{"id":148609,"date":"2021-12-31T16:49:06","date_gmt":"2021-12-31T13:49:06","guid":{"rendered":"https:\/\/www.enerjigazetesi.ist\/?p=148609"},"modified":"2021-12-31T16:49:06","modified_gmt":"2021-12-31T13:49:06","slug":"2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi","status":"publish","type":"post","link":"https:\/\/www.enerjigazetesi.ist\/en\/2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi\/","title":{"rendered":"(Turkish) 2022 Y\u0131l\u0131 \u0130\u00e7in Bilinmesi Gereken Etkili ve \u0130lgin\u00e7 22 Siber G\u00fcvenlik \u0130statisti\u011fi"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-en\">Sorry, this entry is only available in <a href=\"https:\/\/www.enerjigazetesi.ist\/tr\/wp-json\/wp\/v2\/posts\/148609\" class=\"qtranxs-available-language-link qtranxs-available-language-link-tr\" title=\"Turkish\">Turkish<\/a>. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.<\/p><p><\/p>\n<h2><strong>ESET, yeni bir y\u0131la ba\u015flarken en son siber g\u00fcvenlik trendleri hakk\u0131ndaki geli\u015fmelerin hat\u0131rlanmas\u0131na yard\u0131mc\u0131 olacak istatistiki bilgileri bir araya getirdi.<\/strong><\/h2>\n<h3><strong>2022 y\u0131l\u0131 i\u00e7in bilinmesi gereken en etkili veya en ilgin\u00e7 22 <span style=\"text-decoration: underline;\">siber g\u00fcvenlik istatisti\u011fi:<\/span><\/strong><\/h3>\n<p>1- 2021 y\u0131l\u0131nda verilerde g\u00fcvenlik ihlalinin ortalama maliyeti, 17 y\u0131ldaki en y\u00fcksek d\u00fczeye ula\u015ft\u0131. Y\u0131ll\u0131k olarak bak\u0131ld\u0131\u011f\u0131nda bu maliyet 3,86 milyon ABD dolar\u0131ndan 4,24 milyon ABD dolar\u0131na y\u00fckseldi. (<a href=\"https:\/\/www.ibm.com\/security\/data-breach\">IBM Veri S\u0131z\u0131nt\u0131s\u0131n\u0131n Maliyeti Raporu, 2021<\/a>)<\/p>\n<p>2- COVID-19 dolay\u0131s\u0131yla uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015f, veri ihlali maliyetlerini do\u011frudan etkiledi. Uzaktan \u00e7al\u0131\u015fman\u0131n g\u00fcvenlik ihlali nedenlerinden biri oldu\u011fu durumlardaki veri s\u0131z\u0131nt\u0131s\u0131n\u0131n ortalama maliyeti <img loading=\"lazy\" class=\"alignright wp-image-148611\" src=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/12\/2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi.jpg\" alt=\"\" width=\"320\" height=\"215\" srcset=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/12\/2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi.jpg 550w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/12\/2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi-300x202.jpg 300w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/12\/2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi-500x336.jpg 500w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/12\/2022-yili-icin-bilinmesi-gereken-etkili-ve-ilginc-22-siber-guvenlik-istatistigi-74x50.jpg 74w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>1,07 milyon ABD dolar\u0131ndan daha fazla. (<a href=\"https:\/\/www.ibm.com\/security\/data-breach\">IBM Veri S\u0131z\u0131nt\u0131s\u0131n\u0131n Maliyeti Raporu, 2021<\/a>)<\/p>\n<p>3- Verilerde g\u00fcvenlik ihlallerinin en yayg\u0131n nedeni, kullan\u0131c\u0131 bilgilerinin \u00e7al\u0131nmas\u0131yd\u0131. Yayg\u0131n olarak kullan\u0131lan bir sald\u0131r\u0131 vekt\u00f6r\u00fc olarak g\u00fcvenlik ihlallerinin y\u00fczde 20\u2019sinin sebebi olan bu s\u0131z\u0131nt\u0131lar