{"id":6528,"date":"2026-03-27T14:35:16","date_gmt":"2026-03-27T13:35:16","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6528"},"modified":"2026-03-27T14:38:33","modified_gmt":"2026-03-27T13:38:33","slug":"phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/","title":{"rendered":"Phishing je nebezpe\u010dnej\u0161\u00ed ako kedyko\u013evek predt\u00fdm. Firmy sa potrebuj\u00fa chr\u00e1ni\u0165 nov\u00fdmi n\u00e1strojmi\u00a0"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1024x576.png\" alt=\"BVF phishing ecos nahladovy obrazok\" class=\"wp-image-6529\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1024x576.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-300x169.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-768x432.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1536x864.png 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-370x208.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1170x658.png 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-972x546.png 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-760x428.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-270x152.png 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>ESET posilnil svoju antiphishingov\u00fa ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra. V \u010dase, ke\u010f je phishing \u010doraz kvalitnej\u0161\u00ed v\u010faka AI, u\u017e obozretnos\u0165 nesta\u010d\u00ed. <\/em><\/p>\n\n\n\n<p>Kybernetick\u00e1 bezpe\u010dnos\u0165 bola v\u017edy pretekom medzi \u00fato\u010dn\u00edkmi a&nbsp;obrancami, ale n\u00e1rast n\u00e1strojov umelej inteligencie tento boj nev\u00eddane ur\u00fdchlil.<\/p>\n\n\n\n<p>Medzi dobr\u00e9 pr\u00edklady patr\u00ed <a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/threat-landscape\/what-is-spearphishing-eset-research\/\">spearphishing<\/a>: kybernetick\u00ed zlo\u010dinci kedysi tr\u00e1vili hodiny alebo dokonca dni zhroma\u017e\u010fovan\u00edm \u00fadajov, aby vytvorili presved\u010div\u00e9 a&nbsp;prisp\u00f4soben\u00e9 e\u2011maily, ktor\u00e9 mali z&nbsp;obet\u00ed vyl\u00e1ka\u0165 citliv\u00e9 inform\u00e1cie alebo stiahnu\u0165 malv\u00e9r. V&nbsp;s\u00fa\u010dasnosti umel\u00e1 inteligencia skracuje tento proces na&nbsp;nieko\u013eko min\u00fat.<\/p>\n\n\n\n<p>\u00dato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa aj pokro\u010dil\u00e9 techniky maskovania, ako napr\u00edklad vkladanie \u0161kodliv\u00fdch URL adries do&nbsp;QR k\u00f3dov alebo pretv\u00e1ranie pokusov o&nbsp;phishing na&nbsp;nevinn\u00e9 pozv\u00e1nky do&nbsp;kalend\u00e1ra s&nbsp;cie\u013eom zv\u00fd\u0161i\u0165 mieru \u00faspe\u0161nosti.<\/p>\n\n\n\n<p>Aby podniky mohli \u010deli\u0165 vyv\u00edjaj\u00facim sa hrozb\u00e1m, musia sa opiera\u0165 o&nbsp;<a href=\"https:\/\/www.eset.com\/sk\/prevencia-na-prvom-mieste\/\">strat\u00e9giu zameran\u00fa na&nbsp;prevenciu<\/a> a&nbsp;ochranu s&nbsp;vyu\u017eit\u00edm umelej inteligencie, ktor\u00e1 dok\u00e1\u017ee odhali\u0165 pokusy o&nbsp;phishing, ak\u00e9 by \u010dlovek mohol prehliadnu\u0165.<\/p>\n\n\n\n<p>Od&nbsp;uvedenia rie\u0161enia <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a> na&nbsp;trh v&nbsp;roku&nbsp;2020 neust\u00e1le vylep\u0161ujeme jeho schopnosti detekcie na&nbsp;poskytovanie pokro\u010dilej ochrany pre slu\u017eby Microsoft 365 a&nbsp;Google Workspace pred malv\u00e9rom, phishingom a&nbsp;spamom. Ned\u00e1vno sme tieto funkcie roz\u0161\u00edrili o&nbsp;detekciu podvodn\u00fdch phishingov\u00fdch takt\u00edk vr\u00e1tane \u0161kodliv\u00fdch QR k\u00f3dov a&nbsp;pozv\u00e1nok do&nbsp;kalend\u00e1ra. V\u00fdsledky hovoria za&nbsp;v\u0161etko: odvtedy boli odhalen\u00e9 desiatky tis\u00edc hrozieb.<\/p>\n\n\n\n<p><strong>K\u013e\u00fa\u010dov\u00e9 body tohto \u010dl\u00e1nku:<\/strong><strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>S\u00a0rozvojom po\u010d\u00edta\u010dovej kriminality je phishing \u010doraz sofistikovanej\u0161\u00ed a\u00a0mnoh\u00e9 be\u017en\u00e9 tipy na\u00a0zvy\u0161ovanie povedomia o\u00a0tejto hrozbe str\u00e1caj\u00fa na\u00a0relevantnosti, pri\u010dom je potrebn\u00e9 ich aktualizova\u0165.