al\u0131\u015fanlarla, payda\u015flarla, devlet kurumlar\u0131yla ve b\u00fcy\u00fck ihtimalle gazetecilerle. <a href=\"https:\/\/www.kaspersky.com\/blog\/incident-communications\/28649\/\" target=\"_blank\" rel=\"noopener nofollow\">A\u00e7\u0131k s\u00f6zl\u00fcl\u00fck ve d\u00fcr\u00fcstl\u00fck<\/a> b\u00fcy\u00fck \u00f6nem ta\u015f\u0131r ve takdirle kar\u015f\u0131lan\u0131r.<\/p>\n<h2>B\u00f6l\u00fcm d\u00f6rt: \u00d6nleyici ad\u0131mlar at\u0131n<\/h2>\n<p>B\u00fcy\u00fck \u00e7apl\u0131 bir siber sald\u0131r\u0131 her zaman b\u00fcy\u00fck sorunlar\u0131 beraberinde getirir ve \u00f6nleme bu a\u015famada en iyi \u00e7\u00f6z\u00fcmd\u00fcr. \u00c7\u0131kabilecek sorunlara kar\u015f\u0131 \u00f6nceden haz\u0131rl\u0131kl\u0131 olun:<\/p>\n<ul>\n<li>A\u011fdaki t\u00fcm u\u00e7 noktalara (ak\u0131ll\u0131 telefonlar dahil)\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir koruma<\/a> arac\u0131 kurun;<\/li>\n<li>A\u011f\u0131n\u0131z\u0131 b\u00f6l\u00fcmlere ay\u0131r\u0131n ve iyi yap\u0131land\u0131r\u0131lm\u0131\u015f g\u00fcvenlik duvarlar\u0131yla donat\u0131n. Daha iyi bir \u00f6nlem olarak yeni tehditlerle ilgili verileri otomatik olarak alan yeni nesil g\u00fcvenlik duvar\u0131 (NGFW) veya\u00a0<a href=\"https:\/\/www.kaspersky.com\/tr\/small-to-medium-business-security\/proxy-web-traffic?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">benzeri bir \u00fcr\u00fcn<\/a> kullan\u0131n.<\/li>\n<li>Antivir\u00fcse ek olarak g\u00fc\u00e7l\u00fc\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-management-defense-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____tmd___\" target=\"_blank\" rel=\"noopener\">tehdit av\u0131 ara\u00e7lar\u0131n\u0131<\/a> deneyin;<\/li>\n<li>An\u0131nda uyar\u0131 iletimi i\u00e7in bir SIEM sistemi kurun (b\u00fcy\u00fck \u015firketler i\u00e7in);<\/li>\n<li>D\u00fczenli\u00a0<a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">interaktif<\/a> oturumlarla \u00e7al\u0131\u015fanlar\u0131n\u0131za siber g\u00fcvenlik alan\u0131nda e\u011fitimler verin.<\/li>\n<\/ul>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kurumsal bir fidye yaz\u0131l\u0131m sald\u0131r\u0131s\u0131n\u0131n sonu\u00e7lar\u0131 nas\u0131l en aza indirilir<\/p>\n","protected":false},"author":2633,"featured_media":9357,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727,1351],"tags":[2022,537,1986],"class_list":{"0":"post-9356","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"category-threats","11":"tag-fidye-yazilim","12":"tag-tehditler","13":"tag-truva-atlari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-attack-what-to-do\/9356\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-attack-what-to-do\/22544\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-attack-what-to-do\/18036\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-attack-what-to-do\/24259\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-attack-what-to-do\/22327\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-attack-what-to-do\/21096\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-attack-what-to-do\/24774\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-attack-what-to-do\/23987\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-attack-what-to-do\/30156\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-attack-what-to-do\/38809\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-attack-what-to-do\/16433\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-attack-what-to-do\/16983\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-attack-what-to-do\/14506\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-attack-what-to-do\/26263\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-attack-what-to-do\/30083\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-attack-what-to-do\/26723\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-attack-what-to-do\/23594\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-attack-what-to-do\/28923\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-attack-what-to-do\/28730\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilim\/","name":"fidye yaz\u0131l\u0131m"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2633"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9356"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9356\/revisions"}],"predecessor-version":[{"id":9358,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9356\/revisions\/9358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9357"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}