{"id":8467,"date":"2026-04-09T12:52:54","date_gmt":"2026-04-09T09:52:54","guid":{"rendered":"https:\/\/www.teknolojidergisi.net\/?p=8467"},"modified":"2026-04-09T12:52:55","modified_gmt":"2026-04-09T09:52:55","slug":"hpe-threat-labs-raporu-siber-saldirganlarin-saldirilari-buyutmek-ve-hizlandirmak-icin-is-modellerini-donusturdugunu-ortaya-koydu","status":"publish","type":"post","link":"https:\/\/www.teknolojidergisi.net\/?p=8467","title":{"rendered":"HPE Threat Labs raporu, siber sald\u0131rganlar\u0131n sald\u0131r\u0131lar\u0131 b\u00fcy\u00fctmek ve h\u0131zland\u0131rmak i\u00e7in i\u015f modellerini d\u00f6n\u00fc\u015ft\u00fcrd\u00fc\u011f\u00fcn\u00fc ortaya koydu"},"content":{"rendered":"\n<p>&nbsp;<a href=\"https:\/\/www.hpe.com\/us\/en\/home.html\" target=\"_blank\" rel=\"noreferrer noopener\">HPE<\/a>&nbsp;(NYSE: HPE), \u201c<a href=\"https:\/\/www.hpe.com\/psnow\/doc\/a50014950enw\" target=\"_blank\" rel=\"noreferrer noopener\"><em>In the Wild<\/em><\/a>\u201d adl\u0131 ilk siber tehdit ara\u015ft\u0131rma raporunun sonu\u00e7lar\u0131n\u0131 a\u00e7\u0131klad\u0131. Rapor, g\u00fcn\u00fcm\u00fcz siber sald\u0131rganlar\u0131n\u0131n k\u00fcresel end\u00fcstrilerde ve kritik kamu sekt\u00f6rlerinde faaliyetlerini nas\u0131l \u00f6l\u00e7eklendirdiklerine dair \u00e7arp\u0131c\u0131 de\u011fi\u015fimlere i\u015faret ediyor. HPE\u2019nin 2025 y\u0131l\u0131 boyunca d\u00fcnya genelinde g\u00f6zlemledi\u011fi canl\u0131 tehdit faaliyetlerine dayanan analizine g\u00f6re, siber su\u00e7lar end\u00fcstriyel bir boyuta ula\u015fm\u0131\u015f durumda. Sald\u0131rganlar, otomasyonu ve uzun s\u00fcredir var olan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak kampanyalar\u0131n\u0131 \u00f6l\u00e7eklendiriyor ve y\u00fcksek de\u011ferli hedefleri, savunma mekanizmalar\u0131n\u0131n yan\u0131t vermesine f\u0131rsat b\u0131rakmadan tekrar tekrar ele ge\u00e7irebiliyor. Kurumlar i\u00e7in s\u00f6z konusu agresif tehdit kampanyalar\u0131n\u0131n \u00fcstesinden gelmek ve a\u011flar\u0131n dijital g\u00fcvenli\u011fini korumak, temel bir i\u015f \u00f6nceli\u011fi haline gelmi\u015f durumda.<\/p>\n\n\n\n<p>Rapor, k\u00fcresel siber tehdit ortam\u0131n\u0131 \u00f6l\u00e7ek, organizasyon ve h\u0131z a\u00e7\u0131s\u0131ndan g\u00f6zler \u00f6n\u00fcne seriyor. 1 Ocak ile 31 Aral\u0131k 2025 tarihleri aras\u0131nda d\u00fcnya genelinde g\u00f6zlemlenen 1.186 aktif tehdit kampanyas\u0131n\u0131n siber analizine dayanan bulgular, profesyonellik, otomasyon ve stratejik hedefleme etraf\u0131nda \u015fekillenen, h\u0131zla evrilen bir siber sald\u0131r\u0131 ekosistemine i\u015faret ediyor. Sald\u0131rganlar, tekrar kullan\u0131labilir altyap\u0131lar\u0131 ve uzun s\u00fcredir var olan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak \u00f6zellikle y\u00fcksek de\u011ferli sekt\u00f6rleri hedef al\u0131yor.