ortalama 4,37 milyon ABD dolar\u0131na mal oldu. (<a href=\"https:\/\/www.ibm.com\/security\/data-breach\">IBM Veri S\u0131z\u0131nt\u0131s\u0131n\u0131n Maliyeti Raporu, 2021<\/a>)<\/p>\n<p>4- 2021 y\u0131l\u0131n\u0131n ortalar\u0131nda BT y\u00f6netim yaz\u0131l\u0131m\u0131 sa\u011flay\u0131c\u0131s\u0131 Kaseya\u2019n\u0131n sistemlerinde <a href=\"https:\/\/www.welivesecurity.com\/2021\/07\/03\/kaseya-supply-chain-attack-what-we-know-so-far\/\">Sodinokibi fidye yaz\u0131l\u0131m\u0131 taraf\u0131ndan bir g\u00fcvenlik ihlali ger\u00e7ekle\u015ftirildi.<\/a>\u00a0Sald\u0131r\u0131y\u0131 d\u00fczenleyenlerin 70 milyon ABD dolar\u0131 fidye talebi, \u015fu ana kadar istenen en y\u00fcksek tutard\u0131. (<a href=\"https:\/\/www.welivesecurity.com\/2021\/09\/30\/eset-threat-report-t22021\/\">ESET Tehdit Raporu D2 2021<\/a>)<\/p>\n<p>5- G\u00fcvenlik ihlallerinin y\u00fczde 36\u2019s\u0131 <strong>kimlik av\u0131 h\u0131rs\u0131zl\u0131\u011f\u0131<\/strong> sald\u0131r\u0131s\u0131yla ba\u011flant\u0131l\u0131yd\u0131. Bu sald\u0131r\u0131lar\u0131n y\u00fcze 11 artmas\u0131n\u0131n \u00f6nemli nedenlerinden birinin COVID-19 pandemisi oldu\u011fu s\u00f6ylenebilir. Beklendi\u011fi \u00fczere tehdit akt\u00f6rleri, g\u00fcndemde olan konulara ba\u011fl\u0131 olarak kimlik av\u0131 h\u0131rs\u0131zl\u0131\u011f\u0131 kampanyalar\u0131n\u0131 yeniden d\u00fczenliyor. (<a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon 2021 Veri \u0130hlali \u0130ncelemeleri Raporu<\/a>)<\/p>\n<p>6- Verizon taraf\u0131ndan 2021 y\u0131l\u0131nda yap\u0131lan analize g\u00f6re kamu y\u00f6netimi alan\u0131ndaki ihlallerin y\u00fczde 69\u2019unu olu\u015fturan <strong>sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131<\/strong>, kamu y\u00f6netimi i\u00e7in en b\u00fcy\u00fck tehdit. (<a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon 2021 Veri \u0130hlali \u0130ncelemeleri Raporu<\/a>)<\/p>\n<p>7- Aral\u0131k 2021\u2019de a\u00e7\u0131klanan ve Log4j giri\u015f arac\u0131ndaki kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan Log4Shell, ESET taraf\u0131ndan tespit edildi ve bu sayede \u00e7o\u011fu Amerika\u2019da ve Birle\u015fik Krall\u0131k\u2019ta olmak \u00fczere <a href=\"https:\/\/www.welivesecurity.com\/2021\/12\/13\/log4shell-vulnerability-what-we-know-so-far\/\">y\u00fcz binlerce suistimal giri\u015fimi engellendi<\/a>. (<a href=\"https:\/\/www.eset.com\/blog\/business\/log4shell-eset-blocks-hundreds-of-thousands-of-attack-attempts\/\">ESET Research<\/a>)<\/p>\n<p>8- 2021 y\u0131l\u0131nda, Android cihazlarda bankac\u0131l\u0131k uygulamalar\u0131ndaki k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n say\u0131s\u0131nda inan\u0131lmaz bir art\u0131\u015f g\u00f6r\u00fcld\u00fc. \u0130lk d\u00f6rt ayl\u0131k d\u00f6nemde <strong>y\u00fczde 158,7<\/strong> ile \u00e7ok b\u00fcy\u00fck art\u0131\u015f g\u00f6sterdi ve ikinci d\u00f6rt ayl\u0131k d\u00f6nemde <strong>y\u00fczde 49<\/strong> oran\u0131nda b\u00fcy\u00fcmeye devam etti. Hedeflerinin mali varl\u0131klar\u0131n\u0131 do\u011frudan etkileyen <strong>bankac\u0131l\u0131k truva atlar\u0131<\/strong>, endi\u015fe verici bir trend olarak d\u00fc\u015f\u00fcn\u00fclmelidir. (<a href=\"https:\/\/www.welivesecurity.com\/2021\/09\/30\/eset-threat-report-t22021\/\">ESET Tehdit Raporu<\/a><u>\u00a0D2 2021<\/u>)<\/p>\n<p>9- <strong>4 y\u0131l<\/strong> olmas\u0131na