{"id":41845,"date":"2021-05-17T14:15:00","date_gmt":"2021-05-17T13:15:00","guid":{"rendered":"https:\/\/www.soitron.com\/?p=41845"},"modified":"2023-12-08T16:34:13","modified_gmt":"2023-12-08T15:34:13","slug":"hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/","title":{"rendered":"Hackersk\u00e9 gangy znovuobjevily jeden z nejnebezpe\u010dn\u011bj\u0161\u00edch a nejefektivn\u011bj\u0161\u00edch zp\u016fsob\u016f \u00fatok\u016f"},"content":{"rendered":"\n<p><em>Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u011bj\u0161\u00edmi hackersk\u00fdmi typy \u00fatok\u016f. Nov\u00fd razantn\u011b nastupuj\u00edc\u00ed trend spo\u010d\u00edv\u00e1 v&nbsp;hacknut\u00ed dodavatele \u2013 nej\u010dast\u011bji hardwarov\u00e9ho \u010di softwarov\u00e9ho v\u00fdvoj\u00e1\u0159e \u2013 \u010d\u00edm\u017e se otev\u00edr\u00e1 mo\u017enost napadnout \u0159\u00e1dov\u011b v\u011bt\u0161\u00ed mno\u017estv\u00ed firem.<\/em><\/p>\n\n\n\n<p>Hackersk\u00e9 techniky se vyv\u00edjej\u00ed. Odhaduje se, \u017ee kybernetick\u00e9 gangy sv\u00fdmi \u00fatoky vyd\u011bl\u00e1vaj\u00ed des\u00edtky milion\u016f dolar\u016f ro\u010dn\u011b. Zat\u00edmco p\u0159edchoz\u00edm let\u016fm dominovaly \u00fatoky na r\u016fzn\u00e9 s\u00ed\u0165ov\u00e9 protokoly a objeven\u00e9 zraniteln\u00e9 chyby, dnes je v&nbsp;pop\u0159ed\u00ed ransomware. <em>\u201eRansomwarov\u00e9 gangy se st\u00e1le \u010dast\u011bji zam\u011b\u0159uj\u00ed na v\u011bt\u0161\u00ed organizace. Je to logick\u00e9, proto\u017ee u nich o\u010dek\u00e1vaj\u00ed, \u017ee se jim poda\u0159\u00ed z\u00edskat \u201av\u00fdkupn\u00e9\u2018 z&nbsp;vyd\u00edr\u00e1n\u00ed a nav\u00edc, \u017ee bude tu\u010dn\u011bj\u0161\u00ed,\u201c<\/em> <strong>poodkr\u00fdv\u00e1 praktiky Martin Lohnert, bezpe\u010dnostn\u00ed odborn\u00edk spole\u010dnosti Soitron<\/strong>. Ze statistik spole\u010dnosti Sophos p\u0159itom vypl\u00fdv\u00e1, \u017ee n\u011bjakou formou ransomwaru je napadena v\u00edce ne\u017e polovina v\u0161ech firem. Zaj\u00edmavost\u00ed je, \u017ee jen zlomek z&nbsp;nich nakonec za od\u0161ifrov\u00e1n\u00ed dat zaplat\u00ed. Podle firmy Kaspersky, v&nbsp;\u010cesku to v&nbsp;minul\u00e9m roce bylo dokonce jen kolem 6 % z&nbsp;nich. Jde o relativn\u011b n\u00edzk\u00e9 \u010d\u00edslo, na druhou stranu v&nbsp;po\u010dtu glob\u00e1ln\u011b napaden\u00fdch firem a po\u017eadovan\u00e9m v\u00fdkupn\u00e9m nejde o zanedbateln\u00e9 \u010d\u00e1stky, nicm\u00e9n\u011b \u00fato\u010dn\u00edk\u016fm to nesta\u010d\u00ed, a tak se nyn\u00ed soust\u0159ed\u00ed na efektivitu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>O slovo se hl\u00e1s\u00ed sp\u00edc\u00ed typ \u00fatok\u016f<\/strong><\/h2>\n\n\n\n<p>I p\u0159esto\u017ee jsou hackersk\u00e9 skupiny dob\u0159e organizovan\u00e9, tak je st\u00e1le tvo\u0159\u00ed lid\u00e9. A ti jsou, jak je zn\u00e1mo l\u00edn\u00ed. Proto hledaj\u00ed cesty, jak \u00fatoky zn\u00e1sobit a vyt\u011b\u017eit z&nbsp;nich mnohem v\u00edce za m\u00e9n\u011b \u00fasil\u00ed.