<\/li>\n\n\n\n<li>Z\u00a0glob\u00e1lnych \u00fadajov vypl\u00fdva, \u017ee phishing patr\u00ed medzi naj\u010dastej\u0161ie \u00fatoky, straty m\u00f4\u017eu dosahova\u0165 mili\u00f3ny dol\u00e1rov a\u00a0umel\u00e1 inteligencia situ\u00e1ciu e\u0161te zhor\u0161uje, ke\u010f\u017ee v\u00a0s\u00fa\u010dasnosti 16\u00a0% v\u0161etk\u00fdch pr\u00edpadov naru\u0161enia zabezpe\u010denia zah\u0155\u0148a vyu\u017e\u00edvanie AI.<\/li>\n\n\n\n<li>Firmy musia t\u00fato hrozbu rie\u0161i\u0165 prevenciou a\u00a0ochranou zalo\u017eenou na\u00a0umelej inteligencii, ktor\u00e1 kontroluje aj tie aspekty phishingov\u00fdch e-mailov, ak\u00e9 \u013eudsk\u00e9 o\u010di nedok\u00e1\u017eu zachyti\u0165.<\/li>\n\n\n\n<li>Spolo\u010dnos\u0165 ESET neust\u00e1le obohacuje rie\u0161enie <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a>, chr\u00e1niace slu\u017eby Microsoft 365 a\u00a0Google Workspace, o\u00a0nov\u00e9 funkcie, ktor\u00e9 dok\u00e1\u017eu odhali\u0165 hrozby aj v\u00a0starostlivo vytvoren\u00fdch spearphishingov\u00fdch e\u2011mailoch.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing na&nbsp;steroidoch<\/h2>\n\n\n\n<p>Predt\u00fdm, ako sa pozrieme na&nbsp;techniky maskovania vo&nbsp;phishingov\u00fdch spr\u00e1vach, po\u010fme presk\u00fama\u0165, ako sa t\u00e1to hrozba vyvinula.<\/p>\n\n\n\n<p><a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/2-phishing-manipulacia-ktora-moze-pre-firmu-skoncit-pohromou\/\">Phishing<\/a> je jednou z\u00a0najstar\u0161\u00edch takt\u00edk soci\u00e1lneho in\u017einierstva, ktor\u00e1 sa spolieha na\u00a0impersonifik\u00e1ciu (vyd\u00e1vanie sa za\u00a0niekoho in\u00e9ho) a\u00a0naliehav\u00e9 v\u00fdzvy kona\u0165, ktor\u00e9 pou\u017e\u00edvate\u013eov n\u00fatia odha\u013eova\u0165 citliv\u00e9 \u00fadaje alebo s\u0165ahova\u0165 malv\u00e9r. Spr\u00e1vy typu \u201ePlatnos\u0165 v\u00e1\u0161ho hesla uplynula, kliknut\u00edm sem ho obnovte\u201c bolo kedysi \u013eahk\u00e9 rozpozna\u0165, tak\u017ee \u00faspech phishingu z\u00e1visel najm\u00e4 od\u00a0toho, ko\u013eko ich bolo odoslan\u00fdch.<\/p>\n\n\n\n<p>Dlh\u00fd \u010das bola najlep\u0161ou obranou informovanos\u0165 (a&nbsp;filtrovanie spamu). Zamestnanci boli vy\u0161kolen\u00ed, aby si v\u0161\u00edmali varovn\u00e9 znaky, ako s\u00fa gramatick\u00e9 chyby, naliehav\u00fd t\u00f3n, neo\u010dak\u00e1van\u00e9 v\u00e1\u017ene po\u017eiadavky, pochybn\u00e9 adresy odosielate\u013eov alebo podozriv\u00e9 URL adresy.<\/p>\n\n\n\n<p>S&nbsp;pokrokom v&nbsp;oblasti po\u010d\u00edta\u010dovej kriminality v\u0161ak mnoh\u00e9 z&nbsp;t\u00fdchto tipov takmer stratili v\u00fdznam a&nbsp;nov\u00e9 n\u00e1stroje umelej inteligencie m\u00f4\u017eu tomuto tradi\u010dn\u00e9mu pr\u00edstupu zasadi\u0165 posledn\u00fd \u00fader.<\/p>\n\n\n\n<p>Nejde len o&nbsp;to, \u017ee podvodn\u00e9 e\u2011maily s\u00fa prepracovanej\u0161ie, ale v\u010faka umelej inteligencii s\u00fa presved\u010divej\u0161ie a&nbsp;\u013eah\u0161ie sa masovo produkuj\u00fa. <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">Spolo\u010dnos\u0165 IBM zistila<\/a>, \u017ee generat\u00edvna umel\u00e1 inteligencia skr\u00e1tila \u010das potrebn\u00fd na&nbsp;vytvorenie presved\u010div\u00e9ho podvodn\u00e9ho e\u2011mailu zo&nbsp;16 hod\u00edn len na&nbsp;p\u00e4\u0165 min\u00fat.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-dc2bee4fbaeb81da768ae3eedff3655a\"><strong>Poh\u013ead odborn\u00edka:<\/strong><br><br>\u201eUmel\u00e1 inteligencia v\u0161etko zr\u00fdchlila. Z\u00a0telemetrie spolo\u010dnosti ESET vypl\u00fdva, \u017ee v\u00e4\u010d\u0161ina kybernetick\u00fdch \u00fatokov na\u00a0firmy sa za\u010d\u00edna podvodn\u00fdmi e\u2011mailmi. Phishing tradi\u010dne n\u00fati \u013eud\u00ed odhali\u0165 svoje osobn\u00e9 \u00fadaje alebo si stiahnu\u0165 malv\u00e9r. Spearphishing ide e\u0161te \u010falej a\u00a0vyu\u017e\u00edva prisp\u00f4soben\u00e9 spr\u00e1vy po\u00a0tom, ako \u00fato\u010dn\u00edci z\u00edskaj\u00fa \u00fadaje o\u00a0konkr\u00e9tnej obeti. V\u00a0s\u00fa\u010dasnosti umel\u00e1 inteligencia tento proces automatizuje, \u010d\u00edm sa spearphishing st\u00e1va normou. <br><br>Napr\u00edklad: na\u00a0soci\u00e1lnych sie\u0165ach zverejn\u00edte pr\u00edspevok o\u00a0tom, \u017ee ste boli na\u00a0nejakej konferencii, a\u00a0na druh\u00fd de\u0148 v\u00e1m m\u00f4\u017ee pr\u00eds\u0165 podvodn\u00fd e\u2011mail od\u00a0osoby, ktor\u00e1 tvrd\u00ed, \u017ee v\u00e1s tam stretla, pon\u00faka v\u00e1m fotografie a\u00a0chce sa s\u00a0vami spoji\u0165. Nesk\u00fasen\u00fd \u010dlovek sa m\u00f4\u017ee \u013eahko necha\u0165 nachyta\u0165 a\u00a0klikn\u00fa\u0165 na\u00a0\u0161kodliv\u00fd obsah.