{"id":17161,"date":"2022-04-26T20:48:03","date_gmt":"2022-04-26T17:48:03","guid":{"rendered":"https:\/\/kutaybilen.com.tr\/?p=17161"},"modified":"2022-04-26T20:48:03","modified_gmt":"2022-04-26T17:48:03","slug":"dunyanin-en-duzgun-20-hackeri","status":"publish","type":"post","link":"https:\/\/kutaybilen.com.tr\/?p=17161","title":{"rendered":"D\u00fcnyan\u0131n En D\u00fczg\u00fcn 20 Hacker&#8217;\u0131"},"content":{"rendered":"<p>Siber korsanlar, g\u00fcn\u00fcm\u00fczde <strong>\u00e7evrimi\u00e7i teknolojilerin<\/strong> geli\u015fimiyle birlikte s\u0131kl\u0131kla g\u00fcndeme gelmeye ba\u015flad\u0131. Siber g\u00fcvenlik d\u00fcnyas\u0131nda hem\u00a0bilgisayar sistemlerinin savunmas\u0131n\u0131 a\u015fmaya \u00e7al\u0131\u015fan makus niyetli siber korsanlar hem de bilakis savunma sistemlerini g\u00fc\u00e7lendiren beyaz \u015fapkal\u0131 hacker&#39;lar var.<\/p>\n<p>Siber g\u00fcvenlik uzmanlar\u0131, uygun ya da makus olsun tarihte en b\u00fcy\u00fck etki\u00a0yaratan hacker&#39;lar\u0131 s\u0131ralayarak a\u00e7\u0131klad\u0131. \u0130\u015fte az\u0131l\u0131 bir su\u00e7ludan, yeteneklerini savunma emeliyle kullananlara kadar siber g\u00fcvenlik d\u00fcnyas\u0131nda iz b\u0131rakan 20 hacker:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/c85068667ed9d403ea1319e45be4401c98bd2153.jpeg\"\/><\/p>\n<p><b><strong>20. Gary McKinnon<\/strong><\/b><\/p>\n<p>Gary McKinnon, 2002 y\u0131l\u0131nda t\u00fcm vakitlerin en b\u00fcy\u00fck askeri bilgisayar korsanl\u0131\u011f\u0131n\u0131 s\u00fcrd\u00fcrmekle su\u00e7lanan bir \u0130sko\u00e7 sistem y\u00f6neticisi ve hacker.\u00a0Bu yetenekli bilgisayar korsan\u0131, \u015eubat 2001 ile Mart 2002 ortas\u0131nda, Londra&#39;daki k\u0131z arkada\u015f\u0131n\u0131n teyzesinin meskeninde &#39;Solo&#39; ismini kullanarak on \u00fc\u00e7 ayl\u0131k bir m\u00fcddet boyunca 97 ABD askeri bilgisayar\u0131na ve NASA bilgisayarlar\u0131na sald\u0131rmakla su\u00e7land\u0131.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/f3f493e5be9342b7d667b71aaf6ef7cd12902537.jpeg\"\/><\/p>\n<p><b><strong>19. DVD-Jon<\/strong><\/b><\/p>\n<p>90&#39;l\u0131 y\u0131llar\u0131n sonlar\u0131nda, <strong>Jon Lech Johansen<\/strong> isimli bir yaz\u0131l\u0131m m\u00fchendisi, DeCSS program\u0131n\u0131 ba\u015far\u0131l\u0131 bir formda yazma konusundaki ba\u015far\u0131s\u0131yla \u00fcnl\u00fc oldu. 15 ya\u015f\u0131ndayken DVD \u015fifreleme teknolojisini k\u0131ran bir yaz\u0131l\u0131m geli\u015ftirerek bir &#8220;kahraman&#8221; haline gelen hacker, DVD-Jon lakab\u0131na kavu\u015ftu.\u00a0DVD-Jon \u00fczere \u00f6nc\u00fcler, bilgisayar korsanl\u0131\u011f\u0131 ve miras\u0131nda k\u0131ymetli fig\u00fcrler olmaya devam ediyor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/66430bc5aa23e2daf7e6ab472d6ac23e9acb80ef.jpeg\"\/><\/p>\n<p><b><strong>18.