<\/p>\n\n\n\n<p>HPE Threat Labs Ba\u015fkan\u0131 Mounir Hahad,&nbsp;<em>\u2018In the Wild, kurumlar\u0131n her g\u00fcn kar\u015f\u0131 kar\u015f\u0131ya kald\u0131\u011f\u0131 ger\u00e7ekleri yans\u0131t\u0131yor. Ara\u015ft\u0131rmam\u0131z kontroll\u00fc laboratuvar ortamlar\u0131nda yap\u0131lan teorik testlere de\u011fil, ger\u00e7ek d\u00fcnyadaki tehdit faaliyetlerine dayan\u0131yor. Sald\u0131rganlar\u0131n aktif kampanyalarda nas\u0131l davrand\u0131\u011f\u0131n\u0131, nas\u0131l uyum sa\u011flad\u0131\u011f\u0131n\u0131 ve nerelerde ba\u015far\u0131 elde etti\u011fini ortaya koyuyor. Sundu\u011fumuz g\u00f6zlemler ve i\u00e7g\u00f6r\u00fcler kurumlar\u0131n tespit yeteneklerini keskinle\u015ftirmelerine, savunmalar\u0131 g\u00fc\u00e7lendirmelerine, verilerini, altyap\u0131lar\u0131n\u0131 ve operasyonlar\u0131n\u0131 etkileme olas\u0131l\u0131\u011f\u0131 en y\u00fcksek olan tehditler hakk\u0131nda daha net bir g\u00f6r\u00fcn\u00fcm sunmaya yard\u0131mc\u0131 oluyor. Bu da giderek daha organize ve kal\u0131c\u0131 hale gelen sald\u0131r\u0131lar kar\u015f\u0131s\u0131nda daha g\u00fc\u00e7l\u00fc g\u00fcvenlik, daha h\u0131zl\u0131 m\u00fcdahale ve daha y\u00fcksek dayan\u0131kl\u0131l\u0131k anlam\u0131na geliyor.\u201d<\/em><\/p>\n\n\n\n<p><strong>End\u00fcstriyel \u00f6l\u00e7ekte altyap\u0131, modern tehdit kampanyalar\u0131n\u0131 besliyor<\/strong><\/p>\n\n\n\n<p>Yay\u0131nlanan ilk raporun g\u00f6sterdi\u011fi \u00fczere, HPE Threat Labs hem sald\u0131r\u0131 hacminde hem sald\u0131rganlar\u0131n taktik ve tekniklerinin karma\u015f\u0131kl\u0131\u011f\u0131nda art\u0131\u015f g\u00f6zlemledi. Devlet destekli casusluk gruplar\u0131 ve organize siber su\u00e7 operasyonlar\u0131 dahil olmak \u00fczere tehdit akt\u00f6rleri, operasyonlar\u0131n\u0131 giderek b\u00fcy\u00fck i\u015fletmelere benzer \u015fekilde y\u00fcr\u00fct\u00fcyor. Geni\u015f ve end\u00fcstriyel \u00f6l\u00e7ekte sald\u0131r\u0131 altyap\u0131lar\u0131n\u0131 devreye almak i\u00e7in hiyerar\u015fik organizasyon yap\u0131lar\u0131ndan, uzmanla\u015fm\u0131\u015f ekiplerden, h\u0131zl\u0131 koordinasyondan, yayg\u0131n olarak kullan\u0131lan i\u015f uygulamalar\u0131ndan ve belgelerden destek al\u0131yor.