\u201c <br><br>J\u00falius Seleck\u00fd, ESET Solution Architect<\/p>\n\n\n\n<p>Tieto trendy u\u017e m\u00f4\u017eeme vidie\u0165 aj v&nbsp;\u010d\u00edslach:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Telemetria spolo\u010dnosti ESET ukazuje, \u017ee 34\u00a0% <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/threat-report\/\">v\u0161etk\u00e9ho zachyten\u00e9ho malv\u00e9ru<\/a> je doru\u010dovan\u00e9ho s\u00a0vyu\u017eit\u00edm phishingu.<\/li>\n\n\n\n<li>Pod\u013ea <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">spr\u00e1vy spolo\u010dnosti Verizon o\u00a0vy\u0161etrovan\u00ed \u00fanikov \u00fadajov (DBIR) za\u00a0rok\u00a02025<\/a> v\u00e4\u010d\u0161ina pr\u00edpadov naru\u0161enia zabezpe\u010denia (60\u00a0%) zah\u0155\u0148a \u013eudsk\u00fd faktor.<\/li>\n\n\n\n<li>Pod\u013ea <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">spr\u00e1vy o\u00a0n\u00e1kladoch s\u00favisiacich s\u00a0\u00fanikom \u00fadajov za\u00a0rok\u00a02025<\/a> od\u00a0spolo\u010dnosti IBM je phishing naj\u010dastej\u0161\u00edm vektorom \u00fatokov (16\u00a0%) a\u00a0s\u00a0priemernou sumou 4,8\u00a0mili\u00f3na dol\u00e1rov na\u00a0jeden pr\u00edpad naru\u0161enia zabezpe\u010denia je aj jedn\u00fdm z\u00a0najn\u00e1kladnej\u0161\u00edch.<\/li>\n\n\n\n<li>Spr\u00e1va spolo\u010dnosti IBM hovor\u00ed, \u017ee v\u00a0priemere 16\u00a0% pr\u00edpadov naru\u0161enia zabezpe\u010denia zah\u0155\u0148alo \u00fato\u010dn\u00edkov vyu\u017e\u00edvaj\u00facich umel\u00fa inteligenciu, naj\u010dastej\u0161ie v\u00a0pr\u00edpade phishingu (37\u00a0%) a\u00a0impersonifika\u010dn\u00fdch \u00fatokov s\u00a0vyu\u017eit\u00edm deepfakov (35\u00a0%).<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Techniky maskovania<\/h2>\n\n\n\n<p>Kybernetick\u00ed zlo\u010dinci pou\u017e\u00edvaj\u00fa na&nbsp;zefekt\u00edvnenie phishingu r\u00f4zne techniky maskovania, ako napr\u00edklad:<\/p>\n\n\n\n<p><strong>Podvrhnutie odosielate\u013ea e\u2011mailu<\/strong> \u2013 \u00fato\u010dn\u00edci nakonfiguruj\u00fa adresu v&nbsp;e\u2011mailovej hlavi\u010dke \u201eFrom\u201c tak, aby vyzerala ako adresa d\u00f4veryhodn\u00e9ho odosielate\u013ea. \u010casto tie\u017e manipuluj\u00fa s&nbsp;po\u013eom \u201eReply-To\u201c, tak\u017ee odpovede id\u00fa \u00fato\u010dn\u00edkovi, hoci maily vyzeraj\u00fa legit\u00edmne.<\/p>\n\n\n\n<p><strong>Homoglyfick\u00fd \u00fatok<\/strong> \u2013 homoglyfick\u00e9 alebo <a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/cloud-and-application-security\/cloud-office-deceptive-attacks\/\">homografick\u00e9 \u00fatoky<\/a> zneu\u017e\u00edvaj\u00fa podobnosti medzi r\u00f4znymi p\u00edsmenami a&nbsp;symbolmi. Napr\u00edklad n\u00e1zov dom\u00e9ny \u201e\u212es\u212et.com\u201c nie je skuto\u010dn\u00fdm n\u00e1zov dom\u00e9ny ESET, preto\u017ee namiesto p\u00edsmena abecedy \u201ee\u201c s\u00fa pou\u017eit\u00e9 symboly odhadu \u201e\u212e\u201c.<\/p>\n\n\n\n<p><strong>Typosquatting<\/strong> \u2013 podobne ako pri homoglyfick\u00fdch \u00fatokoch, aj pri typosquattingu sa pou\u017e\u00edvaj\u00fa vizu\u00e1lne triky, aby phishingov\u00e9 odkazy vyzerali legit\u00edmne. V&nbsp;tomto pr\u00edpade v\u0161ak \u00fato\u010dn\u00edci nemenia znaky, ale vyu\u017e\u00edvaj\u00fa drobn\u00e9 preklepy, napr\u00edklad \u201eeseet.sk\u201c namiesto \u201eeset.sk\u201c ako dom\u00e9nu odosielate\u013ea.<\/p>\n\n\n\n<p><strong>Quishing <\/strong>\u2013 pri quishingu alebo QR phishingu \u00fato\u010dn\u00edci do&nbsp;QR k\u00f3dov vkladaj\u00fa \u0161kodliv\u00e9 URL adresy, ktor\u00e9 pou\u017e\u00edvate\u013eov presmeruj\u00fa na&nbsp;falo\u0161n\u00e9 webov\u00e9 str\u00e1nky s&nbsp;cie\u013eom odcudzi\u0165 citliv\u00e9 inform\u00e1cie alebo nain\u0161talova\u0165 malv\u00e9r. URL adresa nie je uveden\u00e1 v&nbsp;tele e\u2011mailu, \u010do znamen\u00e1, \u017ee pou\u017e\u00edvatelia ju uvidia a\u017e po&nbsp;naskenovan\u00ed k\u00f3du smartf\u00f3nom \u2013 hrozba sa tak prenesie do&nbsp;mobiln\u00e9ho prostredia, ktor\u00e9 je \u010dasto menej bezpe\u010dn\u00e9.