ra\u011fmen <a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/12\/wannacryptor-remains-global-threat-three-years-on\/\">WannaCryptor<\/a>\u00a0(di\u011fer ad\u0131yla WannaCry) h\u00e2l\u00e2 g\u00f6z ard\u0131 edilmemesi gereken k\u00fcresel bir tehdit. <strong>EternalBlue<\/strong> s\u0131z\u0131nt\u0131s\u0131na kar\u015f\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131na sahip makineleri etkileyen bu me\u015fhur truva at\u0131, 2&#8217;inci d\u00f6rt ayl\u0131k d\u00f6nemde (May\u0131s-A\u011fustos)<strong> y\u00fczde 21,3<\/strong> oran\u0131yla ESET\u2019in tespit etti\u011fi <strong>k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m grafikleri<\/strong>nde en \u00fcstte yerini ald\u0131. (<a href=\"https:\/\/www.welivesecurity.com\/2021\/09\/30\/eset-threat-report-t22021\/\">ESET Tehdit Raporu D2 2021<\/a>)<\/p>\n<p>10- <strong>Kripto para yat\u0131r\u0131m doland\u0131r\u0131c\u0131l\u0131\u011f\u0131<\/strong> her zamanki pop\u00fclerli\u011fini koruyor. Ekim 2020 ile May\u0131s 2021 aras\u0131nda kurbanlar, <strong>80 milyon ABD dolar\u0131<\/strong>ndan fazla doland\u0131r\u0131ld\u0131. Bir\u00e7ok insan kand\u0131r\u0131ld\u0131\u011f\u0131n\u0131 kabul etmekten utand\u0131\u011f\u0131 i\u00e7in ger\u00e7ek rakam\u0131n \u00e7ok daha fazla oldu\u011fu d\u00fc\u015f\u00fcn\u00fcl\u00fcyor. (<a href=\"https:\/\/www.ftc.gov\/news-events\/blogs\/data-spotlight\/2021\/05\/cryptocurrency-buzz-drives-record-investment-scam-losses\">Federal Ticaret Komisyonu<\/a>)<\/p>\n<p>11- <strong>Kripto para<\/strong>, \u00f6zellikle fidye yaz\u0131l\u0131m\u0131 s\u00f6z konusu oldu\u011funda, bir s\u00fcredir <strong>siber su\u00e7lular\u0131n tercih etti\u011fi<\/strong> bir \u00f6deme y\u00f6ntemidir. <strong>5,2 milyar ABD dolar\u0131<\/strong> de\u011ferinde giden Bitcoin i\u015flemi, en yayg\u0131n<strong> 10 fidye yaz\u0131l\u0131m\u0131<\/strong> varyant\u0131 dahil olmak \u00fczere fidye yaz\u0131l\u0131m\u0131 \u00f6demeleri ile ili\u015fkilendirilebilir. (<a href=\"https:\/\/www.fincen.gov\/news\/news-releases\/fincen-issues-report-ransomware-trends-bank-secrecy-act-data\">Banka Gizlili\u011fi Yasas\u0131 Verilerine g\u00f6re FinCEN Fidye Yaz\u0131l\u0131m Trendleri Raporu<\/a>)<\/p>\n<p>12- En uzun s\u00fcren ve en sald\u0131rgan k\u00f6t\u00fc ama\u00e7l\u0131 tehditlerden biri olan me\u015fhur <strong>Emotet botneti<\/strong> 2021 y\u0131l\u0131 ba\u015flar\u0131nda <a href=\"https:\/\/www.welivesecurity.com\/2021\/01\/28\/emotet-botnet-disrupted-global-operation\/\">geni\u015f \u00e7apl\u0131 bir k\u00fcresel emniyet g\u00fcc\u00fc operasyonu ile \u00e7\u00f6kertildi<\/a>. Bask\u0131n s\u0131ras\u0131nda<strong> 700<\/strong> kadar komuta ve kontrol sunucusu devre d\u0131\u015f\u0131 b\u0131rak\u0131ld\u0131 (<a href=\"https:\/\/www.welivesecurity.com\/2021\/01\/28\/emotet-botnet-disrupted-global-operation\/\">Europol<\/a>)<\/p>\n<p>13- D\u00fcnya genelinde mevcut siber g\u00fcvenlik profesyonellerinin say\u0131s\u0131n\u0131 \u00f6l\u00e7en Cybersecurity Workforce Estimate, 2021 y\u0131l\u0131nda bu alandaki uzmanlar\u0131n 4,2 milyon civar\u0131nda oldu\u011funu hesaplad\u0131. Bu say\u0131n\u0131n \u00f6nceki y\u0131la k\u0131yasla 700.000 art\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcyoruz. [<a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2021\/ISC2-Cybersecurity-Workforce-Study-2021.ashx\">2021 (ISC)<sup>2<\/sup> Siber G\u00fcvenlik \u0130\u015f G\u00fcc\u00fc \u00c7al\u0131\u015fmas\u0131<\/a>]<\/p>\n<p>14- Ayr\u0131ca ayn\u0131 \u00e7al\u0131\u015fmaya g\u00f6re siber g\u00fcvenlik i\u015f g\u00fcc\u00fc a\u00e7\u0131\u011f\u0131, ge\u00e7en y\u0131l oldu\u011fu gibi bu y\u0131l da azald\u0131. 