{"id":3349,"date":"2023-11-28T13:07:54","date_gmt":"2023-11-28T10:07:54","guid":{"rendered":"https:\/\/blackboxsecurity.org\/?page_id=3349"},"modified":"2023-12-21T10:55:26","modified_gmt":"2023-12-21T07:55:26","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/blackboxsecurity.org\/tr\/cyber-security\/","title":{"rendered":"Siber G\u00fcvenlik"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3349\" class=\"elementor elementor-3349\">\n\t\t\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-34b88755 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"34b88755\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27915593\" data-id=\"27915593\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d5a7ef elementor-widget elementor-widget-CaseArea\" data-id=\"4d5a7ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"CaseArea.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t                    <div class=\"resources-area ptb-100\">\r\n                <div class=\"container\">\r\n                                        <div class=\"row\">\r\n                                                    <div class=\"col-lg-6 col-md-6\">\r\n                                <div class=\"single-resources-box\">\r\n                                    <div class=\"image\">\r\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/malicious-go-npm-packages-deliver-cross-platform-malware-trigger-remote-data-wipes\/\" class=\"d-block\">\r\n                                            <img decoding=\"async\" src=\"https:\/\/blackboxsecurity.org\/wp-content\/uploads\/2025\/08\/go-programlama-01-860x574.png\" alt=\"case-image\">\r\n                                        <\/a>\r\n                                    <\/div>\r\n                                    <div class=\"content\">\r\n                                                                                            <div class=\"category\">\r\n                                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/case-tag\/cyber-security\/\" rel=\"tag\">Siber G\u00fcvenlik<\/a>                                                    <\/div>\r\n                                                                                            <h3><a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/malicious-go-npm-packages-deliver-cross-platform-malware-trigger-remote-data-wipes\/\">K\u00f6t\u00fc Ama\u00e7l\u0131 Go ve npm Paketleri Platformlar Aras\u0131 Zararl\u0131 Yaz\u0131l\u0131mlar Da\u011f\u0131t\u0131yor, Uzaktan Veri Silme Tetikliyor<\/a><\/h3>\r\n                                        <p>Cybersecurity researchers have discovered a set of 11 malicious Go packages that are designed to download additional payloads from remote servers and execute them on both Windows and Linux systems.<\/p>\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/malicious-go-npm-packages-deliver-cross-platform-malware-trigger-remote-data-wipes\/\" class=\"link-btn\">Habere Git... <i class=\"lni lni-chevron-right\"><\/i><\/a>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"col-lg-6 col-md-6\">\r\n                                <div class=\"single-resources-box\">\r\n                                    <div class=\"image\">\r\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/apple-messages-zero-click-vulnerability-used-to-target-journalists-with-paragon-spyware\/\" class=\"d-block\">\r\n                                            <img decoding=\"async\" src=\"https:\/\/blackboxsecurity.org\/wp-content\/uploads\/2025\/06\/apple_triangle-1-860x574.webp\" alt=\"case-image\">\r\n                                        <\/a>\r\n                                    <\/div>\r\n                                    <div class=\"content\">\r\n                                                                                            <div class=\"category\">\r\n                                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/case-tag\/cyber-security\/\" rel=\"tag\">Siber G\u00fcvenlik<\/a>                                                    <\/div>\r\n                                                                                            <h3><a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/apple-messages-zero-click-vulnerability-used-to-target-journalists-with-paragon-spyware\/\">Apple Mesajlar'daki T\u0131klama Gerektirmeyen A\u00e7\u0131k, Gazetecileri Paragon Casus Yaz\u0131l\u0131m\u0131yla Hedef Almak \u0130\u00e7in Kullan\u0131ld\u0131.<\/a><\/h3>\r\n                                        <p>Apple, Mesajlar uygulamas\u0131nda ke\u015ffedilen ve aktif olarak k\u00f6t\u00fcye kullan\u0131lan ciddi bir t\u0131klama gerektirmeyen g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 (CVE-2025-43200) do\u011frulad\u0131 ve yamalad\u0131\u011f\u0131n\u0131 a\u00e7\u0131klad\u0131.