{"id":5346,"date":"2025-10-27T16:18:00","date_gmt":"2025-10-27T16:18:00","guid":{"rendered":"https:\/\/blog.truthscan.com\/?p=5346"},"modified":"2026-03-06T10:20:18","modified_gmt":"2026-03-06T10:20:18","slug":"kurumsal-guvenli%cc%87k","status":"publish","type":"post","link":"https:\/\/blog.truthscan.com\/tr\/kurumsal-guvenli%cc%87k\/","title":{"rendered":"Salesforce Kurumsal G\u00fcvenlik M\u00fcdahalesine Nas\u0131l \u00d6nc\u00fcl\u00fck Ediyor?"},"content":{"rendered":"<p>Haziran 2025'te bir Google \u00e7al\u0131\u015fan\u0131 BT destek biriminden rutin bir arama gibi g\u00f6r\u00fcnen bir telefon ald\u0131.<\/p>\n\n\n\n<p>Hattaki ki\u015fi kendinden emin bir \u015fekilde konu\u015ftu, sesi profesyonelce geliyordu ve tamamen me\u015fru g\u00f6r\u00fcn\u00fcyordu.<\/p>\n\n\n\n<p>Teknisyen, \u00e7al\u0131\u015fandan \u015firketin Salesforce sisteminde yeni bir uygulamay\u0131 onaylamas\u0131n\u0131 istedi.<\/p>\n\n\n\n<p>Bu sald\u0131r\u0131y\u0131 \u00f6zellikle \u00e7arp\u0131c\u0131 k\u0131lan \u015fey <a href=\"https:\/\/undetectable.ai\/blog\/ai-voice-detector-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">deepfake ses<\/a>yapay zeka taraf\u0131ndan \u00fcretilen sesler o kadar ger\u00e7ek\u00e7iydi ki, en g\u00fcvenilir kimlik do\u011frulama y\u00f6ntemlerinden birini istismar ettiler.&nbsp;<\/p>\n\n\n\n<p>Yine de bu olay, i\u015fletmelerin modern tehditlere yakla\u015f\u0131m\u0131nda bir d\u00f6n\u00fcm noktas\u0131 olacakt\u0131.<\/p>\n\n\n\n<p>Bu olay <a href=\"https:\/\/theconversation.com\/what-are-shinyhunters-the-hackers-that-attacked-google-should-we-all-be-worried-264271\" target=\"_blank\" rel=\"noreferrer noopener\">ShinyHunters grubu<\/a>sald\u0131rganlar\u0131n art\u0131k \u015firket sistemlerini ihlal etmek i\u00e7in nas\u0131l yapay zeka kulland\u0131klar\u0131n\u0131 ortaya \u00e7\u0131kard\u0131.&nbsp;<\/p>\n\n\n\n<p>Ancak ayn\u0131 zamanda Salesforce ve daha geni\u015f g\u00fcvenlik toplulu\u011funun m\u00fc\u015fterileri korumak i\u00e7in ne kadar h\u0131zl\u0131 harekete ge\u00e7ebilece\u011fini de g\u00f6sterdi.<\/p>\n\n\n\n<p><strong>Salesforce Sadece Bir Hedef De\u011fil, Bir G\u00fcvenlik Lideri<\/strong><\/p>\n\n\n\n<p>Salesforce yapay zeka destekli sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131n\u0131n oda\u011f\u0131 haline gelmi\u015f olsa da, \u015firketin verdi\u011fi yan\u0131t, d\u00fcnya \u00e7ap\u0131nda milyonlarca kurulu\u015f i\u00e7in m\u00fc\u015fteri ili\u015fkileri y\u00f6netiminin neden g\u00fcvenilir omurgas\u0131 olmaya devam etti\u011fini g\u00f6steriyor.<\/p>\n\n\n\n<p>Salesforce kurumsal operasyonlarda bu kadar merkezi bir rol oynad\u0131\u011f\u0131 i\u00e7in tehdit akt\u00f6rleri i\u00e7in do\u011fal bir hedef. Ancak g\u00fcvenlik uzmanlar\u0131 bunu bir zay\u0131fl\u0131k olarak g\u00f6rm\u00fcyor.<\/p>\n\n\n\n<p>Bunun yerine, bunu platformun pazar liderli\u011finin ve i\u015fletmelerin ona duydu\u011fu derin g\u00fcvenin kan\u0131t\u0131 olarak g\u00f6r\u00fcyorlar.