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201e\u00datoky prost\u0159ednictv\u00edm ransomware jsou vyu\u017e\u00edv\u00e1ny \u0159adu let, a budou i nad\u00e1le. Co se zm\u011bnilo, to je informovanost a lep\u0161\u00ed ochrana. Firmy l\u00e9pe, a hlavn\u011b kontinu\u00e1ln\u011b sv\u00e1 data z\u00e1lohuj\u00ed, tak\u017ee pokud dojde k prolomen\u00ed ochrany, dok\u00e1\u017e\u00ed data pom\u011brn\u011b rychle obnovit a byznys tak zotavit. T\u00edm p\u00e1dem doch\u00e1z\u00ed k&nbsp;poklesu zda\u0159ile dokon\u010den\u00fdch ransomware \u00fatok\u016f, kon\u010d\u00edc\u00ed v\u00fdplatou bitcoin\u016f hacker\u016fm,\u201c<\/em> komentuje situaci <strong>Martin Lohnert<\/strong>.<\/p>\n<\/blockquote>\n\n\n\n<p>Proto hacke\u0159i hledaj\u00ed nov\u00e9 techniky. Ne zcela novou, ale aktu\u00e1ln\u011b velmi siln\u011b nastupuj\u00edc\u00ed technikou je supply chain attack. Ta spo\u010d\u00edv\u00e1 ve specifick\u00e9m typu&nbsp;\u00fatoku na dodavatelsk\u00fd \u0159et\u011bzec, p\u0159i kter\u00e9 se vyu\u017e\u00edvaj\u00ed slabiny v&nbsp;propojen\u00fdch syst\u00e9mech \u017eivotn\u00edho cyklu produktu.<\/p>\n\n\n\n<p>Hacke\u0159i se nezam\u011b\u0159\u00ed na b\u011b\u017enou firmu, ale dodavatelskou, vyv\u00edjej\u00edc\u00ed nebo poskytuj\u00edc\u00ed ur\u010dit\u00fd hardware nebo software. Pokud se hacknut\u00ed poda\u0159\u00ed, vpa\u0161uj\u00ed do produktu sv\u016fj vlastn\u00ed programov\u00fd k\u00f3d, d\u00edky \u010demu\u017e si otev\u0159ou zadn\u00ed vr\u00e1tka, kter\u00fdmi za\u0159\u00edzen\u00ed \u010di software mohou m\u00edt pod kontrolou, vzd\u00e1len\u011b ovl\u00e1dat nebo skrz n\u011bj odcizit r\u016fzn\u00e1 data. \u00dato\u010dn\u00edci mohou dan\u00fd syst\u00e9m napadnout v jakoukoliv chv\u00edli &#8211; od v\u00fdvoje produktu, a\u017e po jeho proces aktualizac\u00ed. Posledn\u011b jmenovan\u00fdm byla v lo\u0148sk\u00e9m roce posti\u017eena spole\u010dnost SolarWinds. Kyberzlo\u010dinci do produkt\u016f t\u00e9to firmy um\u00edstili backdoor a p\u0159i n\u00e1sledn\u00e9m updatu softwaru jej SolarWinds distribuoval, a to dlouh\u00e9 m\u011bs\u00edce na tis\u00edce c\u00edl\u016f, do mnoh\u00fdch organizac\u00ed a firem, v\u010detn\u011b feder\u00e1ln\u00edch americk\u00fdch agentur \u010di technologick\u00fdch spole\u010dnost\u00ed. \u00dato\u010dn\u00edci potom \u010dekali na vhodnou dobu, kdy backdoor aktivuj\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Zam\u011bstnanec, co podcenil bezpe\u010dnost<\/strong><\/h2>\n\n\n\n<p>Dal\u0161\u00ed p\u0159\u00edklad se odehr\u00e1l ned\u00e1vno. Na za\u010d\u00e1tku leto\u0161n\u00edho roku spole\u010dnost Ubiquiti vydala prohl\u00e1\u0161en\u00ed, ve kter\u00e9m se p\u0159iznala, \u017ee do\u0161lo k&nbsp;napaden\u00ed jej\u00edch syst\u00e9m\u016f u poskytovatele cloudov\u00fdch slu\u017eeb. Jak se pozd\u011bji uk\u00e1zalo, \u00fatok byl veden p\u0159es zneu\u017eit\u00ed p\u0159\u00edstup\u016f u slu\u017eby Amazon Web Services. Jeden ze zam\u011bstnanc\u016f Ubiquiti si vedl v&nbsp;aplikaci LastPass evidenci privilegovan\u00fdch \u00fa\u010dt\u016f. Jejich odcizen\u00edm \u00fato\u010dn\u00edci z\u00edskali vzd\u00e1len\u00fd p\u0159\u00edstup k nespo\u010dtu Ubiquiti za\u0159\u00edzen\u00ed po cel\u00e9m sv\u011bt\u011b. Proto\u017ee spole\u010dnost Ubiquiti vyrobila u\u017e v\u00edce ne\u017e 85 milion\u016f za\u0159\u00edzen\u00ed, kter\u00e1 hraj\u00ed kl\u00ed\u010dovou roli v s\u00ed\u0165ov\u00e9 infrastruktu\u0159e ve v\u00edce ne\u017e 200 zem\u00edch po cel\u00e9m sv\u011bt\u011b a pou\u017e\u00edvaj\u00ed je jak firmy, tak koncov\u00ed u\u017eivatel\u00e9, m\u016f\u017ee to znamenat velk\u00fd probl\u00e9m. Ubiquiti n\u00e1sledn\u011b muselo \u0159e\u0161it \u201evyd\u00edr\u00e1n\u00ed\u201c ze strany \u00fato\u010dn\u00edk\u016f, kte\u0159\u00ed po\u017eadovali 50 bitcoin\u016f (tedy cca 2,8 milion\u016f USD) v\u00fdm\u011bnou za p\u0159\u00edslib, \u017ee o naru\u0161en\u00ed budou ml\u010det.