2020 y\u0131l\u0131nda kurulu\u015flar\u0131n varl\u0131klar\u0131n\u0131 korumak i\u00e7in ihtiya\u00e7 duydu\u011fu ek siber g\u00fcvenlik uzman\u0131 say\u0131s\u0131 3,12 milyon iken bu say\u0131 2021 y\u0131l\u0131nda 2,72 milyona indi. [<a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2021\/ISC2-Cybersecurity-Workforce-Study-2021.ashx\">2021 (ISC)<sup>2<\/sup> Siber G\u00fcvenlik \u0130\u015f G\u00fcc\u00fc \u00c7al\u0131\u015fmas\u0131<\/a>]<\/p>\n<p>15- Kurulu\u015flar\u0131n kritik varl\u0131klar\u0131n\u0131 etkili bir bi\u00e7imde korumak i\u00e7in gereken <strong>siber g\u00fcvenlik profesyoneli<\/strong> say\u0131s\u0131ndaki azalmay\u0131 telafi etmek \u00fczere d\u00fcnya genelindeki <strong>siber g\u00fcvenlik i\u015f g\u00fcc\u00fcn\u00fcn<\/strong> <strong>%65<\/strong>\u2019lik bir art\u0131\u015f g\u00f6stermesi gerekir. [<a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Research\/2021\/ISC2-Cybersecurity-Workforce-Study-2021.ashx\">2021 (ISC)<sup>2<\/sup> Siber G\u00fcvenlik \u0130\u015f G\u00fcc\u00fc \u00c7al\u0131\u015fmas\u0131<\/a>]<\/p>\n<p>16- Kurulu\u015flar\u0131n y\u00fczde 82\u2019si siber g\u00fcvenlik b\u00fct\u00e7elerini ge\u00e7ti\u011fimiz y\u0131la oranla artt\u0131rd\u0131\u011f\u0131n\u0131 kabul ediyor ve bu b\u00fct\u00e7enin, toplam BT harcamas\u0131n\u0131n<strong> %15<\/strong>\u2019ine kadar ula\u015fabildi\u011fini ifade ediyor. (Accenture\u2019\u0131n <a href=\"https:\/\/www.accenture.com\/us-en\/insights\/security\/invest-cyber-resilience\">Siber g\u00fcvenlik dayan\u0131kl\u0131l\u0131\u011f\u0131n\u0131n durumu 2021<\/a>\u00a0raporu)<\/p>\n<p>17- Ge\u00e7ti\u011fimiz y\u0131llarda tehdit akt\u00f6rleri, sistemlere fidye yaz\u0131l\u0131m\u0131 bula\u015ft\u0131rman\u0131n \u00f6tesine ge\u00e7ip verileri \u00e7alarak halka satmak veya if\u015fa etmek \u00fczere<strong> \u00e7ifte \u015fantaj uygulamaya<\/strong> ba\u015flad\u0131. \u00c7al\u0131nan verileri s\u0131zd\u0131rma tehditleri 2020 y\u0131l\u0131nda <strong>y\u00fczde 8,7<\/strong> iken 2021 y\u0131l\u0131n\u0131n ikinci \u00e7eyre\u011finde \u00e7ok b\u00fcy\u00fck bir art\u0131\u015f g\u00f6stererek y\u00fczde 81\u2019e ula\u015ft\u0131. (<a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2021\">ENISA Tehdit Ortam\u0131 2021<\/a>)<\/p>\n<p>18- <strong>Fidye yaz\u0131l\u0131m\u0131<\/strong> sald\u0131r\u0131s\u0131n\u0131n etkilerini ortadan kald\u0131rman\u0131n genel maliyetinde \u00f6nemli bir art\u0131\u015f g\u00f6r\u00fcl\u00fcyor. 2020 y\u0131l\u0131nda bu maliyet <strong>761.106 ABD dolar\u0131<\/strong> iken 2021 y\u0131l\u0131nda bir <strong>fidye yaz\u0131l\u0131m sald\u0131r\u0131s\u0131<\/strong>n\u0131 telafi etmenin genel maliyeti m\u00fcthi\u015f bir derecede artarak <strong>1,85 milyon ABD dolar\u0131<\/strong>na y\u00fckseldi. (<a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2021\">ENISA Tehdit Ortam\u0131 2021<\/a>)<\/p>\n<p>19- <strong>Da\u011f\u0131n\u0131k Hizmet Aktarma (DDoS) sald\u0131r\u0131lar\u0131<\/strong>n\u0131n say\u0131s\u0131 da <strong>COVID-19 pandemisi<\/strong> dolay\u0131s\u0131yla art\u0131\u015f g\u00f6steriyor. 