<\/p>\n\n\n\n<p>G\u00f6re <a href=\"https:\/\/news.cision.com\/withsecure\/i\/withsecure-head-of-threat-intelligence-tim-west,c3139977\" target=\"_blank\" rel=\"noreferrer noopener\">WithSecure'un Tehdit \u0130stihbarat\u0131 Ba\u015fkan\u0131<\/a>Tim West:<\/p>\n\n\n\n<p><em>\"Scattered Spider gibi bilgisayar korsanl\u0131\u011f\u0131 gruplar\u0131 SaaS ortamlar\u0131na eri\u015fim sa\u011flamak i\u00e7in sosyal m\u00fchendislik kullan\u0131yor. Sald\u0131r\u0131lar\u0131 teknik olarak basit g\u00f6r\u00fcnebilir, ancak bu onlar\u0131 daha az tehlikeli yapmaz. \u00d6nemli olan platformlar\u0131n ne kadar h\u0131zl\u0131 yan\u0131t verdi\u011fi ve uyum sa\u011flad\u0131\u011f\u0131d\u0131r.\"<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"344\" src=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave-1024x344.jpg\" alt=\"\" class=\"wp-image-5354\" title=\"\" srcset=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave-1024x344.jpg 1024w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave-300x101.jpg 300w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave-768x258.jpg 768w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave-1536x516.jpg 1536w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave-18x6.jpg 18w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/2025-attack-wave.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Salesforce'un Ortaya \u00c7\u0131kan Tehditlere H\u0131zl\u0131 Tepkisi<\/strong><\/p>\n\n\n\n<p>\u015e\u00fcpheli faaliyetler 2025'in ba\u015flar\u0131nda artt\u0131\u011f\u0131nda Salesforce yayg\u0131n bir hasar olu\u015fmas\u0131n\u0131 beklemedi.<\/p>\n\n\n\n<p>\u015eirket Mart 2025'te potansiyel sald\u0131r\u0131 kampanyalar\u0131n\u0131 kabul ederek m\u00fc\u015fterilerini tehdit akt\u00f6rlerinin \u00e7al\u0131\u015fanlar\u0131 k\u00f6t\u00fc niyetli ba\u011flant\u0131l\u0131 uygulamalar\u0131 onaylamalar\u0131 i\u00e7in manip\u00fcle etmeye \u00e7al\u0131\u015ft\u0131klar\u0131 konusunda uyard\u0131.<\/p>\n\n\n\n<p>Salesforce, bu olaylar\u0131n platform mimarisindeki kusurlardan kaynaklanmad\u0131\u011f\u0131n\u0131 vurgulad\u0131.<\/p>\n\n\n\n<p>Bunlar daha ziyade, herhangi bir kurulu\u015fun kar\u015f\u0131la\u015fabilece\u011fi geli\u015fmi\u015f sosyal m\u00fchendislik taktiklerinin \u00f6rnekleriydi.&nbsp;<\/p>\n\n\n\n<p>\u015eirket o zamandan beri yeni end\u00fcstri standartlar\u0131n\u0131 belirleyen kapsaml\u0131 savunma \u00f6nlemlerini uygulamaya koydu:<\/p>\n\n\n\n<p>Savunmas\u0131n\u0131 g\u00fc\u00e7lendirmek i\u00e7in Salesforce, yeni kullan\u0131c\u0131lar i\u00e7in y\u00fckl\u00fc olmayan ba\u011fl\u0131 uygulamalar\u0131 otomatik olarak devre d\u0131\u015f\u0131 b\u0131rakarak sald\u0131r\u0131 y\u00fczeyini \u00f6nemli \u00f6l\u00e7\u00fcde azaltan ba\u011fl\u0131 uygulama sertle\u015ftirmesini tan\u0131tt\u0131.&nbsp;<\/p>\n\n\n\n<p>Buna paralel olarak \u015firket \u015funlar\u0131 hayata ge\u00e7irdi <a href=\"https:\/\/frontegg.com\/blog\/oauth-flows\" target=\"_blank\" rel=\"noreferrer noopener\">OAuth ak\u0131\u015f k\u0131s\u0131tlamalar\u0131<\/a>bilinen sald\u0131r\u0131 modelleriyle e\u015fle\u015fen yetkilendirme s\u00fcre\u00e7leri arac\u0131l\u0131\u011f\u0131yla kurulan ba\u011flant\u0131lar\u0131 engeller.