<\/p>\n\n\n\n<p><strong>\u0160kodliv\u00e1 pozv\u00e1nka do&nbsp;kalend\u00e1ra<\/strong> \u2013 tento \u00fatok vyu\u017e\u00edva falo\u0161n\u00e9 pozv\u00e1nky do&nbsp;kalend\u00e1ra na&nbsp;doru\u010denie phishingov\u00fdch odkazov, ktor\u00e9 sa \u010dasto automaticky prid\u00e1vaj\u00fa do&nbsp;kalend\u00e1rov pou\u017e\u00edvate\u013eov a&nbsp;obch\u00e1dzaj\u00fa tradi\u010dn\u00e9 sp\u00f4soby filtrovania e\u2011mailov. Gmail a&nbsp;mnoh\u00e9 in\u00e9 kalend\u00e1rov\u00e9 aplik\u00e1cie automaticky prid\u00e1vaj\u00fa extern\u00e9 pozv\u00e1nky ako \u201epredbe\u017en\u00e9\u201c sch\u00f4dzky bez schv\u00e1lenia pou\u017e\u00edvate\u013eom, \u010d\u00edm sa udalosti do&nbsp;kalend\u00e1ra dostan\u00fa bez jedin\u00e9ho kliknutia.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co m\u00f4\u017eu firmy urobi\u0165?<\/h2>\n\n\n\n<p>Ke\u010f organiz\u00e1cie \u010delia t\u00fdmto sofistikovan\u00fdm \u00fatokom, potrebuj\u00fa <a href=\"https:\/\/www.eset.com\/sk\/prevencia-na-prvom-mieste\/\">zavies\u0165 pr\u00edstup zameran\u00fd na\u00a0prevenciu<\/a> na\u00a0\u010do najr\u00fdchlej\u0161iu minimaliz\u00e1ciu hrozieb, aby sa vyhli \u0161kod\u00e1m a\u00a0zn\u00ed\u017eili dopad incidentov.<\/p>\n\n\n\n<p>Ni\u017e\u0161ie pon\u00fakame kr\u00e1tky popis tohto pr\u00edstupu v&nbsp;kontexte phishingov\u00fdch e\u2011mailov:<\/p>\n\n\n\n<p><strong>Minimaliz\u00e1cia mo\u017en\u00fdch miest \u00fatokov <\/strong>\u2013po&nbsp;doru\u010den\u00ed e\u2011mailu so&nbsp;\u0161kodlivou pr\u00edlohou sa spr\u00e1va najprv spracuje prostredn\u00edctvom cloudovej e\u2011mailovej slu\u017eby organiz\u00e1cie a&nbsp;a\u017e potom sa objav\u00ed v&nbsp;schr\u00e1nke zamestnanca. Ak e\u2011mail obsahuje QR k\u00f3d alebo PDF s\u00fabor, zamestnanec ho pravdepodobne otvor\u00ed alebo pou\u017eije na&nbsp;jeho pre\u010d\u00edtanie svoj smartf\u00f3n. V\u0161etky tieto prostredia je potrebn\u00e9 chr\u00e1ni\u0165 vytvoren\u00edm viacer\u00fdch vrstiev zabezpe\u010denia.<\/p>\n\n\n\n<p><strong>Zn\u00ed\u017eenie <\/strong><a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/prevention-and-awareness\/cybersecurity-complexity\/\"><strong>zlo\u017eitosti<\/strong><\/a> \u2013 ochrana t\u00fdchto prostred\u00ed pomocou viacer\u00fdch bezpe\u010dnostn\u00fdch rie\u0161en\u00ed, ako je ochrana cloudov\u00fdch aplik\u00e1ci\u00ed, ochrana koncov\u00fdch zariaden\u00ed, ochrana mobiln\u00fdch zariaden\u00ed a\u00a0podobne, ktor\u00e9 si vy\u017eaduj\u00fa samostatn\u00e9 prihl\u00e1senia, je zlo\u017eit\u00e1 \u00faloha. M\u00f4\u017ee to vies\u0165 k\u00a0nedostato\u010dn\u00e9mu preh\u013eadu, <a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/cloud-and-application-security\/cloud-office-deceptive-attacks\/\">mno\u017estvu upozornen\u00ed<\/a> a\u00a0n\u00e1slednej strate kontroly. V\u00a0ide\u00e1lnom pr\u00edpade by podniky mali zjednoti\u0165 spr\u00e1vu v\u00a0r\u00e1mci jedn\u00e9ho miesta a\u00a0zv\u00e1\u017ei\u0165 prenesenie \u00faloh na\u00a0poskytovate\u013ea slu\u017eieb riadenej detekcie a\u00a0reakcie (Managed Detection and Response \u2013 MDR).<\/p>\n\n\n\n<p><strong>Zlep\u0161enie pr\u00edstupu ku&nbsp;<\/strong><a href=\"https:\/\/www.eset.com\/us\/business\/resource-center\/white-papers\/cyber-hygiene-10-tips-for-sanitizing-your-environment\/\"><strong>kybernetickej bezpe\u010dnosti<\/strong><\/a> \u2013 mnoh\u00fdm e\u2011mailov\u00fdm hrozb\u00e1m sa d\u00e1 pred\u00eds\u0165 pomocou osved\u010den\u00fdch postupov, ako s\u00fa pravideln\u00e9 aktualiz\u00e1cie, spr\u00e1va z\u00e1plat, \u0161ifrovanie a&nbsp;bezpe\u010dnostn\u00e9 politiky. Na&nbsp;ich zjednodu\u0161enie by sa IT&nbsp;t\u00edmy mali spolieha\u0165 na&nbsp;automatizovan\u00e9 rie\u0161enia.