<\/p>\n\n\n\n<p>K\u00fcresel \u00f6l\u00e7ekte en \u00e7ok hedef al\u0131nan sekt\u00f6r olan kamu sekt\u00f6r\u00fc, federal, eyalet ve yerel y\u00f6netim birimlerini kapsayan 274 kampanya ile ilk s\u0131rada yer ald\u0131. Finans ve teknoloji sekt\u00f6rleri ise s\u0131ras\u0131yla 211 ve 179 kampanya ile onu takip etti. Bu durum, sald\u0131rganlar\u0131n y\u00fcksek de\u011ferli veriye ve finansal kazanca olan ilgisinin s\u00fcrd\u00fc\u011f\u00fcn\u00fc g\u00f6steriyor. Savunma, \u00fcretim, telekom\u00fcnikasyon, sa\u011fl\u0131k ve e\u011fitim kurulu\u015flar\u0131 da yo\u011fun \u015fekilde hedef al\u0131nan sekt\u00f6rler aras\u0131ndayd\u0131. T\u00fcm bu bulgular, sald\u0131rganlar\u0131n ulusal altyap\u0131, hassas veriler ve ekonomik istikrarla ba\u011flant\u0131l\u0131 sekt\u00f6rlere stratejik olarak \u00f6ncelik verdi\u011fini ortaya koyarken, hi\u00e7bir sekt\u00f6r\u00fcn sald\u0131r\u0131lara kar\u015f\u0131 ba\u011f\u0131\u015f\u0131kl\u0131\u011f\u0131 olmad\u0131\u011f\u0131n\u0131 da vurguluyor.<\/p>\n\n\n\n<p>Y\u0131l boyunca tehdit akt\u00f6rleri 147 binden fazla zararl\u0131 alan ad\u0131, yakla\u015f\u0131k 58 bin k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m dosyas\u0131 kulland\u0131 ve 549 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 aktif olarak hedef ald\u0131. Siber su\u00e7lar\u0131n profesyonel yakla\u015f\u0131m\u0131 sald\u0131r\u0131lar\u0131n uygulanma bi\u00e7imini daha \u00f6ng\u00f6r\u00fclebilir hale getirse de kar\u015f\u0131 koymay\u0131 zorla\u015ft\u0131r\u0131yor. \u00c7\u00fcnk\u00fc operasyonun tek bir bile\u015fenini ortadan kald\u0131rmak, genellikle daha geni\u015f kapsama sahip olan kampanyay\u0131 durdurmaya yetmiyor.<\/p>\n\n\n\n<p><strong>Otomasyon ve yapay zeka ara\u00e7lar\u0131, sald\u0131rganlar\u0131n h\u0131z\u0131n\u0131 ve etkisini art\u0131r\u0131yor<\/strong><\/p>\n\n\n\n<p>Rapor, sald\u0131rganlar\u0131n h\u0131z ve etkiyi art\u0131rmak i\u00e7in yeni teknikler benimsedi\u011fini g\u00f6steriyor. Baz\u0131 sald\u0131r\u0131 operasyonlar\u0131, \u00e7al\u0131nan verileri ger\u00e7ek zamanl\u0131 olarak d\u0131\u015far\u0131 aktarmak i\u00e7in Telegram gibi platformlar \u00fczerinden otomatik \u201c\u00fcretim hatt\u0131\u201d i\u015f ak\u0131\u015flar\u0131n\u0131 kulland\u0131. Di\u011ferleri, hedefli video oltalama (vishing) ve \u00fcst d\u00fczey y\u00f6netici kimli\u011fine b\u00fcr\u00fcnmek i\u00e7in sentetik sesler ve deepfake videolar \u00fcretmek amac\u0131yla \u00fcretken yapay zekadan yararland\u0131. Bir fidye grubu ise i\u015fi s\u0131zma stratejisini optimize etmek i\u00e7in sanal \u00f6zel a\u011f (VPN) a\u00e7\u0131klar\u0131 \u00fczerine pazar ara\u015ft\u0131rmas\u0131 yapmaya kadar g\u00f6t\u00fcrd\u00fc.&nbsp;<\/p>\n\n\n\n<p>Bu taktikler, tehdit akt\u00f6rlerinin daha h\u0131zl\u0131 hareket etmesine, daha fazla hedefe ula\u015fmas\u0131na ve ulusal altyap\u0131ya, kritik verilere ve ekonomik istikrarla ba\u011flant\u0131l\u0131 sekt\u00f6rlere odaklanmas\u0131na olanak sa\u011flad\u0131. Operasyonlar\u0131n\u0131 sadele\u015ftirip y\u00fcksek de\u011ferli hedeflere \u00f6ncelik vererek ve stratejik \u015fekilde \u201cparan\u0131n izini s\u00fcrerek\u201d, finansal kazan\u00e7 elde etme s\u00fcre\u00e7lerini daha verimli hale getirdiler.