{"id":41842,"date":"2021-06-14T12:53:00","date_gmt":"2021-06-14T11:53:00","guid":{"rendered":"https:\/\/www.soitron.com\/?p=41842"},"modified":"2023-12-04T16:49:13","modified_gmt":"2023-12-04T15:49:13","slug":"vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/","title":{"rendered":"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru"},"content":{"rendered":"\n<p><strong>Kyber\u00fato\u010dn\u00edkem se dnes b\u011bhem chvilky m\u016f\u017ee st\u00e1t ka\u017ed\u00fd a nepot\u0159ebuje k&nbsp;tomu z&nbsp;tohoto oboru um\u011bt zhola nic. Sta\u010d\u00ed proj\u00edt form\u00e1ln\u00edm p\u0159ij\u00edmac\u00edm \u0159\u00edzen\u00edm na \u201edarknetu\u201c, vlastnit mobil, nebo USB flash disk a m\u00edt on-line \u010di off-line p\u0159\u00edstup do firmy. B\u011bhem chvilky na\u0161tvan\u00fd zam\u011bstnanec, n\u00e1v\u0161t\u011bva ve firm\u011b, konkurence nebo jen potenci\u00e1ln\u00ed uchaze\u010d o pr\u00e1ci m\u016f\u017ee vytipovan\u00e9 organizaci p\u0159ivodit mnohamilionov\u00e9 \u0161kody, odstavit jej\u00ed v\u00fdrobu a s\u00e1m si p\u0159ij\u00edt na nesm\u00edrn\u00fd bal\u00edk pen\u011bz.<\/strong><\/p>\n\n\n\n<p>Odv\u011btv\u00ed kyberkriminality se obrovsk\u00fdm zp\u016fsobem vyv\u00edj\u00ed a p\u0159izp\u016fsobuje nov\u00fdm digit\u00e1ln\u00edm n\u00e1vyk\u016fm. Pandemie nav\u00edc tento p\u0159irozen\u00fd jev akcelerovala ne\u010dekan\u00fdm zp\u016fsobem, a tak se po\u010d\u00edta\u010dov\u00e1 kriminalita stala vysoce lukrativn\u00ed a organizovanou v\u00fdnosnou \u010dinnost\u00ed.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eV\u00fdvoj v&nbsp;tomto oboru do\u0161el dokonce tak daleko, \u017ee kyberneti\u010dt\u00ed zlo\u010dinci prost\u0159ednictv\u00edm st\u00e1le se vylep\u0161uj\u00edc\u00edho obchodn\u00edho modelu poskytuj\u00ed sv\u00e9 slu\u017eby a hackersk\u00e9 n\u00e1stroje komukoliv, kdo je ochoten za n\u011b zaplatit nebo se rozd\u011blit o zisk,\u201c <\/em><strong>vysv\u011btluje<\/strong> <strong>Martin Lohnert, bezpe\u010dnostn\u00ed odborn\u00edk spole\u010dnosti Soitron<\/strong>. \u201eM\u016f\u017eeme to p\u0159irovnat k&nbsp;partnersk\u00fdm model\u016fm prodeje zn\u00e1m\u00fdm z&nbsp;odv\u011btv\u00ed IT.\u201c<\/p>\n<\/blockquote>\n\n\n\n<p>Hackersk\u00e9 skupiny tak rekrutuj\u00ed a k proveden\u00ed sofistikovan\u00fdch \u00fatok\u016f pou\u017e\u00edvaj\u00ed b\u011b\u017en\u00e9 lidi nebo skupiny, kter\u00e9 naz\u00fdvaj\u00ed partnery. Tento nov\u00fd sc\u00e9n\u00e1\u0159 je v&nbsp;sou\u010dasn\u00e9 dob\u011b velmi v&nbsp;kurzu. \u00datoky se d\u00edky n\u011bmu posunuly od \u00fato\u010den\u00ed \u201ena slepo\u201c k prov\u00e1d\u011bn\u00ed vysoce zam\u011b\u0159en\u00fdch kampan\u00ed prosazovan\u00fdch prost\u0159ednictv\u00edm metody cybercrime-as-a-service.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Co je to po\u010d\u00edta\u010dov\u00e1 kriminalita jako slu\u017eba<\/strong><\/h2>\n\n\n\n<p>Cybercrime-as-a-Service (CaaS) je term\u00edn, kter\u00fd se pou\u017e\u00edv\u00e1 k popisu organizovan\u00e9ho obchodn\u00edho modelu. Sdru\u017euje v\u00fdvoj\u00e1\u0159e malwaru a hackery, za \u00fa\u010delem prodat nebo pronajmout sv\u00e9 n\u00e1stroje a slu\u017eby partner\u016fm na \u201edarknetu\u201c. D\u00edky tomu jsou tyto prost\u0159edky pou\u017e\u00edvan\u00e9 v po\u010d\u00edta\u010dov\u00e9 kriminalit\u011b p\u0159\u00edstupn\u00e9 ka\u017ed\u00e9mu, kdo chce zah\u00e1jit kybernetick\u00fd \u00fatok &#8211; i t\u011bm, kte\u0159\u00ed nemaj\u00ed technick\u00e9 znalosti ani software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Jak je CaaS organizovan\u00e1<\/strong><\/h2>\n\n\n\n<p>Kyberzlo\u010dinci vyu\u017e\u00edvaj\u00edc\u00ed v\u00fdhod tohoto obchodn\u00edho modelu jsou dob\u0159e organizovan\u00ed.