\u00a0Mudge<\/strong><\/b><\/p>\n<p>Mudge takma ismiyle da bilinen Peiter C. Zatko, a\u011f g\u00fcvenli\u011fi uzman\u0131, a\u00e7\u0131k kaynak programc\u0131s\u0131, muharrir ve hacker olarak biliniyor. L0pht isimli hacker niyet kurulu\u015funun ve Cult of the Dead Cow adl\u0131\u00a0hacker grubunun\u00a0en \u00f6nde gelen \u00fcyesiydi.\u00a0Mudge, bilgi ve g\u00fcvenlik a\u00e7\u0131klar\u0131 konusundaki\u00a0a\u00e7\u0131klamalara ve e\u011fitime de\u011ferli \u00f6l\u00e7\u00fcde katk\u0131da bulundu. Buffer Overflow makalelerini birinci ara\u015ft\u0131ranlardan biriydi. En k\u0131ymetli \u00e7al\u0131\u015fmalar\u0131ndan biri, kendi yazd\u0131\u011f\u0131\u00a0<strong>L0phtCrack<\/strong> \u015fifre k\u0131rma yaz\u0131l\u0131m\u0131yd\u0131.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/e1c3da67cfd7d1303d55dc8d3cb0d0d9fb113f02.jpeg\"\/><\/p>\n<p><b><strong>17.\u00a0George Hotz<\/strong><\/b><\/p>\n<p>George Francis Hotz, <strong>iPhone telefonlar\u0131<\/strong>\u00a0k\u0131rmas\u0131yla tan\u0131nan ve kilitli telefonlar\u0131n \u00f6b\u00fcr kablosuz operat\u00f6rlerle de kullan\u0131lmas\u0131n\u0131 sa\u011flayan Amerikal\u0131 bir hacker.\u00a0PlayStation 3 konsolunu kar\u015f\u0131t m\u00fchendislikle k\u0131rmas\u0131 nedeniyle Sony taraf\u0131ndan dava edildi.\u00a0Nisan 2011&#39;de anonim bir hacker PlayStation Network&#39;e girdi ve yakla\u015f\u0131k 77 milyon kullan\u0131c\u0131n\u0131n \u015fahs\u00ee bilgilerini \u00e7ald\u0131. Lakin Hotz, ak\u0131n\u0131n sorumlulu\u011funu reddetti.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/db5e51eebcb0540506cd5421ceaf739086bf9a4a.jpeg\"\/><\/p>\n<p><b><strong>16.\u00a0Barnaby Jack<\/strong><\/b><\/p>\n<p>2013 y\u0131l\u0131nda husus kullan\u0131m\u0131 nedeniyle hayat\u0131n kaybeden\u00a0Barnaby, bir Blackhat konferans\u0131nda ATM&#39;lerdeki a\u00e7\u0131klar\u0131\u00a0g\u00f6stererek dikkatleri \u00fczerine \u00e7ekmi\u015fti.\u00a0Ayr\u0131ca, bir kalp pilinin nas\u0131l hacklenebilece\u011fini bile g\u00f6sterdi.\u00a0Jack, \u00f6lmeden evvel son olarak IOActive&#39;de G\u00f6m\u00fcl\u00fc Ayg\u0131t G\u00fcvenli\u011fi M\u00fcd\u00fcr\u00fc olarak misyon yap\u0131yordu.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/ee680d882f043a56cb47123a581e6a3c925d54fb.jpeg\"\/><\/p>\n<p><b><strong>15.\u00a0FIN7<\/strong><\/b><\/p>\n<p>FIN7, kurbanlar\u0131na sald\u0131rmak i\u00e7in yeni metotlara \u00e7ar\u00e7abuk ahenk sa\u011flayabilen bir hacker k\u00fcmesi. Ayr\u0131yeten en geli\u015fmi\u015f finansal dayanakl\u0131 k\u00fcmelerden biri olarak biliniyor.