&nbsp;<\/p>\n\n\n\n<p>\u0130\u015fletmeler \u00f6zelle\u015ftirilmi\u015f platformlara ve \u00fc\u00e7\u00fcnc\u00fc taraf entegrasyonlar\u0131na giderek daha fazla bel ba\u011flad\u0131k\u00e7a, g\u00fcvenlik \u00f6ncelikli sistem tasar\u0131m\u0131 \u00f6zellikle emlak gibi \u00f6zel CRM \u00e7\u00f6z\u00fcmlerinin yayg\u0131n olarak benimsendi\u011fi sekt\u00f6rlerde \u00f6nemli hale gelmektedir.\u00a0<a href=\"https:\/\/infoseemedia.com\/business\/custom-crm-development-for-real-estate\/\" data-type=\"link\" data-id=\"https:\/\/infoseemedia.com\/business\/custom-crm-development-for-real-estate\/\" target=\"_blank\" rel=\"noopener\">gayrimenkul i\u00e7in \u00f6zel CRM geli\u015ftirme<\/a>.<\/p>\n\n\n\n<p>Bu teknik \u00f6nlemlerin \u00f6tesinde Salesforce, ola\u011fand\u0131\u015f\u0131 uygulama yetkilendirme modellerini ger\u00e7ek zamanl\u0131 olarak tespit etmek i\u00e7in izleme sistemlerini de geli\u015ftirdi ve sosyal m\u00fchendislik giri\u015fimlerinin nas\u0131l fark edilece\u011fine dair a\u00e7\u0131k ve pratik rehberlik sunarak kullan\u0131c\u0131 e\u011fitimine yat\u0131r\u0131m yapt\u0131.<\/p>\n\n\n\n<p>A\u011fustos 2025'te Salesforce, OAuth belirte\u00e7lerinin ilgili sald\u0131r\u0131larda tehlikeye at\u0131ld\u0131\u011f\u0131n\u0131 ke\u015ffettikten sonra kararl\u0131 bir \u015fekilde harekete ge\u00e7ti ve Drift uygulamas\u0131 da dahil olmak \u00fczere Salesloft teknolojileriyle t\u00fcm entegrasyonlar\u0131 ask\u0131ya ald\u0131.&nbsp;<\/p>\n\n\n\n<p><strong>Daha Geni\u015f Deepfake Manzaras\u0131n\u0131 Anlamak<\/strong><\/p>\n\n\n\n<p>Deepfake tehdidi Salesforce'un \u00e7ok \u00f6tesine uzan\u0131yor.<\/p>\n\n\n\n<p>2024 y\u0131l\u0131n\u0131n ba\u015flar\u0131nda m\u00fchendislik firmas\u0131 Arup'ta ya\u015fanan 25 milyonluk deepfake soygunu, t\u00fcm sekt\u00f6rlerdeki sofistike kurulu\u015flar\u0131n bu risklerle kar\u015f\u0131 kar\u015f\u0131ya oldu\u011funu g\u00f6sterdi.&nbsp;<\/p>\n\n\n\n<p>Yak\u0131n zamanda yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, insanlar\u0131n y\u00fczde 70'i ger\u00e7ek sesleri klonlanm\u0131\u015f seslerden ay\u0131rt etme konusunda g\u00fcven eksikli\u011fi ya\u015fad\u0131klar\u0131n\u0131 belirtiyor ki bu da t\u00fcm kurumsal g\u00fcvenlik ortam\u0131n\u0131 etkileyen bir zafiyet.<\/p>\n\n\n\n<p>CrowdStrike'\u0131n 2025 K\u00fcresel Tehdit Raporu, daha ikna edici kimlik av\u0131 ve taklit giri\u015fimlerine olanak tan\u0131yan yapay zeka ara\u00e7lar\u0131n\u0131n etkisiyle, sesli kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131n 2024 y\u0131l\u0131n\u0131n ilk ve ikinci yar\u0131s\u0131 aras\u0131nda y\u00fczde 442 oran\u0131nda artt\u0131\u011f\u0131n\u0131 ortaya koydu.<\/p>\n\n\n\n<p>Bu bulgu, sadece Salesfore i\u00e7in de\u011fil, t\u00fcm sekt\u00f6r i\u00e7in b\u00fcy\u00fcyen bir zorlu\u011fun alt\u0131n\u0131 \u00e7iziyor.