<\/p>\n\n\n\n<p><strong>O&nbsp;krok vpred pred nariadeniami<\/strong> \u2013 regula\u010dn\u00e9 po\u017eiadavky s\u00fa \u010dasto zalo\u017een\u00e9 na&nbsp;proakt\u00edvnych opatreniach, ako s\u00fa <a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/?srsltid=AfmBOorj2QhukEgzT12gfIMXdM4CxO9CtrZl-KP68k9ZEwI2ujAax02S\">\u0161kolenia zameran\u00e9 na&nbsp;zvy\u0161ovanie povedomia<\/a> o&nbsp;r\u00f4znych kybernetick\u00fdch hrozb\u00e1ch vr\u00e1tane phishingu a&nbsp;spearphishingu, pri\u010dom vyzdvihuj\u00fa ich varovn\u00e9 znaky s&nbsp;cie\u013eom vyhn\u00fa\u0165 sa \u010do najv\u00e4\u010d\u0161iemu mno\u017estvu potenci\u00e1lnych \u013eudsk\u00fdch ch\u00fdb.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">P\u00e1r slov o&nbsp;zvy\u0161ovan\u00ed povedomia<\/h2>\n\n\n\n<p>Rozpozna\u0165 phishingov\u00e9 e\u2011maily m\u00f4\u017ee by\u0165 v&nbsp;dne\u0161nej dobe \u0165a\u017ek\u00e9, preto musia zamestnanci <a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/?srsltid=AfmBOorj2QhukEgzT12gfIMXdM4CxO9CtrZl-KP68k9ZEwI2ujAax02S\">komplexne porozumie\u0165<\/a> tomu, ako jednotliv\u00e9 druhy kybernetick\u00fdch \u00fatokov funguj\u00fa.<\/p>\n\n\n\n<p><strong><u>Tu je nieko\u013eko tipov, ako rozpozna\u0165 spearphishingov\u00e9 e<\/u><\/strong>\u2011<strong>maily:<\/strong><\/p>\n\n\n\n<p><strong>D\u00f4kladne skontrolujte adresu odosielate\u013ea:<\/strong> d\u00e1vajte si pozor na&nbsp;homoglyfy. Postupujte opatrne, ak sa zobrazen\u00e9 meno nezhoduje so&nbsp;skuto\u010dnou e-mailovou adresou v&nbsp;poli \u201eFrom\u201c.<\/p>\n\n\n\n<p><strong>V\u0161\u00edmajte si nezvy\u010dajn\u00fd jazyk alebo t\u00f3n:<\/strong> spearphishingov\u00e9 e\u2011maily \u010dasto napodob\u0148uj\u00fa niekoho, koho pozn\u00e1te, a&nbsp;s\u00fa dobre nap\u00edsan\u00e9, ale m\u00f4\u017eu obsahova\u0165 zvl\u00e1\u0161tne formul\u00e1cie, vyvol\u00e1va\u0165 nezvy\u010dajn\u00fd pocit naliehavosti alebo kl\u00e1s\u0165 po\u017eiadavky, ktor\u00e9 sa odosielate\u013eovi nepodobaj\u00fa.<\/p>\n\n\n\n<p><strong>Pred kliknut\u00edm na&nbsp;odkazy ich najprv skontrolujte:<\/strong> na&nbsp;skontrolovanie skuto\u010dnej URL adresy prejdite na&nbsp;odkaz kurzorom my\u0161i a&nbsp;ak je to mo\u017en\u00e9, pri pou\u017e\u00edvan\u00ed skenera QR k\u00f3dov overte URL adresu e\u0161te pred kliknut\u00edm na&nbsp;\u0148u. D\u00e1vajte si pozor na&nbsp;preklepy alebo dom\u00e9ny, ktor\u00e9 sa nezhoduj\u00fa s&nbsp;dom\u00e9nami legit\u00edmnych organiz\u00e1ci\u00ed.<\/p>\n\n\n\n<p><strong>Kontrolujte pr\u00edlohy:<\/strong> \u0161kodliv\u00e9 pr\u00edlohy maj\u00fa \u010dasto nezvy\u010dajn\u00e9 pr\u00edpony s\u00faborov, napr\u00edklad .exe alebo .zip. <a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/identity-and-data-protection\/how-infostealers-work\/\">Nenechajte sa oklama\u0165 n\u00e1zvom pr\u00edlohy alebo jej ikonou<\/a>. \u0160kodliv\u00e1 pr\u00edloha sa s\u00edce napr\u00edklad m\u00f4\u017ee zobrazova\u0165 ako PDF, lebo pou\u017e\u00edva pr\u00edslu\u0161n\u00fa ikonu a&nbsp;skratku \u201ePDF\u201c v&nbsp;n\u00e1zve pr\u00edlohy, av\u0161ak skuto\u010dn\u00e1 pr\u00edpona m\u00f4\u017ee by\u0165 in\u00e1.<\/p>\n\n\n\n<p><strong>D\u00f4kladne si preverujte po\u017eiadavky:<\/strong> ak s\u00fa od&nbsp;v\u00e1s v&nbsp;e\u2011maile vy\u017eadovan\u00e9 citliv\u00e9 inform\u00e1cie alebo prevod finan\u010dn\u00fdch prostriedkov, overte t\u00fato po\u017eiadavku cez in\u00fd kan\u00e1l (telefon\u00e1t, ofici\u00e1lny chat).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Na&nbsp;pomoc prich\u00e1dza ochrana ESET zalo\u017een\u00e1 na&nbsp;AI<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a> je rie\u0161enie vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu, ktor\u00e9 kombinuje filtrovanie spamu, antimalv\u00e9rov\u00fa kontrolu, antiphishing a&nbsp;pokro\u010dil\u00fa ochranu pred hrozbami s&nbsp;cloudov\u00fdm sandboxingom a&nbsp;pom\u00e1ha tak chr\u00e1ni\u0165 va\u0161u firemn\u00fa komunik\u00e1ciu, spolupr\u00e1cu a&nbsp;cloudov\u00e9 \u00falo\u017eisko.<\/p>\n\n\n\n<p>Vzh\u013eadom na&nbsp;pokrok v&nbsp;oblasti phishingov\u00fdch \u00fatokov spolo\u010dnos\u0165 ESET v&nbsp;roku 2024 obohatila <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ochranu cloudov\u00fdch aplik\u00e1ci\u00ed<\/a> o&nbsp;<strong>antispoofing,<\/strong> ktor\u00fd identifikuje \u00fato\u010dn\u00edkov a&nbsp;zabra\u0148uje im vyd\u00e1va\u0165 sa za&nbsp;d\u00f4veryhodn\u00e9 zdroje, a&nbsp;<strong>detekciu homoglyfov<\/strong>, ktor\u00e1 odha\u013euje \u0161kodliv\u00e9 e\u2011mailov\u00e9 dom\u00e9ny maskuj\u00face sa za&nbsp;legit\u00edmne z\u00e1menou p\u00edsmen za&nbsp;podobn\u00e9 znaky alebo p\u00edsmen\u00e1 z&nbsp;in\u00fdch abecied.