&nbsp;<\/p>\n\n\n\n<p><strong>Siber dayan\u0131kl\u0131l\u0131\u011f\u0131 g\u00fc\u00e7lendirmek i\u00e7in pratik ad\u0131mlar<\/strong><\/p>\n\n\n\n<p>Rapor, etkili bir savunman\u0131n daha fazla ara\u00e7 eklemekten ziyade a\u011f genelinde koordinasyon, g\u00f6r\u00fcn\u00fcrl\u00fck ve m\u00fcdahale kabiliyetini geli\u015ftirmeye ba\u011fl\u0131 oldu\u011funu vurguluyor. Kurumlara g\u00fcvenli\u011fi iyile\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 atmalar\u0131 \u00f6neriliyor:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kurum i\u00e7i ekipler, m\u00fc\u015fteriler ve sekt\u00f6rler aras\u0131nda tehdit istihbarat\u0131n\u0131 payla\u015farak\u00a0<strong>silo yap\u0131lar\u0131n\u0131 ortadan kald\u0131rabilirsiniz<\/strong>. A\u011f ve g\u00fcvenli\u011fi birle\u015ftirmek ve sald\u0131r\u0131 kal\u0131plar\u0131n\u0131 daha erken ortaya \u00e7\u0131karmak i\u00e7in secure access service edge (SASE) yakla\u015f\u0131m\u0131n\u0131 kullanabilirsiniz.<\/li>\n\n\n\n<li>VPN\u2019ler, SharePoint ve u\u00e7 cihazlar gibi\u00a0<strong>yayg\u0131n giri\u015f noktalar\u0131n\u0131 yamalayarak<\/strong>\u00a0riski azaltabilir ve a\u011fa y\u00f6nelik s\u0131k kullan\u0131lan sald\u0131r\u0131 yollar\u0131n\u0131 kapatabilirsiniz.<\/li>\n\n\n\n<li>Kimlik do\u011frulamay\u0131 g\u00fc\u00e7lendirmek ve yatay hareketi s\u0131n\u0131rlamak i\u00e7in\u00a0<strong>s\u0131f\u0131r g\u00fcven ilkelerini uygulayabilirsiniz<\/strong>. S\u0131f\u0131r g\u00fcven a\u011f eri\u015fimi (ZTNA), eri\u015fim izni vermeden \u00f6nce kullan\u0131c\u0131lar\u0131 ve cihazlar\u0131 s\u00fcrekli do\u011frular.<\/li>\n\n\n\n<li>Tehdit istihbarat\u0131, aldatma teknolojileri ve yapay zeka yerle\u015fik tespit y\u00f6ntemleriyle\u00a0<strong>g\u00f6r\u00fcn\u00fcrl\u00fck ve m\u00fcdahale kabiliyetinizi art\u0131rabilirsiniz<\/strong>. B\u00f6ylece kurumlar sald\u0131r\u0131lar\u0131 daha h\u0131zl\u0131 ve daha do\u011fru \u015fekilde tespit edebilir, analiz edebilir ve yan\u0131t verebilir.<\/li>\n\n\n\n<li><strong>G\u00fcvenli\u011fi kurumsal a\u011f\u0131n \u00f6tesine ta\u015f\u0131yarak<\/strong>\u00a0ev a\u011flar\u0131n\u0131, \u00fc\u00e7\u00fcnc\u00fc taraf ara\u00e7lar\u0131 ve tedarik zinciri ortamlar\u0131n\u0131 da kapsayabilirsiniz.