\u00a0ABD Adalet Bakanl\u0131\u011f\u0131,\u00a0FIN7&#39;nin yasal bir g\u00fcvenlik testi \u015firketi olarak faaliyetlerini gizlemek i\u00e7in bir \u015firketi nas\u0131l kulland\u0131\u011f\u0131n\u0131 ortaya \u00e7\u0131kard\u0131.\u00a0\u015eirketi kullanarak, ABD&#39;de \u00e7e\u015fitli gayelere kar\u015f\u0131 operasyonlar\u0131nda kullanmak i\u00e7in g\u00fcvenlik profesyonellerini faal olarak i\u015fe almaya\u00a0\u00e7al\u0131\u015ft\u0131lar.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/696ed730c802c688a4a336e28bc14b3da6568be7.jpeg\"\/><\/p>\n<p><b><strong>14.\u00a0James Forshaw<\/strong><\/b><\/p>\n<p>James Forshaw, uzun y\u0131llar boyunca\u00a0 Microsoft&#39;un a\u00e7\u0131klar\u0131n\u0131 bularak d\u00fcnyan\u0131n \u00f6nde gelen\u00a0bug avc\u0131lar\u0131ndan biri oldu.\u00a0Forshaw, \u00e7ok\u00a0az say\u0131da insan\u0131n dikkate ald\u0131\u011f\u0131 yeni ak\u0131n cinslerini ke\u015ffetmek\u00a0i\u00e7in neredeyse e\u015fsiz bir yetene\u011fe sahip.\u00a0Microsoft Security Response Center&#39;\u0131n\u00a0en uygun ara\u015ft\u0131rmac\u0131 listesinde yer almas\u0131 m\u00fcmk\u00fcn g\u00f6r\u00fcn\u00fcyor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/385f75364af4677d50237186cd6b732e9f2ea91c.jpeg\"\/><\/p>\n<p><b><strong>13. HackerOne<\/strong><\/b><\/p>\n<p>HackerOne asl\u0131nda bir birey yahut k\u00fcmeden fazla bir <strong>platform<\/strong>. Lakin en yeterli hackerlardan kimileri taraf\u0131ndan destekleniyor. Bu nedenle de listeye girmeyi hak ediyor. Birka\u00e7 HackerOne hacker&#39;\u0131, bulduklar\u0131 kusurlar\u0131n akabinde kendilerine \u00f6denen m\u00fckafatlar nedeniyle milyoner oldu.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/a1ed8391b997742341ffddf86a014d64dd57d136.jpeg\"\/><\/p>\n<p><b><strong>12.\u00a0Ole Andre V. Ravnas<\/strong><\/b><\/p>\n<p>Ole Andre V. Ravnes, \u00f6zg\u00fcr yaz\u0131l\u0131m\u0131 <strong>&#39;Frida&#39;<\/strong> sanayi profesyonelleri ortas\u0131nda tan\u0131nan bir ara\u00e7\u00a0haline gelen yetenekli ve tecr\u00fcbeli bir ayk\u0131r\u0131 m\u00fchendislik uzman\u0131.\u00a0Frida yaz\u0131l\u0131m\u0131 ters\u00a0m\u00fchendis, geli\u015ftirici yahut ara\u015ft\u0131rmac\u0131 olan herkesin kara kutu yaz\u0131l\u0131mlar\u0131na ba\u011flanmas\u0131na m\u00fcsaade veriyordu. Ole&#39;nin 2005 y\u0131l\u0131nda Libmimic&#39;i piyasaya s\u00fcrerek siber d\u00fcnyada k\u0131ymetli ve kal\u0131c\u0131 katk\u0131 sa\u011flamaya devam etti.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/4d66f4d05210d301e8288156aa168ead437e8d2a.jpeg\"\/><\/p>\n<p><b><strong>11.