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eMohli bychom je doslova p\u0159irovnat k&nbsp;legitimn\u00edm podnik\u016fm s&nbsp;korpor\u00e1tn\u00ed kulturou, tedy s&nbsp;jasnou hierarchi\u00ed person\u00e1lu &#8211; in\u017een\u00fd\u0159i, vedouc\u00ed pracovn\u00edci, v\u00fdvoj\u00e1\u0159i, finan\u010dn\u00ed odd\u011blen\u00ed a z\u00e1stupci technick\u00e9 podpory. Posledn\u011b jmenovan\u00e1 skupina pom\u00e1h\u00e1 \u201az\u00e1kazn\u00edk\u016fm\u2018 tedy heker\u016fm, kte\u0159\u00ed maj\u00ed z\u00e1jem prov\u00e9st \u00fatok na vybran\u00fd c\u00edl, aby spr\u00e1vn\u011b pro\u0161li technickou str\u00e1nkou \u00fatok\u016f,\u201c<\/em>  <strong>zd\u016fraz\u0148uje Martin Lohnert<\/strong>. Zjednodu\u0161en\u011b by se dalo \u0159\u00edci, \u017ee jim poskytnou informace o pou\u017e\u00edv\u00e1n\u00ed hackersk\u00e9ho \u201eproduktu\u201c.<\/p>\n<\/blockquote>\n\n\n\n<p>Pokud se \u00fato\u010dn\u00edk\u016fm z&nbsp;\u0159ad partner\u016f poda\u0159\u00ed nakazit malwarem organizaci, je o tom speci\u00e1ln\u00edm t\u00fdmem v&nbsp;hierarchii hackersk\u00e9ho gangu uv\u011bdomena a ten po\u017eaduje \u201ev\u00fdkupn\u00e9\u201c. M\u016f\u017ee se tak st\u00e1t je\u0161t\u011b p\u0159ed aktivac\u00ed malwaru, nebo p\u0159\u00edpadn\u011b i po jeho spu\u0161t\u011bn\u00ed. Jestli\u017ee dojde k&nbsp;zaplacen\u00ed po\u017eadovan\u00e9 \u2013 v\u011bt\u0161inou n\u011bkolikamilionov\u00e9 \u010d\u00e1stce \u2013 nastupuj\u00ed najmut\u00ed \u201emezci pen\u011bz\u201c. Ty p\u0159esouvaj\u00ed z\u00edskan\u00e9 finan\u010dn\u00ed prost\u0159edky p\u0159es r\u016fzn\u00e9 bitcoinov\u00e9 \u201emix\u00e9ry\u201c a jin\u00e9 slu\u017eby, aby bylo obt\u00ed\u017en\u00e9 je dohledat. Jakmile jsou pen\u00edze \u201evypr\u00e1ny\u201c, jsou pot\u00e9 ulo\u017eeny na \u00fa\u010det organizovan\u00e9 skupiny.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Pro \u00fatoky jsou tvo\u0159eny speci\u00e1ln\u00ed kybernetick\u00e9 bal\u00ed\u010dky<\/strong><\/h2>\n\n\n\n<p>Kybernetick\u00e9 \u201ezbran\u011b\u201c si lze pronajmout na hodinu, den nebo m\u011bs\u00edc. A lze si je pronajmout za p\u00e1r dolar\u016f. Nap\u0159\u00edklad k zap\u016fj\u010den\u00ed n\u00e1stroje pro vykon\u00e1n\u00ed DDoS (\u00fatoku, kter\u00fd zp\u016fsob\u00ed nedostupnost str\u00e1nky \u010di slu\u017eby jej\u00edm zahlcen\u00edm) &nbsp;na jeden den sta\u010d\u00ed zaplatit kolem 60 USD. Za p\u0159ibli\u017en\u011b 400 USD si jej nap\u0159\u00edklad na\u0161tvan\u00fd zam\u011bstnanec m\u016f\u017ee pronajmout na t\u00fdden.<\/p>\n\n\n\n<p>Ceny se li\u0161\u00ed i v z\u00e1vislosti na propracovanosti \u0161kodliv\u00e9ho softv\u00e9ru. Ti, kte\u0159\u00ed cht\u011bj\u00ed prov\u00e9st jen drobn\u00fd jednor\u00e1zov\u00fd \u00fatok, si mohou zakoupit jen low-endov\u00e9 sady malwaru, kter\u00e9 stoj\u00ed m\u00e9n\u011b ne\u017e 100 USD. Ty je ale samoz\u0159ejm\u011b tak\u00e9 snadn\u011bji ohdalit a zne\u0161kodnit. Ten, kdo pl\u00e1nuje zp\u016fsobit velk\u00e9 \u0161kody, bude muset za komplexn\u011bj\u0161\u00ed malware zaplatit mnohem v\u00edc. Na druhou stranu, pokud usp\u011bje, tak se mu vr\u00e1t\u00ed n\u011bkolikan\u00e1sobn\u011b vy\u0161\u0161\u00ed \u010d\u00e1stka. N\u011bkter\u00e9 tyto ransomwarov\u00e9 \u201e\u0159e\u0161en\u00ed\u201c si lze pronajmout za 1 000 USD na m\u011bs\u00edc. Jedn\u00edm z&nbsp;t\u011bch dra\u017e\u0161\u00edch je t\u0159eba Maze Ransomware Kit, kter\u00fd stoj\u00ed kolem 84 000 USD.