<\/p>\n\n\n\n<p>Velmi zaj\u00edmav\u00fd p\u0159\u00edpad supply chain attack potkal koncem b\u0159ezna tak\u00e9 programovac\u00ed jazyk PHP. Hacke\u0159i se pokusili o jeho kompromitaci, a p\u0159itom na to \u0161li velmi jednodu\u0161e. Pod jm\u00e9ny zn\u00e1m\u00fdch v\u00fdvoj\u00e1\u0159\u016f prolomili ochranu ofici\u00e1ln\u00edho softwarov\u00e9ho repozit\u00e1\u0159e GitHub (odkud je PHP distribuov\u00e1no) a vlo\u017eili do zdrojov\u00fdch soubor\u016f nen\u00e1padn\u00fd, ale napaden\u00fd k\u00f3d. Pokud by si ho nikdo nev\u0161iml, ud\u011blal by velkou \u0161kodu na webech vyu\u017e\u00edvaj\u00edc\u00ed PHP. Prost\u0159ednictv\u00edm tzv. hlavi\u010dky by toti\u017e mohli distribuovat k\u00f3d, kter\u00fd by napadnul \u010dty\u0159i p\u011btiny sv\u011btov\u00fdch web\u016f.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Jeden \u00fatok, mnoho ob\u011bt\u00ed<\/strong><\/h2>\n\n\n\n<p>Tyto p\u0159\u00edklady jsou d\u016fkazy toho, \u017ee hackersk\u00e9 techniky se m\u011bn\u00ed. Samotn\u00fd ransomware se od sv\u00e9ho vzniku p\u0159ed des\u00edtkami let v\u00fdznamn\u011b vyvinul. A zat\u00edmco zlo\u010dinci d\u0159\u00edve operovali sami nebo v mal\u00fdch t\u00fdmech a n\u00e1hodn\u011b c\u00edlili na jednotliv\u00e9 u\u017eivatele internetu pomoc\u00ed webov\u00fdch str\u00e1nek a e-mail\u016f, v posledn\u00edch n\u011bkolika letech se \u00fatoky staly sofistikovan\u011bj\u0161\u00edmi, organizovan\u011bj\u0161\u00edmi a ambici\u00f3zn\u011bj\u0161\u00edmi.<\/p>\n\n\n\n<p>Jak uk\u00e1zaly tyto t\u0159i p\u0159\u00edpady, dnes jsou firmy napad\u00e1ny v&nbsp;tichosti skrze hardware a software, a nemaj\u00ed o tom ani tu\u0161en\u00ed. Dodavatel\u00e9 prod\u00e1vaj\u00ed, nebo aktualizuj\u00ed zd\u00e1nliv\u011b \u010dist\u00fd programov\u00fd k\u00f3d, kter\u00fd v\u0161ak obsahuje zadn\u00ed vr\u00e1tka a skrze n\u011b se kyberzlo\u010dinci dost\u00e1vaj\u00ed do milion\u016f spole\u010dnost\u00ed, ale i ke koncov\u00fdm u\u017eivatel\u016fm. Vyd\u00edr\u00e1ny mohou b\u00fdt potom jak dodavatel\u00e9, tak firmy u\u017e\u00edvaj\u00edc\u00ed produkty a slu\u017eby. Sta\u010d\u00ed vybrat vyd\u011bra\u010dskou metodu (nap\u0159\u00edklad v&nbsp;podob\u011b za\u0161ifrov\u00e1n\u00ed dat, jejich kr\u00e1de\u017ee apod.) a \u010dekat na v\u00fdkupn\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Lze se n\u011bjak br\u00e1nit?<\/strong><\/h2>\n\n\n\n<p>Z\u00e1kladn\u00edm doporu\u010den\u00edm je dodr\u017eovat b\u011b\u017en\u00e9 kybernetick\u00e9 bezpe\u010dnostn\u00ed z\u00e1sady. Stejn\u011b jako v&nbsp;p\u0159\u00edpad\u011b jin\u00fdch rizik br\u00e1t mo\u017en\u00e9 \u00fatoky v\u00e1\u017en\u011b, pou\u017e\u00edvat firewally, segmentovat s\u00ed\u0165, z\u00e1lohovat, pou\u017e\u00edvat siln\u00e1 hesla atd. Pro sofistikovan\u011bj\u0161\u00ed hrozby, jakou je pr\u00e1v\u011b supply chain attacks je vhodn\u00e9 v&nbsp;re\u00e1ln\u00e9m \u010dase sledovat, co se v&nbsp;infrastruktu\u0159e d\u011bje a um\u011bt detekovat podez\u0159el\u00e9 \u010dinnosti d\u0159\u00edve, ne\u017e dojde k velk\u00fdm \u0161kod\u00e1m.