<\/li>\n<\/ul>\n\n\n\n<p>Bu ad\u0131mlar, kurumlar\u0131n daha h\u0131zl\u0131 hareket etmesine, riski azaltmas\u0131na ve giderek daha organize ve kal\u0131c\u0131 hale gelen tehditlere kar\u015f\u0131 daha g\u00fc\u00e7l\u00fc bir \u015fekilde savunma yapmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<p><strong>Birle\u015fik HPE Threat Labs, a\u011f savunmas\u0131 i\u00e7in \u00e7\u0131tay\u0131 y\u00fckseltiyor<\/strong><\/p>\n\n\n\n<p>HPE, geli\u015fen tehdit ortam\u0131n\u0131 ele almak i\u00e7in uzun y\u0131llara dayanan uzmanl\u0131k \u00fczerine in\u015fa edilen HPE Threat Labs\u2019i hayata ge\u00e7irdi. HPE ve Juniper Networks\u2019\u00fcn d\u00fcnya \u00e7ap\u0131ndaki g\u00fcvenlik ara\u015ft\u0131rma yetkinli\u011fi ve istihbarat\u0131n\u0131 bir araya getiren HPE Threat Labs, derin uzmanl\u0131\u011f\u0131 tek \u00e7at\u0131 alt\u0131nda toplarken, ger\u00e7ek d\u00fcnyadaki tehditleri belirlemek ve izlemek i\u00e7in \u00e7ok daha geni\u015f bir veri havuzu olu\u015fturuyor. Ayr\u0131ca, zararl\u0131 sald\u0131r\u0131lar\u0131 etkili bir \u015fekilde tespit edip engellemek i\u00e7in gerekli tehdit istihbarat\u0131n\u0131 do\u011frudan HPE \u00fcr\u00fcnlerine entegre ediyor.<\/p>\n\n\n\n<p>HPE Networking SASE ve G\u00fcvenlikten sorumlu K\u0131demli Ba\u015fkan Yard\u0131mc\u0131s\u0131 ve Genel M\u00fcd\u00fcr\u00fc David Hughes,&nbsp;<em>\u201cHPE Threat Labs, ileri d\u00fczey ara\u015ft\u0131rmalar ile ger\u00e7ek d\u00fcnyadaki g\u00fcvenlik sonu\u00e7lar\u0131 aras\u0131ndaki bo\u015flu\u011fu kapatmak i\u00e7in kuruldu\u201d<\/em>&nbsp;dedi.&nbsp;<em>\u201cIn the Wild raporu, g\u00fcn\u00fcm\u00fcz sald\u0131rganlar\u0131n\u0131n k\u00fcresel i\u015fletmelerin disiplin, \u00f6l\u00e7ek ve verimlili\u011fiyle hareket etti\u011fini g\u00f6steriyor. Onlara kar\u015f\u0131 savunma da ayn\u0131 d\u00fczeyde strateji, entegrasyon ve operasyonel disiplin gerektiriyor. HPE Threat Labs, tehdit istihbarat\u0131n\u0131 \u00fcr\u00fcnlerimize uyarlayarak kurumlar\u0131n riski azaltmas\u0131na, kesintileri s\u0131n\u0131rlamas\u0131na ve i\u015flerinin ba\u011fl\u0131 oldu\u011fu sistemleri korumas\u0131na yard\u0131mc\u0131 oluyor.\u201d<\/em>&nbsp;<\/p>\n\n\n\n<p>HPE Threat Labs 2026 In the Wild Tehdit Raporu \u015fu anda&nbsp;<a href=\"https:\/\/www.hpe.com\/psnow\/doc\/a50014950enw\" target=\"_blank\" rel=\"noreferrer noopener\">eri\u015fime a\u00e7\u0131k<\/a>&nbsp;olup, modern sald\u0131rganlar\u0131n nas\u0131l hareket etti\u011fini ve nas\u0131l durdurulabilece\u011fini anlamak isteyen CISO\u2019lar, g\u00fcvenlik liderleri ve BT karar vericileri i\u00e7in haz\u0131rland\u0131.