<\/p>\n\n\n\n<p>Ned\u00e1vno do&nbsp;<a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a> pribudli dve nov\u00e9 funkcie, ktor\u00e9 cielia na&nbsp;\u010fal\u0161ie typy techn\u00edk maskovania vo&nbsp;phishingov\u00fdch e\u2011mailoch:<\/p>\n\n\n\n<p><strong>Detekcia nebezpe\u010dn\u00fdch QR k\u00f3dov<\/strong> \u2013 t\u00e1to funkcia odha\u013euje potenci\u00e1lne quishingov\u00e9 \u00fatoky t\u00fdm, \u017ee identifikuje QR&nbsp;k\u00f3dy v&nbsp;e\u2011mailoch, extrahuje vlo\u017een\u00e9 odkazy a&nbsp;skontroluje ich pomocou antiphishingov\u00fdch, antimalv\u00e9rov\u00fdch a&nbsp;antispamov\u00fdch technol\u00f3gi\u00ed spolo\u010dnosti ESET. \u0160kodliv\u00e9 URL adresy tak pom\u00e1ha zablokova\u0165 sk\u00f4r, ne\u017e sa stihn\u00fa dosta\u0165 k&nbsp;pou\u017e\u00edvate\u013eom.<\/p>\n\n\n\n<p><strong>Ochrana pred \u0161kodliv\u00fdmi pozn\u00e1mkami do&nbsp;kalend\u00e1ra<\/strong> \u2013 v&nbsp;pozv\u00e1nkach do&nbsp;kalend\u00e1ra a&nbsp;pr\u00edslu\u0161n\u00fdch e\u2011mailoch kontroluje pr\u00edtomnos\u0165 spamu, phishingov\u00fdch odkazov, malv\u00e9ru, podozriv\u00fdch pr\u00edloh a&nbsp;vlo\u017een\u00fdch QR&nbsp;k\u00f3dov. V&nbsp;pr\u00edpade n\u00e1jdenia hrozby sa e\u2011mail aj udalos\u0165 kalend\u00e1ra automaticky odstr\u00e1nia, \u010d\u00edm sa zabr\u00e1ni tomu, aby sa falo\u0161n\u00e9 \u017eiadosti o&nbsp;sch\u00f4dzku dostali k&nbsp;pou\u017e\u00edvate\u013eom.<\/p>\n\n\n\n<p>Na zn\u00ed\u017eenie zlo\u017eitosti je mo\u017en\u00e9 <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a> integrova\u0165 so\u00a0slu\u017ebou Microsoft 365 alebo Google Workspace u\u017e v\u00a0priebehu nieko\u013ek\u00fdch min\u00fat, \u010do v\u00e1m zaist\u00ed okam\u017eit\u00fa ochranu. Rie\u0161enie podporuje spr\u00e1vu viacer\u00fdch n\u00e1jomn\u00edkov pre desiatky tis\u00edc pou\u017e\u00edvate\u013eov \u2013 nov\u00ed zamestnanci s\u00fa chr\u00e1nen\u00ed automaticky bez manu\u00e1lneho nastavovania. V\u010faka intuit\u00edvnemu riadiacemu panelu mo\u017eno podozriv\u00e9 e\u2011maily jednoducho presun\u00fa\u0165 do\u00a0karant\u00e9ny, ako ich aj spravova\u0165 a\u00a0pre\u0161etrova\u0165.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u00dato\u010dn\u00edci zdokona\u013euj\u00fa svoje n\u00e1stroje \u2013 urobte to ist\u00e9<\/h2>\n\n\n\n<p>Jedin\u00fd phishingov\u00fd e\u2011mail m\u00f4\u017ee ochromi\u0165 firmu akejko\u013evek ve\u013ekosti a&nbsp;vzh\u013eadom na&nbsp;zdokona\u013eovanie n\u00e1strojov a&nbsp;takt\u00edk vyu\u017e\u00edvan\u00fdch kybernetick\u00fdmi zlo\u010dincami je t\u00e1to hrozba v\u00e1\u017enej\u0161ia ako kedyko\u013evek predt\u00fdm.<\/p>\n\n\n\n<p>Hoci firmy nedok\u00e1\u017eu zabr\u00e1ni\u0165 \u00fato\u010dn\u00edkom v&nbsp;pou\u017e\u00edvan\u00ed umelej inteligencie na&nbsp;zhroma\u017e\u010fovanie inform\u00e1ci\u00ed a&nbsp;sp\u00fa\u0161\u0165anie spearphishingov\u00fdch kampan\u00ed, m\u00f4\u017eu zavies\u0165 viacvrstvov\u00fd pr\u00edstup k&nbsp;ochrane na&nbsp;odhalenie a&nbsp;blokovanie pokusov o&nbsp;phishing. \u0160kolenia o&nbsp;bezpe\u010dnosti s\u00fa na\u010falej d\u00f4le\u017eit\u00e9, ale automatizovan\u00e1 ochrana zalo\u017een\u00e1 na&nbsp;umelej inteligencii je nevyhnutn\u00e1 na&nbsp;identifik\u00e1ciu hrozieb, ktor\u00e9 \u013eudsk\u00e9 o\u010di jednoducho nedok\u00e1\u017eu identifikova\u0165.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a> poskytuje spo\u013eahliv\u00fa ochranu pred vektormi \u00fatokov poch\u00e1dzaj\u00facimi z&nbsp;e\u2011mailov\u00fdch platforiem a&nbsp;platforiem na&nbsp;spolupr\u00e1cu, \u010d\u00edm zastavuje phishingov\u00e9 \u00fatoky sk\u00f4r, ako sp\u00f4sobia \u0161kodu.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010cast\u00e9 ot\u00e1zky:<\/h2>\n\n\n\n<p><strong>\u010co je phishing a&nbsp;pre\u010do je nebezpe\u010dn\u00fd?