\u00a0Sandworm<\/strong><\/b><\/p>\n<p>Sandworm, Kiev&#39;de\u00a02016 y\u0131l\u0131nda ya\u015fanan\u00a0elektrik kesintisinin ard\u0131ndaki Rus askeri hacker&#39;lar\u0131n olu\u015fturdu\u011fu bir k\u00fcme. Bug\u00fcne kadarki en y\u0131k\u0131c\u0131 makus maksatl\u0131 yaz\u0131l\u0131m olan <strong>NotPetya<\/strong>&#39;n\u0131n gerisindeki k\u00fcme olan Sandworm,\u00a0tahmini 10 milyar dolarl\u0131k hasarla tarihteki en k\u0131ymetli siber sald\u0131r\u0131y\u0131 yapt\u0131.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/40021a961367ef1f3543face6110e3c5eed03c09.jpeg\"\/><\/p>\n<p><b><strong>10.\u00a0The Shadow Brokers<\/strong><\/b><\/p>\n<p>The Shadow Brokers (TSB), 2016 y\u0131l\u0131nda birinci kere ortaya \u00e7\u0131kan bir hacker k\u00fcmesi. ABD Ulusal G\u00fcvenlik Ajans\u0131&#39;ndan (NSA) ele ge\u00e7irdikleri birka\u00e7 s\u0131z\u0131nt\u0131 yay\u0131nlad\u0131lar. \u00d6zellikle\u00a0geli\u015ftirdikleri ara\u00e7lar g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131, kurumsal g\u00fcvenlik duvarlar\u0131n\u0131, vir\u00fcsten muhafaza yaz\u0131l\u0131mlar\u0131n\u0131 ve Microsoft eserlerini maksat al\u0131yordu.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/aa7ebac276b00511be845bfc98e9533bd30049e7.jpeg\"\/><\/p>\n<p><b><strong>9.\u00a0Phineas Fisher<\/strong><\/b><\/p>\n<p>Phineas Fisher olarak bilinen bir hacker, siber g\u00fcvenlik d\u00fcnyas\u0131n\u0131n en nefret edilen \u015firketlerinden biri olan Hacking Team&#39;in sunucular\u0131na girdi ve t\u00fcm bilgilerini \u00e7evrimi\u00e7i olarak yay\u0131nlad\u0131.\u00a0G\u00fcvenlik analistlerine nazaran bu, m\u00fcze soyguncusunun m\u00fczeye\u00a0girmesi ve akabinde \u00e7ald\u0131\u011f\u0131 en pahal\u0131 foto\u011fraflar\u0131 yolun ortas\u0131na b\u0131rakmas\u0131 \u00fczere bir durumdu.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/21fadbe910b566f0ec885f22ae899d778d9e89f9.jpeg\"\/><\/p>\n<p><b><strong>8.\u00a0PRAGMA<\/strong><\/b><\/p>\n<p>Impragma yahut PHOENiX olarak da bilinen PRAGMA, \u00e7evrimi\u00e7i kimlik bilgisi doldurma ara\u00e7lar\u0131ndan biri olan Snipr&#39;in m\u00fcellifi.\u00a0Bu ara\u00e7, \u00e7evrimi\u00e7i\u00a0kimlik bilgilerini kolayl\u0131kla ele ge\u00e7irebilen siber hatal\u0131lar yaratt\u0131. Sald\u0131rganlar, arac\u0131 oyun i\u00e7i \u00f6\u011feleri \u00e7almak yahut m\u00fczik ve sinema ak\u0131\u015f\u0131 yapmak i\u00e7in global \u00f6l\u00e7ekte hesaplara girmek i\u00e7in kullan\u0131yor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/61a072545c75665c8971f5031c9a30962d88dfd0.jpeg\"\/><\/p>\n<p><b><strong>7. APT10<\/strong><\/b><\/p>\n<p>APT10, devlet takviyeli bir\u00e7ok casusluk k\u00fcmesi \u00fczere \u00e7al\u0131\u015fsa da, sa\u011flay\u0131c\u0131 ve m\u00fc\u015fterileri ortas\u0131ndaki inanc\u0131 berbata kullanarak kurbanlara eri\u015fim sa\u011flama gayesiyle y\u00f6netilen <strong>g\u00fcvenlik<\/strong> ve <strong>servis<\/strong> sa\u011flay\u0131c\u0131lar\u0131 maksat al\u0131yorlar.