<\/p>\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/apple-messages-zero-click-vulnerability-used-to-target-journalists-with-paragon-spyware\/\" class=\"link-btn\">Habere Git... <i class=\"lni lni-chevron-right\"><\/i><\/a>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"col-lg-6 col-md-6\">\r\n                                <div class=\"single-resources-box\">\r\n                                    <div class=\"image\">\r\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/sinotrack-gps-devices-expose-vehicles-to-remote-hijacking-through-default-credentials\/\" class=\"d-block\">\r\n                                            <img decoding=\"async\" src=\"https:\/\/blackboxsecurity.org\/wp-content\/uploads\/2025\/06\/1603358786091-860x574.jpeg\" alt=\"case-image\">\r\n                                        <\/a>\r\n                                    <\/div>\r\n                                    <div class=\"content\">\r\n                                                                                            <div class=\"category\">\r\n                                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/case-tag\/cyber-security\/\" rel=\"tag\">Siber G\u00fcvenlik<\/a>                                                    <\/div>\r\n                                                                                            <h3><a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/sinotrack-gps-devices-expose-vehicles-to-remote-hijacking-through-default-credentials\/\">SinoTrack GPS cihazlar\u0131, varsay\u0131lan kimlik bilgileri \u00fczerinden ara\u00e7lar\u0131n uzaktan ele ge\u00e7irilmesine a\u00e7\u0131k hale geliyor.<\/a><\/h3>\r\n                                        <p>SinoTrack GPS cihazlar\u0131nda iki kritik g\u00fcvenlik a\u00e7\u0131\u011f\u0131 tespit edildi. Bu a\u00e7\u0131klar, sald\u0131rganlar\u0131n baz\u0131 ara\u00e7 i\u015flevlerini uzaktan kontrol etmesine ve ara\u00e7lar\u0131n konumlar\u0131n\u0131 izlemesine olanak tan\u0131yabilir.<\/p>\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/sinotrack-gps-devices-expose-vehicles-to-remote-hijacking-through-default-credentials\/\" class=\"link-btn\">Habere Git... <i class=\"lni lni-chevron-right\"><\/i><\/a>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"col-lg-6 col-md-6\">\r\n                                <div class=\"single-resources-box\">\r\n                                    <div class=\"image\">\r\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/china-linked-cyber-actors-target-sap-and-sql-server-vulnerabilities-in-widespread-attacks-across-asia-and-brazil\/\" class=\"d-block\">\r\n                                            <img decoding=\"async\" src=\"https:\/\/blackboxsecurity.org\/wp-content\/uploads\/2025\/05\/1-1-860x574.webp\" alt=\"case-image\">\r\n                                        <\/a>\r\n                                    <\/div>\r\n                                    <div class=\"content\">\r\n                                                                                            <div class=\"category\">\r\n                                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/case-tag\/cyber-security\/\" rel=\"tag\">Siber G\u00fcvenlik<\/a>                                                    <\/div>\r\n                                                                                            <h3><a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/china-linked-cyber-actors-target-sap-and-sql-server-vulnerabilities-in-widespread-attacks-across-asia-and-brazil\/\">\u00c7in Ba\u011flant\u0131l\u0131 Siber Akt\u00f6rler, Asya ve Brezilya Genelinde Yayg\u0131n Sald\u0131r\u0131larda SAP ve SQL Sunucu A\u00e7\u0131klar\u0131n\u0131 Hedef Al\u0131yor<\/a><\/h3>\r\n                                        <p>\u00c7in ba\u011flant\u0131l\u0131 bir tehdit akt\u00f6r\u00fc olan ve Earth Lamia olarak takip edilen bir grup, 2023'ten bu yana bir dizi siber sald\u0131r\u0131yla ili\u015fkilendirildi; bu sald\u0131r\u0131larda kritik bir SAP NetWeaver g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalan\u0131ld\u0131. <\/p>\n                                        <a href=\"https:\/\/blackboxsecurity.org\/tr\/news\/china-linked-cyber-actors-target-sap-and-sql-server-vulnerabilities-in-widespread-attacks-across-asia-and-brazil\/\" class=\"link-btn\">Habere Git... <i class=\"lni lni-chevron-right\"><\/i><\/a>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                        \r\n                                                    <div class=\"col-lg-12 col-md-12\">\r\n                                <div class=\"pagination-area\">\r\n                                    <nav aria-label=\"navigation\">\r\n                                    <span aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349\/page\/2\/\">2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349\/page\/3\/\">3<\/a>\n<span class=\"page-numbers dots\">&hellip;<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349\/page\/34\/\">34<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349\/page\/2\/\"><i class=\"lni lni-angle-double-right\"><\/i><\/a>  \r\n                                    <\/nav>\r\n                                <\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber Security 3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals &#8211; 20.12.2023 A six-month-long international police operation codenamed HAECHI-IV has resulted in the arrests of nearly 3,500 individuals and seizures worth $300 million across 34 countries. View Case Studie Details Cyber Security MongoDB Confirms Hack, Says Customer Data Stolen &#8211; 18.12.2023 MongoDB CISO Lena<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3349","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/comments?post=3349"}],"version-history":[{"count":10,"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349\/revisions"}],"predecessor-version":[{"id":4542,"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/pages\/3349\/revisions\/4542"}],"wp:attachment":[{"href":"https:\/\/blackboxsecurity.org\/tr\/wp-json\/wp\/v2\/media?parent=3349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}