&nbsp;<\/p>\n\n\n\n<p><strong>Metodoloji<\/strong><\/p>\n\n\n\n<p>HPE Threat Labs, HPE Threat Labs 2026&nbsp;<em>In the Wild<\/em>&nbsp;Tehdit Raporundaki bulgular\u0131 birden fazla istihbarat kayna\u011f\u0131n\u0131 kullanarak derledi. \u0130statistiksel verilerin b\u00fcy\u00fck b\u00f6l\u00fcm\u00fc, Juniper Advanced Threat Prevention Cloud m\u00fc\u015fteri telemetrisi ve \u00f6zel bir k\u00fcresel honeypot a\u011f\u0131ndan elde edildi. TCP, SSH ve SMB varyantlar\u0131n\u0131 i\u00e7eren bu honeypot\u2019lar, farkl\u0131 tehdit faaliyetlerini yakalamak amac\u0131yla d\u00fcnya genelinde konumland\u0131r\u0131lm\u0131\u015ft\u0131r. Ara\u015ft\u0131rma, uygun olan durumlarda a\u00e7\u0131k kaynak tehdit istihbarat\u0131 depolar\u0131ndan ve se\u00e7ili \u00fc\u00e7\u00fcnc\u00fc taraf sekt\u00f6r kurulu\u015flar\u0131ndan al\u0131nan ba\u011flamsal veriler ve istatistiklerle desteklenmi\u015ftir. Bu raporda sunulan veriler, 1 Ocak 2025 &#8211; 31 Aral\u0131k 2025 tarihleri aras\u0131ndaki d\u00f6nemi kapsamaktad\u0131r.<\/p>\n\n\n\n<p><strong>\u0130lgili Kaynaklar:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.hpe.com\/psnow\/doc\/a50014950enw\" target=\"_blank\" rel=\"noreferrer noopener\">HPE Threat Labs\u00a0<em>2026 In the Wild Threat Report<\/em><\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>HPE\u2019den Haberler:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.hpe.com\/us\/en\/newsroom\/press-release\/2025\/08\/hpe-unveils-new-ai-driven-security-and-advanced-data-protection-innovations-at-black-hat-usa-2025.html\" target=\"_blank\" rel=\"noreferrer noopener\">HPE unveils new AI-driven security and advanced data protection innovations at Black Hat USA 2025<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.hpe.com\/us\/en\/newsroom\/press-release\/2025\/05\/hpe-networking-instant-on-secure-gateway-brings-robust-enterprise-grade-security-to-small-and-medium-businesses.html\" target=\"_blank\" rel=\"noreferrer noopener\">HPE Networking Instant On Secure Gateway brings robust enterprise-grade security to small and medium businesses<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.hpe.com\/us\/en\/newsroom\/press-release\/2025\/04\/hewlett-packard-enterprise-redefines-cloud-based-security-with-expansive-solutions-for-zero-trust-networking-and-private-cloud-operations.html\" target=\"_blank\" rel=\"noreferrer noopener\">Hewlett Packard Enterprise redefines cloud-based security with expansive solutions for zero trust networking and private cloud operations<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>HPE<\/strong><strong>&nbsp; Hakk\u0131nda<\/strong><\/p>\n\n\n\n<p>HPE (NYSE: HPE), kurulu\u015flar\u0131n daha fazlas\u0131n\u0131 ba\u015farmas\u0131na yard\u0131mc\u0131 olmak i\u00e7in yapay zeka, bulut ve a\u011f teknolojilerinin g\u00fcc\u00fcn\u00fc bir araya getiren, kritik kurumsal teknolojiler alan\u0131nda lider bir \u015firkettir. Olas\u0131l\u0131klar\u0131n \u00f6nc\u00fcs\u00fc olarak, inovasyonlar\u0131m\u0131z ve uzmanl\u0131\u011f\u0131m\u0131z insanlar\u0131n ya\u015fama ve \u00e7al\u0131\u015fma bi\u00e7imini ileriye ta\u015f\u0131yor. Farkl\u0131 sekt\u00f6rlerdeki m\u00fc\u015fterilerimizi operasyonel performans\u0131 optimize etmeleri, veriyi \u00f6ng\u00f6r\u00fcye d\u00f6n\u00fc\u015ft\u00fcrmeleri ve etkilerini en \u00fcst d\u00fczeye \u00e7\u0131karmalar\u0131 i\u00e7in g\u00fc\u00e7lendiriyoruz. En iddial\u0131 hedeflerinizi HPE ile ger\u00e7e\u011fe d\u00f6n\u00fc\u015ft\u00fcr\u00fcn. Daha fazlas\u0131n\u0131 ke\u015ffetmek i\u00e7in:&nbsp;<a href=\"http:\/\/www.hpe.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.hpe.com<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;HPE&nbsp;(NYSE: HPE), \u201cIn the Wild\u201d adl\u0131 ilk siber tehdit ara\u015ft\u0131rma raporunun sonu\u00e7lar\u0131n\u0131 a\u00e7\u0131klad\u0131. Rapor, g\u00fcn\u00fcm\u00fcz siber sald\u0131rganlar\u0131n\u0131n k\u00fcresel end\u00fcstrilerde ve kritik kamu sekt\u00f6rlerinde faaliyetlerini nas\u0131l \u00f6l\u00e7eklendirdiklerine dair \u00e7arp\u0131c\u0131 de\u011fi\u015fimlere i\u015faret ediyor. HPE\u2019nin 2025 y\u0131l\u0131 boyunca d\u00fcnya genelinde g\u00f6zlemledi\u011fi canl\u0131 tehdit faaliyetlerine dayanan analizine g\u00f6re, siber su\u00e7lar end\u00fcstriyel bir boyuta ula\u015fm\u0131\u015f durumda. Sald\u0131rganlar, otomasyonu ve uzun s\u00fcredir var olan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak kampanyalar\u0131n\u0131 \u00f6l\u00e7eklendiriyor ve y\u00fcksek de\u011ferli hedefleri, savunma mekanizmalar\u0131n\u0131n yan\u0131t vermesine f\u0131rsat b\u0131rakmadan tekrar tekrar ele ge\u00e7irebiliyor. Kurumlar i\u00e7in s\u00f6z konusu agresif tehdit kampanyalar\u0131n\u0131n \u00fcstesinden gelmek ve a\u011flar\u0131n dijital g\u00fcvenli\u011fini korumak, temel bir i\u015f \u00f6nceli\u011fi haline gelmi\u015f durumda. Rapor, k\u00fcresel<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-8467","post","type-post","status-publish","format-standard","hentry","category-donanim"],"_links":{"self":[{"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=\/wp\/v2\/posts\/8467"}],"collection":[{"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8467"}],"version-history":[{"count":1,"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=\/wp\/v2\/posts\/8467\/revisions"}],"predecessor-version":[{"id":8468,"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=\/wp\/v2\/posts\/8467\/revisions\/8468"}],"wp:attachment":[{"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teknolojidergisi.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}