[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"category-cyber":3,"$fNQTDPpNkO5H7OI1CrCmAYfZyd53J8nKApjSQTl7oq0w":130},{"items":4,"total":128,"page":129,"pages":129},[5,23,37,51,64,76,89,102,115],{"id":6,"title_uz":7,"slug":8,"summary_uz":9,"category":10,"tags":11,"image_url":17,"og_image_url":18,"views_count":19,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":22},"6a256b05-ce73-4bed-91f8-4894e46371d2","Google bilan kirish: qulaylik va xavfsizlikka oid tahlil","google-bilan-kirish-qulaylik-va-xavfsizlikka-oid-tahlil","Google bilan kirish funksiyasi foydalanuvchilarga qulaylik beradi, lekin xavfsizlik tahdidlarini ham ko‘rib chiqamiz.","cyber",[12,13,14,15,16],"Google","kirish","xavfsizlik","parol menejeri","authentifikatsiya","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002Ffec0adc65b2e.jpg",null,15,0,false,"2026-05-14T12:01:23.887869Z",{"id":24,"title_uz":25,"slug":26,"summary_uz":27,"category":10,"tags":28,"image_url":34,"og_image_url":18,"views_count":35,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":36},"b54ce11f-6096-4ab1-8866-d7400fbdb878","CopyFail xatosi: Linux kernelidagi jiddiy xavfsizlik tahdidi","copyfail-xatosi-linux-kernelidagi-jiddiy-xavfsizlik-tahdidi","CopyFail xatosi Linux kernelining ko‘pgina versiyalarida xavfsizlik teshigini ochib berdi; tizim administratorlari darhol yamoqni o‘rnatishlari lozim.",[29,30,31,32,33],"CopyFail","Linux","kiberxavfsizlik","CVE-2026-31431","kernel","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002Fcab1adb72051.jpg",18,"2026-05-05T06:08:18.458372Z",{"id":38,"title_uz":39,"slug":40,"summary_uz":41,"category":10,"tags":42,"image_url":48,"og_image_url":48,"views_count":49,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":50},"c3b0b9e4-447e-4550-9fdd-5b5f50b66a49","cPanel zaifligi: Hackerlar minglab veb-saytlarni qanday boshqaradi?","cpanel-zaifligi-hackerlar-minglab-veb-saytlarni-qanday-boshqaradi","cPanel va WHM dasturidagi kritik zaiflikdan foydalangan hackerlar minglab saytlarni egalarini yo‘qotib, xavfsizlik choralarini ko‘rib chiqadi (160 belgi).",[43,44,45,46,47],"cPanel","zaiflik","veb-xosting","hackerlar","sayt-himoyasi","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002F5d70e0c7da92.jpg",17,"2026-05-05T02:08:18.451934Z",{"id":52,"title_uz":53,"slug":54,"summary_uz":55,"category":10,"tags":56,"image_url":61,"og_image_url":61,"views_count":62,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":63},"fbd650b4-f442-4662-bb8a-a5dc9f5b0df5","Canonical tizimiga kiberhujum: Nima bo'ldi?","canonical-tizimiga-kiberhujum-nima-bo-ldi","Canonical (Ubuntu) serverlariga kiberhujum sodir bo'ldi. Xavfsizlik choralarini ko'rish, foydalanuvchilar uchun tavsiyalar va kelgusidagi tahdidlar haqida batafsil ma'lumot.",[57,58,59,14,60],"Canonical","Ubuntu","kiberhujum","open source","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002F2d19888f4903.jpg",13,"2026-05-03T02:08:18.451769Z",{"id":65,"title_uz":66,"slug":67,"summary_uz":68,"category":10,"tags":69,"image_url":73,"og_image_url":73,"views_count":74,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":75},"f8f88fa6-58ae-494f-b2b7-4592bbcb78c0","cPaneldagi xavfsizlik xatosi: millionlab saytlar xakerlar tahdidi ostida","cpaneldagi-xavfsizlik-xatosi-millionlab-saytlar-xakerlar-tahdidi-ostida","cPanelda topilgan xatolik millionlab veb-saytlarni xavf ostiga qo'yib, xakerlar tomonidan faol ekspluatatsiya qilinmoqda. Xavfsizlik choralarini ko'rish zarur.",[43,70,31,71,72],"xaker hujumlari","veb-xost","xavfsizlik