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201eZ\u00e1rove\u0148 je vhodn\u00e9 p\u0159ipravit se na sc\u00e9n\u00e1\u0159, \u017ee k takov\u00e9muto \u00fatoku p\u0159ece jen m\u016f\u017ee doj\u00edt, a tak pouva\u017eovat nad t\u00edm, jak velk\u00e9 \u0161kody by mohl zp\u016fsobit a m\u00edt p\u0159ipraven\u00fd pl\u00e1n, jak reagovat. Ten potom sta\u010d\u00ed pouze vyt\u00e1hnout ze \u201a\u0161upl\u00edku\u2018 a postupovat podle n\u011bj, proto\u017ee pokud krizov\u00e1 situace nastane, zcela ur\u010dit\u011b nebude \u010das ho vym\u00fd\u0161let,\u201c<\/em> <strong>dod\u00e1v\u00e1 z\u00e1v\u011brem Martin Lohnert<\/strong>.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u011bj\u0161\u00edmi hackersk\u00fdmi typy \u00fatok\u016f. Nov\u00fd razantn\u011b nastupuj\u00edc\u00ed trend spo\u010d\u00edv\u00e1 v&nbsp;hacknut\u00ed dodavatele \u2013 nej\u010dast\u011bji hardwarov\u00e9ho \u010di softwarov\u00e9ho v\u00fdvoj\u00e1\u0159e \u2013 \u010d\u00edm\u017e se otev\u00edr\u00e1 mo\u017enost napadnout \u0159\u00e1dov\u011b v\u011bt\u0161\u00ed mno\u017estv\u00ed firem. Hackersk\u00e9 techniky se vyv\u00edjej\u00ed. Odhaduje se, \u017ee kybernetick\u00e9 gangy sv\u00fdmi \u00fatoky vyd\u011bl\u00e1vaj\u00ed des\u00edtky milion\u016f dolar\u016f ro\u010dn\u011b. Zat\u00edmco p\u0159edchoz\u00edm let\u016fm dominovaly \u00fatoky [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":34706,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[266],"tags":[313],"news_categories":[371],"class_list":["post-41845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tiskove-spravy","tag-kyberneticka-bezpecnost-cs","news_categories-bezpecnost-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackersk\u00e9 gangy znovuobjevily nejnebezpe\u010dn\u011bj\u0161\u00edch \u00fatok\u016f | Soitron<\/title>\n<meta name=\"description\" content=\"Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u00fdmi hackersk\u00fdmi \u00fatoky. Nov\u00fd trend spo\u010d\u00edv\u00e1 v hacknut\u00ed dodavatele.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackersk\u00e9 gangy znovuobjevily nejnebezpe\u010dn\u011bj\u0161\u00edch \u00fatok\u016f | Soitron\" \/>\n<meta property=\"og:description\" content=\"Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u00fdmi hackersk\u00fdmi \u00fatoky. Nov\u00fd trend spo\u010d\u00edv\u00e1 v hacknut\u00ed dodavatele.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T13:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T15:34:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/03\/macbook-pro-3260626.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"6000\" \/>\n\t<meta property=\"og:image:height\" content=\"4000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leona Dundrova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leona Dundrova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackersk\u00e9 gangy znovuobjevily nejnebezpe\u010dn\u011bj\u0161\u00edch \u00fatok\u016f | Soitron","description":"Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u00fdmi hackersk\u00fdmi \u00fatoky. Nov\u00fd trend spo\u010d\u00edv\u00e1 v hacknut\u00ed dodavatele.