2020\u2019de bu sald\u0131r\u0131lar\u0131n say\u0131s\u0131 bir \u00f6nceki y\u0131la k\u0131yasla <strong>1,6 milyon<\/strong> artarak<strong> 10 milyonu<\/strong> a\u015ft\u0131. (<a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2021\">ENISA Tehdit Ortam\u0131 2021<\/a>)<\/p>\n<p>20- 2020 y\u0131l\u0131nda <strong>Federal Soru\u015fturma B\u00fcrosu\u2019na (FBI)<\/strong> ba\u011fl\u0131 <strong>\u0130nternet Su\u00e7 Merkezi (IC3)<\/strong>, 791.790<strong> siber su\u00e7 \u015fikayeti<\/strong> ile rekor k\u0131rd\u0131 ve bu \u015fikayetlerin yakla\u015f\u0131k <strong>4,2 milyar<\/strong> ABD dolar\u0131 kayba neden oldu\u011funu bildirdi. (<a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\">FBI 2020 \u0130nternet Su\u00e7 Raporu<\/a>)<\/p>\n<p><a href=\"https:\/\/www.welivesecurity.com\/2020\/03\/13\/415pm-urgent-message-ceo-fraud\/\">21- Kurumsal E-posta Tehdidi (BEC)<\/a>\u00a0doland\u0131r\u0131c\u0131l\u0131klar\u0131, FBI\u2019\u0131n en son mevcut verilerine g\u00f6re 2020 y\u0131l\u0131nda 1,86 milyar ABD dolar\u0131n\u0131n \u00fczerinde kay\u0131p ile en \u00e7ok maddi zarara u\u011fratan<strong> siber su\u00e7tur<\/strong>. En \u00e7ok maddi zarara yol a\u00e7an<strong> ikinci doland\u0131r\u0131c\u0131l\u0131k<\/strong> t\u00fcr\u00fc olan g\u00fcven\/romantik ili\u015fki doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 alan\u0131nda kay\u0131tl\u0131 kay\u0131plar \u201cyaln\u0131zca\u201d<strong> 600 milyon ABD dolar\u0131<\/strong> civar\u0131ndad\u0131r. (<a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\">2020 \u0130nternet Su\u00e7 Raporu<\/a>)<\/p>\n<p>22- <strong>Ya\u015fl\u0131 ki\u015filer<\/strong> de <strong>siber su\u00e7tan<\/strong> etkilendi. Sahtekarl\u0131klar\u0131n neden oldu\u011fu toplam kayb\u0131n neredeyse %28\u2019i <strong>60 ya\u015f \u00fcst\u00fc<\/strong> kurbanlard\u0131. Bu rakam ya\u015fl\u0131 kurbanlar i\u00e7in ortalama<strong> 1 milyar ABD dolar<\/strong> kay\u0131p anlam\u0131na gelir. (<a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3ElderFraudReport.pdf\">IC3 2020 Ya\u015fl\u0131 Ki\u015filerle \u0130lgili Doland\u0131r\u0131c\u0131l\u0131k Raporu<\/a>)<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Turkish. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. ESET, yeni bir y\u0131la ba\u015flarken en son siber g\u00fcvenlik trendleri hakk\u0131ndaki geli\u015fmelerin hat\u0131rlanmas\u0131na yard\u0131mc\u0131 olacak istatistiki bilgileri bir araya getirdi. 2022 y\u0131l\u0131 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":148611,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[53,157],"tags":[99844,99840,99845,66021,99841,99843,55724,99541,99842,65918,99839],"views":182,"_links":{"self":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/148609"}],"collection":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/comments?post=148609"}],"version-history":[{"count":0,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/148609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media\/148611"}],"wp:attachment":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media?parent=148609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/categories?post=148609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/tags?post=148609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}