\u00a0APT10&#39;un aksiyonlar\u0131 \u015firketlerin birlikte \u00e7al\u0131\u015ft\u0131klar\u0131 \u00fc\u00e7\u00fcnc\u00fc taraf \u015firketleri denetleme gereksinimini vurguluyor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/32ccd529a7bd754486db8d04c8b8242e4a5e22fc.jpeg\"\/><\/p>\n<p><b><strong>6.\u00a0Benjamin Delpy<\/strong><\/b><\/p>\n<p>En az Phineas Fisher kadar yetenekli bir hacker olan Delpy, \u015fu anda hem beyaz hem de siyah \u015fapkal\u0131 hacker&#39;lar taraf\u0131ndan kullan\u0131lan en yayg\u0131n hack ara\u00e7lar\u0131ndan biri <strong>Mimikatz<\/strong>&#39;\u0131n yarat\u0131c\u0131s\u0131. Benjamin, \u015eifre k\u0131rma uygulamas\u0131 olarak \u00f6ne \u00e7\u0131kan Mimikatz&#39;\u0131 Windows g\u00fcvenli\u011fi ile oynamak i\u00e7in k\u00fc\u00e7\u00fck bir ara\u00e7\u00a0olarak tan\u0131ml\u0131yor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/20b892d31eb9f634592e782eefd42a88a5bfebb9.jpeg\"\/><\/p>\n<p><b><strong>5.\u00a0John Wu<\/strong><\/b><\/p>\n<p>2016 y\u0131l\u0131nda John Wu isminde bir XDA geli\u015ftiricisi, Android i\u00e7in Magisk isimli \u00e7\u0131\u011f\u0131r a\u00e7an bir a\u00e7\u0131k kaynakl\u0131 root tahlili sundu.\u00a0Magisk Android d\u00fcnyas\u0131nda ihtilal yapt\u0131 ve kullan\u0131c\u0131lar\u0131n PokemonGo \u00e7\u0131lg\u0131nl\u0131\u011f\u0131 s\u0131ras\u0131nda bilhassa ayg\u0131t fonksiyonelli\u011fini art\u0131rmas\u0131n\u0131 sa\u011flad\u0131. Android ekosistemini \u00e7ok d\u00fczg\u00fcn tan\u0131yan Wu, ge\u00e7en y\u0131l 4 ayl\u0131k bir staj i\u00e7in Apple&#39;a gidece\u011fini a\u00e7\u0131klad\u0131.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/03e5dc80d6968c8b0df42e2d157fc4a08c6d380c.jpeg\"\/><\/p>\n<p><b><strong>4.\u00a0Keren Elazari<\/strong><\/b><\/p>\n<p>Elazari, TED konferans\u0131nda konu\u015fma yapan\u00a0ilk \u0130srailli bayan olmas\u0131n\u0131n yan\u0131 s\u0131ra hacker&#39;lar\u0131n\u00a0iyi yan\u0131n\u0131 temsil eden k\u0131ymetli bir ses oldu. Hacker&#39;lar\u0131n\u00a0interneti daha g\u00fc\u00e7l\u00fc ve daha sa\u011fl\u0131kl\u0131 hale getirmeye y\u00f6nelik g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 a\u00e7\u0131\u011fa \u00e7\u0131kararak daha yeterli bir d\u00fcnya yaratmaya yard\u0131mc\u0131 olduklar\u0131n\u0131 ileri s\u00fcrerek, hacker&#39;lar\u0131n dijital ba\u011f\u0131\u015f\u0131kl\u0131k sisteminin de\u011ferli bir mod\u00fcl\u00fc olarak hareket ettiklerini belirtti.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/6f422fd3ae4aa0a3bedc322669a7939b12aac16d.jpeg\"\/><\/p>\n<p><b><strong>3.