<\/p>\n\n\n\n<p>Hackersk\u00e9 gangy maj\u00ed zisk nejen z&nbsp;pron\u00e1jmu, nebo prodeje sv\u00fdch produkt\u016f a slu\u017eeb, ale tak\u00e9 z&nbsp;proviz\u00ed z \u00fatok\u016f. Provozovatel\u00e9 nebo v\u00fdvoj\u00e1\u0159i mohou hekersk\u00fdm \u201epartner\u016fm\u201c pomoci na m\u00edru naprogramovat nap\u0159\u00edklad sv\u016fj ransomware a na z\u00e1klad\u011b obchodn\u00edho modelu na \u00fatoku participovat t\u00edm, \u017ee z&nbsp;v\u00fdkupn\u00e9ho z\u00edskaj\u00ed provizi.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eOb\u011b strany si v\u011bt\u0161inou zisk d\u011bl\u00ed v&nbsp;pom\u011bru 60:40 nebo 70:30. To znamen\u00e1, \u017ee hekuj\u00edc\u00ed \u00fato\u010dn\u00edk z\u00edsk\u00e1 60 nebo 70 % ze zisku a v\u00fdvoj\u00e1\u0159sk\u00e9 skupin\u011b odvede provizi 30 nebo 40 %,\u201c<\/em><strong> uv\u00e1d\u00ed Martin Lohnert<\/strong>.<\/p>\n<\/blockquote>\n\n\n\n<p>V n\u011bkter\u00fdch p\u0159\u00edpadech \u201emate\u0159sk\u00e9\u201c spole\u010dnosti v\u00fdkupn\u00e9 rovnou vyzvednou, nechaj\u00ed si dohodnutou provizi a zbytek po\u0161lou \u00fato\u010dn\u00edkovi.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Pro\u010d se CaaS ob\u00e1vat<\/strong><\/h2>\n\n\n\n<p>Undergroundov\u00e1 f\u00f3ra jsou pln\u00e1 reklam na r\u016fzn\u00e9 malwarov\u00e9 sady, co\u017e je jistou zn\u00e1mkou prosperuj\u00edc\u00ed temn\u00e9 webov\u00e9 ekonomiky. Nab\u00edzej\u00ed slevy na n\u00e1kupy nad ur\u010ditou \u010d\u00e1stku, bal\u00ed\u010dky, kter\u00e9 mohou \u00fato\u010dn\u00edci kombinovat, 24hodinovou podporu, a nechyb\u00ed mo\u017enost za\u010d\u00edst se do recenz\u00ed \u010di hodnocen\u00ed z\u00e1kazn\u00edk\u016f. Jejich po\u0159\u00edzen\u00ed je jako n\u00e1kup jak\u00e9hokoli jin\u00e9ho produktu poskytuj\u00edc\u00edho software jako slu\u017ebu.<\/p>\n\n\n\n<p>Toto je extr\u00e9mn\u011b nebezpe\u010dn\u00e9 a problematick\u00e9. Tento trend jde nap\u0159ed ka\u017ed\u00e9mu, kdo hled\u00e1 rychl\u00e9 neleg\u00e1ln\u00ed pen\u00edze, aby snadno zah\u00e1jil \u00fatok. Zku\u0161en\u00fdm akt\u00e9r\u016fm hrozeb to potom d\u00e1v\u00e1 mo\u017enost rozv\u00edjet dal\u0161\u00ed n\u00e1stroje a slu\u017eby tak, aby je\u0161t\u011b v\u00edce pos\u00edlili sv\u016fj \u201earzen\u00e1l\u201c. I z&nbsp;tohoto d\u016fvodu je v posledn\u00edch letech kybernetick\u00e1 kriminalita na vzestupu a CaaS p\u0159in\u00e1\u0161\u00ed dal\u0161\u00ed mo\u017enost pro jej\u00ed akceleraci.