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"Hackersk\u00e9 gangy znovuobjevily nejnebezpe\u010dn\u011bj\u0161\u00edch \u00fatok\u016f | Soitron","og_description":"Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u00fdmi hackersk\u00fdmi \u00fatoky. Nov\u00fd trend spo\u010d\u00edv\u00e1 v hacknut\u00ed dodavatele.","og_url":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/","og_site_name":"Soitron","article_published_time":"2021-05-17T13:15:00+00:00","article_modified_time":"2023-12-08T15:34:13+00:00","og_image":[{"width":6000,"height":4000,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/03\/macbook-pro-3260626.jpg","type":"image\/jpeg"}],"author":"Leona Dundrova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leona Dundrova","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/"},"author":{"name":"Leona Dundrova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238"},"headline":"Hackersk\u00e9 gangy znovuobjevily jeden z nejnebezpe\u010dn\u011bj\u0161\u00edch a nejefektivn\u011bj\u0161\u00edch zp\u016fsob\u016f \u00fatok\u016f","datePublished":"2021-05-17T13:15:00+00:00","dateModified":"2023-12-08T15:34:13+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/"},"wordCount":1298,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/03\/macbook-pro-3260626.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["Tiskov\u00e9 zpr\u00e1vy"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/","url":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/","name":"Hackersk\u00e9 gangy znovuobjevily nejnebezpe\u010dn\u011bj\u0161\u00edch \u00fatok\u016f | Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/03\/macbook-pro-3260626.jpg","datePublished":"2021-05-17T13:15:00+00:00","dateModified":"2023-12-08T15:34:13+00:00","description":"Spole\u010dnosti zab\u00fdvaj\u00edc\u00ed se kybernetickou bezpe\u010dnost\u00ed varuj\u00ed p\u0159ed sofistikovan\u00fdmi hackersk\u00fdmi \u00fatoky. Nov\u00fd trend spo\u010d\u00edv\u00e1 v hacknut\u00ed dodavatele.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/03\/macbook-pro-3260626.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2020\/03\/macbook-pro-3260626.jpg","width":6000,"height":4000},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/cs\/hackerske-gangy-znovuobjevily-jeden-z-nejnebezpecnejsich-a-nejefektivnejsich-zpusobu-utoku\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Hackersk\u00e9 gangy znovuobjevily jeden z nejnebezpe\u010dn\u011bj\u0161\u00edch a nejefektivn\u011bj\u0161\u00edch zp\u016fsob\u016f \u00fatok\u016f"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238","name":"Leona Dundrova","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","caption":"Leona Dundrova"},"url":"https:\/\/new.soitron.com\/cs\/author\/leona\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/41845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=41845"}],"version-history":[{"count":2,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/41845\/revisions"}],"predecessor-version":[{"id":54422,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/41845\/revisions\/54422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/34706"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=41845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=41845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=41845"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=41845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}