\u00a0James Kettle<\/strong><\/b><\/p>\n<p>James Kettle, PortSwigger&#39;de Ara\u015ft\u0131rma Lideri ve \u015firkette web&#39;i test etmek i\u00e7in kullan\u0131lan tan\u0131nan bir uygulama olan <strong>Burp Suite<\/strong>&#39;i geli\u015ftirmekten sorumlu.\u00a0James,\u00a0s\u00fcrekli olarak yeni taarruz teknikleri geli\u015ftiriyor ve kurulu\u015flar\u0131n bunlara kar\u015f\u0131 korunmas\u0131na yard\u0131mc\u0131 olarak a\u00e7\u0131klar\u0131 kapat\u0131yor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/f750531740ea11678ab3f1d4458ce34c66bfcd76.jpeg\"\/><\/p>\n<p><b><strong>2.\u00a0Guccifer 2.0<\/strong><\/b><\/p>\n<p>Bu ki\u015fi yahut k\u00fcme Rus istihbarat\u0131yla rastgele bir ba\u011f\u0131 reddetse de, ABD&#39;de 2016 Demokratik Ulusal Kongresine yapt\u0131\u011f\u0131 taarruz, Rusya&#39;n\u0131n ABD se\u00e7imlerine atak ve m\u00fcdahale fikrinin pop\u00fclerler hale gelmesini sa\u011flad\u0131.\u00a0Ger\u00e7ek olup olmad\u0131\u011f\u0131 bilinmese de ABD se\u00e7imleri i\u00e7in\u00a0en b\u00fcy\u00fck tehditlerden biri olarak g\u00f6r\u00fcl\u00fcyor.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.webtekno.com\/images\/editor\/default\/0002\/44\/63d4b1f46f6067d58f078eff5d9625f22f633c29.jpeg\"\/><\/p>\n<p><b><strong>1.\u00a0T\u00fcm etik hacker topluluklar\u0131<\/strong><\/b><\/p>\n<p>T\u00fcm <strong>beyaz \u015fapkal\u0131<\/strong>\u00a0hacker&#39;lar 1 numara olmay\u0131 hakediyor. Tehditlere kar\u015f\u0131 yapt\u0131klar\u0131 ara\u015ft\u0131rmalar\u0131, kapatt\u0131klar\u0131 a\u00e7\u0131klar, geli\u015ftirdikleri tedbirler&#8230; Hepsi sahne gerisinde \u00e7al\u0131\u015f\u0131yor ve bunu \u015f\u00f6hret i\u00e7in yapm\u0131yor. \u0130nterneti, altyap\u0131lar\u0131, kulland\u0131\u011f\u0131m\u0131z programlar\u0131 k\u0131saca hayat\u0131m\u0131z\u0131 korumak i\u00e7in ellerinden geleni yap\u0131yorlar.<\/p>\n<div> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Siber korsanlar, g\u00fcn\u00fcm\u00fczde \u00e7evrimi\u00e7i teknolojilerin geli\u015fimiyle birlikte s\u0131kl\u0131kla g\u00fcndeme gelmeye ba\u015flad\u0131. Siber g\u00fcvenlik d\u00fcnyas\u0131nda hem &#8230;<\/p>\n","protected":false},"author":1,"featured_media":17162,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[1407,1125,1088,1457,1237],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/17161"}],"collection":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17161"}],"version-history":[{"count":1,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/17161\/revisions"}],"predecessor-version":[{"id":17163,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/posts\/17161\/revisions\/17163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=\/wp\/v2\/media\/17162"}],"wp:attachment":[{"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kutaybilen.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}