<\/p>\n\n\n\n<p><a>\u017de opravdu jde o v\u00fdnosn\u00fd byznys, dokazuje ned\u00e1vno medializovan\u00fd p\u0159\u00edpad skupiny DarkSide, kter\u00fdch malware vy\u0159adil na 6 dn\u00ed <\/a>potrubn\u00ed syst\u00e9m pro rafinovan\u00e9 ropn\u00e9 produkty na v\u00fdchodn\u00edm pob\u0159e\u017e\u00ed USA: Spole\u010dnost Colonial Pipeline zaplatila v\u00fdkupn\u00e9 5milion\u00fa dolar\u016f a dal\u0161\u00ed \u0161et\u0159en\u00ed uk\u00e1zalo \u017ee DarkSide jen za posledn\u00edch 9 m\u011bs\u00edc\u016f zinkasovalo v\u00edc ne\u017e 90mili\u00f3n\u00fa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mus\u00ed p\u0159ij\u00edt zm\u011bny<\/strong><\/h2>\n\n\n\n<p>Pokud se nezm\u011bn\u00ed p\u0159\u00edstup organizac\u00ed k&nbsp;zabezpe\u010den\u00ed, \u0161kody budou p\u0159ib\u00fdvat a budou v\u011bt\u0161\u00ed i \u010dast\u011bj\u0161\u00ed, jak dokl\u00e1d\u00e1 i tento p\u0159\u00edklad. Gangy \u010dinn\u00e9 v po\u010d\u00edta\u010dov\u00e9 kriminalit\u011b nyn\u00ed funguj\u00ed prost\u0159ednictv\u00edm obchodn\u00edho modelu poskytovan\u00e9ho jako slu\u017eba s organizovanou hierarchi\u00ed \u201eodborn\u00edk\u016f\u201c, kte\u0159\u00ed nab\u00edzej\u00ed profesion\u00e1ln\u00ed slu\u017eby. Pro udr\u017een\u00ed ransomwaru na uzd\u011b hraje roli ka\u017ed\u00fd.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eNezbytn\u011b nutn\u00e9 je za\u010d\u00edt br\u00e1t kybernetickou bezpe\u010dnost v\u00e1\u017en\u011b. Zmapovat a sn\u00ed\u017eit potencion\u00e1ln\u00ed rizika. Stanovit a dodr\u017eovat podnikov\u00e9 standardy a vzd\u011bl\u00e1vat v&nbsp;tomto sm\u011bru i zam\u011bstnance. Jen tak lze v&nbsp;tomto boji usp\u011bt,\u201c<\/em> <strong>konkretizuje Martin Lohnert<\/strong>.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Kyber\u00fato\u010dn\u00edkem se dnes b\u011bhem chvilky m\u016f\u017ee st\u00e1t ka\u017ed\u00fd a nepot\u0159ebuje k&nbsp;tomu z&nbsp;tohoto oboru um\u011bt zhola nic. Sta\u010d\u00ed proj\u00edt form\u00e1ln\u00edm p\u0159ij\u00edmac\u00edm \u0159\u00edzen\u00edm na \u201edarknetu\u201c, vlastnit mobil, nebo USB flash disk a m\u00edt on-line \u010di off-line p\u0159\u00edstup do firmy. B\u011bhem chvilky na\u0161tvan\u00fd zam\u011bstnanec, n\u00e1v\u0161t\u011bva ve firm\u011b, konkurence nebo jen potenci\u00e1ln\u00ed uchaze\u010d o pr\u00e1ci m\u016f\u017ee vytipovan\u00e9 organizaci p\u0159ivodit [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":36392,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[266],"tags":[313],"news_categories":[371],"class_list":["post-41842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tiskove-spravy","tag-kyberneticka-bezpecnost-cs","news_categories-bezpecnost-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru - Soitron<\/title>\n<meta name=\"description\" content=\"Hackersk\u00e9 skupiny rekrutuj\u00ed a k proveden\u00ed sofistikovan\u00fdch \u00fatok\u016f pou\u017e\u00edvaj\u00ed b\u011b\u017en\u00e9 lidi nebo skupiny. Tento nov\u00fd sc\u00e9n\u00e1\u0159 je te\u010f v kurzu.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru - Soitron\" \/>\n<meta property=\"og:description\" content=\"Hackersk\u00e9 skupiny rekrutuj\u00ed a k proveden\u00ed sofistikovan\u00fdch \u00fatok\u016f pou\u017e\u00edvaj\u00ed b\u011b\u017en\u00e9 lidi nebo skupiny. Tento nov\u00fd sc\u00e9n\u00e1\u0159 je te\u010f v kurzu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-14T11:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-04T15:49:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/08\/iStock-942893738-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leona Dundrova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leona Dundrova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru - Soitron","description":"Hackersk\u00e9 skupiny rekrutuj\u00ed a k proveden\u00ed sofistikovan\u00fdch \u00fatok\u016f pou\u017e\u00edvaj\u00ed b\u011b\u017en\u00e9 lidi nebo skupiny. Tento nov\u00fd sc\u00e9n\u00e1\u0159 je te\u010f v kurzu.