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"360\" src=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation-1024x360.jpg\" alt=\"\" class=\"wp-image-5355\" title=\"\" srcset=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation-1024x360.jpg 1024w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation-300x106.jpg 300w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation-768x270.jpg 768w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation-1536x540.jpg 1536w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation-18x6.jpg 18w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/economics-of-deepkfake-creation.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>Kurumlar Deepfake Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Nas\u0131l Kazan\u0131yorlar?<\/strong><\/p>\n\n\n\n<p>\u00d6nde gelen kurulu\u015flar, deepfake odakl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korunman\u0131n ileri teknolojiden daha fazlas\u0131n\u0131 gerektirdi\u011finin fark\u0131na var\u0131yor.<\/p>\n\n\n\n<p>G\u00fcven ve do\u011frulaman\u0131n nas\u0131l tesis edildi\u011finin tamamen yeniden d\u00fc\u015f\u00fcn\u00fclmesini gerektiriyor.<\/p>\n\n\n\n<p>Kurumlar kimli\u011fi do\u011frulamak ve riski azaltmak i\u00e7in daha g\u00fc\u00e7l\u00fc yollar arad\u0131k\u00e7a s\u0131f\u0131r g\u00fcven ileti\u015fim \u00e7er\u00e7eveleri giderek yayg\u0131nla\u015f\u0131yor.<\/p>\n\n\n\n<p>\u00d6rne\u011fin, Beyond Identity taraf\u0131ndan sunulan RealityCheck gibi \u00e7\u00f6z\u00fcmler, kriptografik cihaz kimlik do\u011frulamas\u0131 ve s\u00fcrekli risk de\u011ferlendirmeleri ile desteklenen do\u011frulanm\u0131\u015f kimlik rozetleri sa\u011flar.&nbsp;<\/p>\n\n\n\n<p>Benzer \u015fekilde, Resemble AI'nin deepfake sim\u00fclasyon platformunu kullanan kurulu\u015flar, platformun benimsenmesinden sonra ba\u015far\u0131l\u0131 sald\u0131r\u0131larda y\u00fczde 90'a varan bir d\u00fc\u015f\u00fc\u015f g\u00f6rd\u00fc, \u00e7\u00fcnk\u00fc platform, ekipleri tehditleri daha etkili bir \u015fekilde tan\u0131mak ve bunlara yan\u0131t vermek i\u00e7in e\u011fitmek i\u00e7in hiper-ger\u00e7ek\u00e7i sim\u00fclasyonlar kullan\u0131yor.<\/p>\n\n\n\n<p>\u00d6nde gelen g\u00fcvenlik uygulamalar\u0131 art\u0131k, ilk ileti\u015fimlerin ne kadar ger\u00e7ek\u00e7i g\u00f6r\u00fcnd\u00fc\u011f\u00fcne bak\u0131lmaks\u0131z\u0131n, y\u00fcksek riskli talepler i\u00e7in \u00e7ok kanall\u0131 do\u011frulamay\u0131 vurgulamaktad\u0131r.<\/p>\n\n\n\n<p>Bu protokoller, Salesforce'un platform g\u00fcvenlik geli\u015ftirmeleriyle birle\u015fti\u011finde, sosyal m\u00fchendisli\u011fe kar\u015f\u0131 zorlu savunmalar olu\u015fturur.<\/p>\n\n\n\n<p><strong>\u0130leriye Giden Yol: Do\u011frulama Yoluyla G\u00fcven<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/AI-path-forward-1024x683.jpg\" alt=\"\" class=\"wp-image-5356\" title=\"\" srcset=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/AI-path-forward-1024x683.jpg 1024w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/AI-path-forward-300x200.jpg 300w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/AI-path-forward-768x512.jpg 768w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/AI-path-forward-18x12.jpg 18w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/AI-path-forward.