<\/strong><\/p>\n\n\n\n<p>Phishing je taktika soci\u00e1lneho in\u017einierstva vyu\u017e\u00edvaj\u00faca impersonifik\u00e1ciu (vyd\u00e1vanie sa za&nbsp;niekoho in\u00e9ho) a&nbsp;naliehav\u00e9 v\u00fdzvy kona\u0165, ktor\u00e9 pou\u017e\u00edvate\u013eov n\u00fatia odha\u013eova\u0165 citliv\u00e9 \u00fadaje alebo s\u0165ahova\u0165 malv\u00e9r.<\/p>\n\n\n\n<p><strong>Ako sa phishing \u010dasom vyvinul?<\/strong><\/p>\n\n\n\n<p>Phishingov\u00e9 taktiky sa kedysi spoliehali na&nbsp;objem a&nbsp;zjavn\u00e9 triky, ako je zl\u00e1 gramatika alebo podozriv\u00e9 URL adresy. \u00dato\u010dn\u00edci dnes pou\u017e\u00edvaj\u00fa umel\u00fa inteligenciu na&nbsp;r\u00fdchle vytv\u00e1ranie a&nbsp;\u0161\u00edrenie presved\u010div\u00fdch spr\u00e1v \u2013 pod\u013ea spolo\u010dnosti IBM dok\u00e1\u017ee umel\u00e1 inteligencia skr\u00e1ti\u0165 \u010das tvorby phishingov\u00fdch e\u2011mailov zo&nbsp;16&nbsp;hod\u00edn na&nbsp;5&nbsp;min\u00fat.<\/p>\n\n\n\n<p><strong>Ako \u010dast\u00e9 s\u00fa phishingov\u00e9 \u00fatoky?<\/strong><\/p>\n\n\n\n<p>Phishing je pravdepodobne naj\u010dastej\u0161\u00edm vektorom \u00fatokov. Telemetria spolo\u010dnosti ESET ukazuje, \u017ee 28,2&nbsp;% v\u0161etk\u00e9ho zachyten\u00e9ho malv\u00e9ru je doru\u010dovan\u00e9ho s&nbsp;vyu\u017eit\u00edm phishingu.<\/p>\n\n\n\n<p><strong>Ak\u00e9 techniky maskovania \u00fato\u010dn\u00edci pou\u017e\u00edvaj\u00fa?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Podvrhnutie odosielate\u013ea e\u2011mailu: falo\u0161n\u00e9 hlavi\u010dky \u201eFrom\u201c a\u00a0\u201eReply-To\u201c.<\/li>\n\n\n\n<li>Homoglyfick\u00e9 \u00fatoky: pou\u017e\u00edvanie podobne vyzeraj\u00facich znakov (napr. \u201e\u212es\u212et.com\u201c namiesto \u201eeset.com\u201c).<\/li>\n\n\n\n<li>Typosquatting: drobn\u00e9 preklepy (napr. \u201eeseet.com\u201c).<\/li>\n\n\n\n<li>Quishing: \u0161kodliv\u00e9 QR k\u00f3dy skr\u00fdvaj\u00face URL adresy.<\/li>\n\n\n\n<li>\u0160kodliv\u00e9 pozv\u00e1nky do\u00a0kalend\u00e1ra: falo\u0161n\u00e9 pozv\u00e1nky obch\u00e1dzaj\u00face e\u2011mailov\u00e9 filtre, ktor\u00e9 s\u00fa automaticky prid\u00e1van\u00e9 do\u00a0kalend\u00e1rov.<\/li>\n<\/ul>\n\n\n\n<p><strong>Ako sa m\u00f4\u017eu firmy chr\u00e1ni\u0165?<\/strong><\/p>\n\n\n\n<p>Osvojte si pr\u00edstup zameran\u00fd na&nbsp;prevenciu, ktor\u00fd zah\u0155\u0148a minimaliz\u00e1ciu mo\u017en\u00fdch miest \u00fatokov, zn\u00ed\u017eenie zlo\u017eitosti, zlep\u0161enie pr\u00edstupu ku&nbsp;kybernetickej bezpe\u010dnosti a&nbsp;udr\u017eanie n\u00e1skoku pred nariadeniami.<\/p>\n\n\n\n<p><strong>Ako pom\u00e1ha ESET Cloud Office Security?<\/strong><\/p>\n\n\n\n<p>ESET Cloud Office Security pon\u00faka pre slu\u017eby Microsoft 365 a&nbsp;Google Workspace ochranu zalo\u017een\u00fa na&nbsp;umelej inteligencii, ktor\u00e1 kombinuje filtrovanie spamu a&nbsp;antimalv\u00e9rov\u00fa a&nbsp;antiphishingov\u00fa technol\u00f3giu s&nbsp;cloudov\u00fdm sandboxingom. Spolo\u010dnos\u0165 ESET neust\u00e1le aktualizuje ochranu cloudov\u00fdch aplik\u00e1ci\u00ed a&nbsp;odha\u013euje tak aj tie najsofistikovanej\u0161ie pokusy o&nbsp;phishing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ESET posilnil svoju antiphishingov\u00fa ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra. V \u010dase, ke\u010f je phishing \u010doraz kvalitnej\u0161\u00ed v\u010faka AI, u\u017e obozretnos\u0165 nesta\u010d\u00ed. Kybernetick\u00e1 bezpe\u010dnos\u0165 bola v\u017edy pretekom medzi \u00fato\u010dn\u00edkmi a&nbsp;obrancami, ale n\u00e1rast n\u00e1strojov umelej inteligencie tento boj nev\u00eddane ur\u00fdchlil. Medzi dobr\u00e9 pr\u00edklady patr\u00ed spearphishing: kybernetick\u00ed zlo\u010dinci kedysi tr\u00e1vili hodiny alebo dokonca dni zhroma\u017e\u010fovan\u00edm \u00fadajov, aby vytvorili presved\u010div\u00e9 a&nbsp;prisp\u00f4soben\u00e9 e\u2011maily, ktor\u00e9 mali&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-6528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing je \u010doraz nebezpe\u010dnej\u0161\u00ed, obozretnos\u0165 u\u017e nesta\u010d\u00ed | ESET<\/title>\n<meta name=\"description\" content=\"Phishing je v\u010faka AI \u010doraz z\u00e1kernej\u0161\u00ed. ESET posilnil ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing je \u010doraz nebezpe\u010dnej\u0161\u00ed, obozretnos\u0165 u\u017e nesta\u010d\u00ed | ESET\" \/>\n<meta property=\"og:description\" content=\"Phishing je v\u010faka AI \u010doraz z\u00e1kernej\u0161\u00ed. ESET posilnil ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-27T13:35:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T13:38:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Phishing je nebezpe\u010dnej\u0161\u00ed ako kedyko\u013evek predt\u00fdm. Firmy sa potrebuj\u00fa chr\u00e1ni\u0165 nov\u00fdmi n\u00e1strojmi\u00a0\",\"datePublished\":\"2026-03-27T13:35:16+00:00\",\"dateModified\":\"2026-03-27T13:38:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/\"},\"wordCount\":2971,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/phishing_ecos_blog-1.png\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/\",\"name\":\"Phishing je \u010doraz nebezpe\u010dnej\u0161\u00ed, obozretnos\u0165 u\u017e nesta\u010d\u00ed | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/phishing_ecos_blog-1.png\",\"datePublished\":\"2026-03-27T13:35:16+00:00\",\"dateModified\":\"2026-03-27T13:38:33+00:00\",\"description\":\"Phishing je v\u010faka AI \u010doraz z\u00e1kernej\u0161\u00ed. ESET posilnil ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/phishing_ecos_blog-1.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/phishing_ecos_blog-1.png\",\"width\":1920,\"height\":1080,\"caption\":\"bvf phishing ecos ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing je nebezpe\u010dnej\u0161\u00ed ako kedyko\u013evek predt\u00fdm. Firmy sa potrebuj\u00fa chr\u00e1ni\u0165 nov\u00fdmi n\u00e1strojmi\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing je \u010doraz nebezpe\u010dnej\u0161\u00ed, obozretnos\u0165 u\u017e nesta\u010d\u00ed | ESET","description":"Phishing je v\u010faka AI \u010doraz z\u00e1kernej\u0161\u00ed. ESET posilnil ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/","og_locale":"sk_SK","og_type":"article","og_title":"Phishing je \u010doraz nebezpe\u010dnej\u0161\u00ed, obozretnos\u0165 u\u017e nesta\u010d\u00ed | ESET","og_description":"Phishing je v\u010faka AI \u010doraz z\u00e1kernej\u0161\u00ed. ESET posilnil ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2026-03-27T13:35:16+00:00","article_modified_time":"2026-03-27T13:38:33+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"12 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Phishing je nebezpe\u010dnej\u0161\u00ed ako kedyko\u013evek predt\u00fdm. Firmy sa potrebuj\u00fa chr\u00e1ni\u0165 nov\u00fdmi n\u00e1strojmi\u00a0","datePublished":"2026-03-27T13:35:16+00:00","dateModified":"2026-03-27T13:38:33+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/"},"wordCount":2971,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1.png","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/","name":"Phishing je \u010doraz nebezpe\u010dnej\u0161\u00ed, obozretnos\u0165 u\u017e nesta\u010d\u00ed | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1.png","datePublished":"2026-03-27T13:35:16+00:00","dateModified":"2026-03-27T13:38:33+00:00","description":"Phishing je v\u010faka AI \u010doraz z\u00e1kernej\u0161\u00ed. ESET posilnil ochranu o\u00a0detekciu \u0161kodliv\u00fdch QR k\u00f3dov a\u00a0pozv\u00e1nok do\u00a0kalend\u00e1ra.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/phishing_ecos_blog-1.png","width":1920,"height":1080,"caption":"bvf phishing ecos ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/phishing-je-nebezpecnejsi-ako-kedykolvek-predtym-firmy-sa-potrebuju-chranit-novymi-nastrojmi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Phishing je nebezpe\u010dnej\u0161\u00ed ako kedyko\u013evek predt\u00fdm. Firmy sa potrebuj\u00fa chr\u00e1ni\u0165 nov\u00fdmi n\u00e1strojmi\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6528"}],"version-history":[{"count":2,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6528\/revisions"}],"predecessor-version":[{"id":6531,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6528\/revisions\/6531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6533"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}