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru - Soitron","og_description":"Hackersk\u00e9 skupiny rekrutuj\u00ed a k proveden\u00ed sofistikovan\u00fdch \u00fatok\u016f pou\u017e\u00edvaj\u00ed b\u011b\u017en\u00e9 lidi nebo skupiny. Tento nov\u00fd sc\u00e9n\u00e1\u0159 je te\u010f v kurzu.","og_url":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/","og_site_name":"Soitron","article_published_time":"2021-06-14T11:53:00+00:00","article_modified_time":"2023-12-04T15:49:13+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/08\/iStock-942893738-1024x683.jpg","type":"image\/jpeg"}],"author":"Leona Dundrova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leona Dundrova","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/"},"author":{"name":"Leona Dundrova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238"},"headline":"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru","datePublished":"2021-06-14T11:53:00+00:00","dateModified":"2023-12-04T15:49:13+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/"},"wordCount":1327,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/08\/iStock-942893738.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["Tiskov\u00e9 zpr\u00e1vy"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/","url":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/","name":"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru - Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/08\/iStock-942893738.jpg","datePublished":"2021-06-14T11:53:00+00:00","dateModified":"2023-12-04T15:49:13+00:00","description":"Hackersk\u00e9 skupiny rekrutuj\u00ed a k proveden\u00ed sofistikovan\u00fdch \u00fatok\u016f pou\u017e\u00edvaj\u00ed b\u011b\u017en\u00e9 lidi nebo skupiny. Tento nov\u00fd sc\u00e9n\u00e1\u0159 je te\u010f v kurzu.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/08\/iStock-942893738.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/08\/iStock-942893738.jpg","width":3864,"height":2576,"caption":"SECURE CONCEPT"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/cs\/vitejte-v-dobe-kdy-kyberutok-muze-zahajit-uz-i-jednotlivec-a-to-bez-potrebnych-dovednosti-a-softwaru\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"V\u00edtejte v dob\u011b, kdy kyber\u00fatok m\u016f\u017ee zah\u00e1jit u\u017e i jednotlivec, a to bez pot\u0159ebn\u00fdch dovednost\u00ed a softwaru"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238","name":"Leona Dundrova","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","caption":"Leona Dundrova"},"url":"https:\/\/new.soitron.com\/cs\/author\/leona\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/41842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=41842"}],"version-history":[{"count":2,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/41842\/revisions"}],"predecessor-version":[{"id":54312,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/41842\/revisions\/54312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/36392"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=41842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=41842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=41842"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=41842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}