yamoqlari","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002Fe0d81599115e.jpg",20,"2026-05-01T04:08:18.440913Z",{"id":77,"title_uz":78,"slug":79,"summary_uz":80,"category":10,"tags":81,"image_url":86,"og_image_url":86,"views_count":87,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":88},"872cd8b8-17b5-4490-a58d-19e3f992ed93","Tadbirkorlar uchun soliq organlari nomidan kelayotgan soxta xatlarni tanib, himoya qilish yo‘llari","tadbirkorlar-uchun-soliq-organlari-nomidan-kelayotgan-soxta-xatlarni-tanib-himoya-qilish-yollari","Soliq organlari nomidan yuborilayotgan phishing xatlari tadbirkorlarning ma'lumotlarini xavf ostiga qo'yadi – ularni qanday aniqlash va oldini olish kerak.",[82,83,84,31,85],"soliq organlari","phishing","tadbirkor","ma'lumotlarni himoya","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002F7db573936006.jpg",19,"2026-04-23T10:01:56.388274Z",{"id":90,"title_uz":91,"slug":92,"summary_uz":93,"category":10,"tags":94,"image_url":99,"og_image_url":99,"views_count":100,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":101},"adaa86fd-82cd-4584-b7e8-1807498aec6f","Vercel’ning ichki tizimlariga kiritilgan kiberhujum: Xavfsizlik tahdidi va choralar","vercelning-ichki-tizimlariga-kiritilgan-kiberhujum-xavfsizlik-tahdidi-va-choralar","Vercel kompaniyasining ichki tizimlariga kiberhujum sodir bo‘ldi. Ma'lumotlar oqimi, xavfsizlik choralari va foydalanuvchilarga tavsiyalar.",[95,59,96,97,98],"Vercel","bulut xavfsizligi","API kalitlari","Zero Trust","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002Fba1b3bfad8a5.jpg",21,"2026-04-19T16:12:16.966835Z",{"id":103,"title_uz":104,"slug":105,"summary_uz":106,"category":10,"tags":107,"image_url":113,"og_image_url":113,"views_count":49,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":114},"c070d9e7-c1ef-4366-a0af-a7674417a09f","Cloudflare: Veb Xavfsizlik Xizmatining Foydalanuvchi Ko‘ngliga Qanday Ta'sir Qiladi?","cloudflare-veb-xavfsizlik-xizmatining-foydalanuvchi-kongliga-qanday-ta-sir-qiladi","Cloudflare ning keng tarqalgan xavfsizlik yechimlari foydalanuvchilarni qiyin holatga tushiradi — captcha, kechikish va narx o‘zgarishlari haqida batafsil.",[108,109,110,111,112],"Cloudflare","veb xavfsizlik","captcha","DDoS","CDN","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002Fa1081d88fd85.jpg","2026-04-19T08:12:16.967745Z",{"id":116,"title_uz":117,"slug":118,"summary_uz":119,"category":10,"tags":120,"image_url":126,"og_image_url":18,"views_count":100,"likes_count":20,"is_sponsored":21,"sponsor_name":18,"published_at":127},"e9e285b1-8d17-478f-89dc-54fb1b74a74a","Rossiya Chegara Xodimlari Endi Telefon va Noutbuklarni Tekshirish Huquqiga Ega","rossiya-chegara-xodimlari-endi-telefon-va-noutbuklarni-tekshirish-huquqiga-ega","2026‑yil aprel oyidan boshlab Rossiya chegaralari smartfon, planshet va noutbuklarni tekshirish huquqini oladi – qonun, amaliyot va xavflar haqida batafsil.",[121,122,123,124,125],"Rossiya","chegara","elektron qurilmalar","tekshirish","qonun","https:\u002F\u002Ftech.iportal.uz\u002Fapi\u002Fmedia\u002Fimages\u002F7cfca990a363.jpg","2026-04-18T02:12:16.966367Z",9,1,[131,133,135,136,137,138,139,140,141,142,143,144,145,146,147],{"tag":31,"count":132},3,{"tag":59,"count":134},2,{"tag":43,"count":134},{"tag":14,"count":134},{"tag":29,"count":129},{"tag":111,"count":129},{"tag":32,"count":129},{"tag":121,"count":129},{"tag":108,"count":129},{"tag":58,"count":129},{"tag":95,"count":129},{"tag":98,"count":129},{"tag":16,"count":129},{"tag":96,"count":129},{"tag":30,"count":129}]