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Deepfake tehditlerinin y\u00fckseli\u015fi siber g\u00fcvenlikte bir d\u00f6n\u00fcm noktas\u0131na i\u015faret ediyor, ancak ayn\u0131 zamanda Salesforce gibi platformlar\u0131n yeni g\u00fcvenlik standartlar\u0131 belirleme konusunda \u00f6nc\u00fcl\u00fck etmesi i\u00e7in bir f\u0131rsat yarat\u0131yor.&nbsp;<\/p>\n\n\n\n<p>H\u0131zl\u0131 tehdit tespiti, m\u00fc\u015fterilerle a\u00e7\u0131k ileti\u015fim, h\u0131zl\u0131 g\u00fcvenlik g\u00fcncellemeleri ve daha geni\u015f g\u00fcvenlik toplulu\u011fuyla g\u00fc\u00e7l\u00fc i\u015fbirli\u011fi ile Salesforce, bir kurulu\u015fun yeni tehditlere nas\u0131l etkili bir \u015fekilde yan\u0131t verebilece\u011fini g\u00f6steriyor.<\/p>\n\n\n\n<p>Yapay zeka taraf\u0131ndan \u00fcretilen bir aldatma \u00e7a\u011f\u0131nda, g\u00fcven art\u0131k varsay\u0131lamaz; do\u011frulanmal\u0131d\u0131r.<\/p>\n\n\n\n<p>Bunu anlayan ve do\u011fru ara\u00e7lara, s\u00fcre\u00e7lere ve k\u00fclt\u00fcre yat\u0131r\u0131m yapan \u015firketler hem g\u00fcvenliklerini hem de itibarlar\u0131n\u0131 korumak i\u00e7in daha haz\u0131rl\u0131kl\u0131 olacaklard\u0131r.&nbsp;<\/p>\n\n\n\n<p>Orijinalli\u011fi ayn\u0131 g\u00fcvenle do\u011frulamak istiyorsan\u0131z <a href=\"https:\/\/truthscan.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">TruthScan<\/a>i\u00e7in g\u00fcvenilir bir \u00e7\u00f6z\u00fcm <a href=\"https:\/\/truthscan.com\/real-time-ai-detector\" target=\"_blank\" rel=\"noreferrer noopener\">Yapay zeka taraf\u0131ndan olu\u015fturulan i\u00e7eri\u011fi tespit etme<\/a> ve kurulu\u015funuzdaki dijital g\u00fcvenin temelini g\u00fc\u00e7lendirin.<\/p>","protected":false},"excerpt":{"rendered":"<p>Haziran 2025'te bir Google \u00e7al\u0131\u015fan\u0131 BT'den rutin bir arama gibi g\u00f6r\u00fcnen bir [...]<\/p>","protected":false},"author":15,"featured_media":5359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[31],"tags":[],"class_list":["post-5346","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-helpful-ai-content-tips"],"_links":{"self":[{"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/posts\/5346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/comments?post=5346"}],"version-history":[{"count":5,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/posts\/5346\/revisions"}],"predecessor-version":[{"id":5563,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/posts\/5346\/revisions\/5563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/media\/5359"}],"wp:attachment":[{"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/media?parent=5346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/categories?post=5346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.truthscan.com\/tr\/wp-json\/wp\/v2\/tags?post=5346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}