{"id":1700,"date":"2024-04-18T02:53:10","date_gmt":"2024-04-18T02:53:10","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1700"},"modified":"2024-04-18T02:53:13","modified_gmt":"2024-04-18T02:53:13","slug":"anydesk-hacked-urgent-password-change-required-to-secure-your-account","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/anydesk-hacked-urgent-password-change-required-to-secure-your-account\/","title":{"rendered":"AnyDesk\u906d\u99ed\u5ba2\u653b\u64ca\uff1a\u76e1\u5feb\u66f4\u6539\u5bc6\u78bc\u4ee5\u4fdd\u8b77\u5e33\u6236\u5b89\u5168"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>AnyDesk Software GmbH\u662f\u4e00\u5bb6\u958b\u767c\u5ee3\u6cdb\u4f7f\u7528\u7684\u9060\u7aef\u684c\u9762\u61c9\u7528\u7a0b\u5f0f\u7684\u5fb7\u570b\u516c\u53f8\uff0c\u6700\u8fd1\u4ee4\u4eba\u9707\u9a5a\u5730\u78ba\u8a8d\u767c\u751f\u4e86\u5b89\u5168\u6f0f\u6d1e\u3002 \u8a72\u516c\u53f8\u7684\u751f\u7522\u7cfb\u7d71\u906d\u5230\u5165\u4fb5\uff0c\u5f15\u767c\u4e86\u5c0d\u7528\u6236\u8cc7\u6599\u548c\u96b1\u79c1\u7684\u64d4\u6182\u3002 \u672c\u6587\u65e8\u5728\u6982\u8ff0AnyDesk\u99ed\u5ba2\u4e8b\u4ef6\u3001\u516c\u53f8\u63a1\u53d6\u7684\u63aa\u65bd\u4ee5\u53ca\u70ba\u4fdd\u8b77\u5e33\u6236\u800c\u63a1\u53d6\u7684\u6b65\u9a5f\u3002<\/p>\n\n\n\n<p>\u78ba\u8a8d\u5165\u4fb5\u884c\u70ba<\/p>\n\n\n\n<p>2024\u5e742\u67085\u65e5\uff0cAnyDesk Software GmbH\u767c\u5e03\u4e86\u5b98\u65b9\u8072\u660e\uff0c\u627f\u8a8d\u767c\u751f\u4e86\u5b89\u5168\u6f0f\u6d1e\uff0c\u4e26\u78ba\u8a8d\u5176\u751f\u7522\u7cfb\u7d71\u5df2\u906d\u5230\u5165\u4fb5\u3002 \u96d6\u7136\u8072\u660e\u4e2d\u7f3a\u4e4f\u5177\u9ad4\u7684\u6280\u8853\u7d30\u7bc0\uff0c\u4f46\u8a72\u516c\u53f8\u5f37\u8abf\u6b64\u6b21\u4e8b\u4ef6\u8207\u52d2\u7d22\u8edf\u9ad4\u7121\u95dc\uff0c\u4e26\u5411\u7528\u6236\u4fdd\u8b49\u3002 \u5728AnyDesk\u767c\u5e03\u8072\u660e\u4e4b\u524d\uff0c\u5b89\u5168\u7814\u7a76\u54e1\u51f1\u6587-\u535a\u8499\u7279\uff08Kevin Beaumont\uff09\u5df2\u7d93\u5c0d\u53ef\u80fd\u7684\u99ed\u5ba2\u653b\u64ca\u8868\u793a\u4e86\u64d4\u6182\uff1b\u535a\u8499\u7279\u6307\u51fa\u4e86\u6700\u8fd1\u4e00\u6b21\u507d\u88dd\u6210\"\u4f8b\u884c\u7dad\u8b77\"\u7684\u8eab\u4efd\u9a57\u8b49\u6545\u969c\u3002 \u4ed6\u9084\u6307\u51fa\uff0cAnyDesk\u767c\u5e03\u76848.0.8\u7248\u672c\u4f7f\u7528\u4e86\u65b0\u7684\u7a0b\u5f0f\u78bc\u7c3d\u7f72\u8b49\u66f8\uff0c\u6697\u793a\u4e86\u5c0d\u5165\u4fb5\u7684\u56de\u61c9\u3002<\/p>\n\n\n\n<p>\u61f7\u7591\u8207\u8fc5\u901f\u53cd\u61c9<\/p>\n\n\n\n<p>\u5728AnyDesk\u5ba3\u5e03\u4e4b\u524d\uff0c\u5b89\u5168\u7814\u7a76\u54e1Kevin Beaumont\u5df2\u7d93\u5c0d\u53ef\u80fd\u7684\u9ed1\u5ba2\u653b\u64ca\u63d0\u51fa\u4e86\u64d4\u6182\u3002Beaumont\u6307\u51fa\u4e86\u4e00\u6b21\u8fd1\u671f\u7684\u8eab\u4efd\u9a57\u8b49\u4e2d\u65b7\uff0c\u88ab\u507d\u88dd\u6210\u201c\u8a08\u5283\u7dad\u8b77\u201d\uff0c\u9019\u770b\u8d77\u4f86\u5f88\u4e0d\u5c0b\u5e38\u3002\u4ed6\u9084\u5f37\u8abf\u4e86AnyDesk\u7248\u672c8.0.8\u7684\u767c\u5e03\uff0c\u8a72\u7248\u672c\u4f7f\u7528\u4e86\u65b0\u7684\u4ee3\u78bc\u7c3d\u540d\u8b49\u66f8\uff0c\u9019\u4f3c\u4e4e\u662f\u5c0d\u9055\u898f\u884c\u70ba\u7684\u56de\u61c9\u3002<\/p>\n\n\n\n<p>AnyDesk\u7684\u61c9\u5c0d\u63aa\u65bd<\/p>\n\n\n\n<p>\u5165\u4fb5\u767c\u751f\u5f8c\uff0cAnyDesk\u7acb\u5373\u8981\u6c42\u77e5\u540d\u7db2\u8def\u653b\u64ca\u97ff\u61c9\u516c\u53f8Crowdstrike\u9032\u884c\u8abf\u67e5\u4e26\u63a1\u53d6\u884c\u52d5\u3002 \u8a72\u516c\u53f8\u63a1\u53d6\u4e86\u4ee5\u4e0b\u63aa\u65bd:<\/p>\n\n\n\n<p>\u64a4\u92b7\u5148\u524d\u7528\u65bc\u4e8c\u9032\u4f4d\u6a94\u6848\u7684\u7a0b\u5f0f\u78bc\u7c3d\u7f72\u6191\u8b49<\/p>\n\n\n\n<p>\u5fc5\u8981\u6642\uff0c\u66f4\u63db\u6216\u4fee\u5fa9\u6240\u6709\u8207\u5b89\u5168\u76f8\u95dc\u7684\u8b49\u66f8\u548c\u7cfb\u7d71<\/p>\n\n\n\n<p>\u64a4\u92b7\u5165\u53e3\u7db2\u7ad9 (my.anydesk.com) \u7684\u6240\u6709\u5bc6\u78bc\uff0c\u4e26\u901a\u77e5\u4f7f\u7528\u8005\u8b8a\u66f4\u5bc6\u78bc\u3002<\/p>\n\n\n\n<p>AnyDesk\u5411\u7528\u6236\u4fdd\u8b49\uff0c\u60c5\u6cc1\u5df2\u53d7\u5230\u63a7\u5236\uff0c\u6c92\u6709\u8b49\u64da\u8868\u660e\u7528\u6236\u8a2d\u5099\u53d7\u5230\u5165\u4fb5\u5f71\u97ff\u3002<\/p>\n\n\n\n<p>\u7528\u6236\u7684\u64d4\u6182\u548c\u4fdd\u8b49<\/p>\n\n\n\n<p>\u5118\u7ba1AnyDesk\u8072\u7a31\u5176\u8edf\u9ad4\u4ecd\u7136\u5b89\u5168\u53ef\u7528\uff0c\u4f46\u6700\u8fd1\u5e7e\u9031\u4ecd\u6709\u8207AnyDesk\u6709\u95dc\u7684\u53ef\u7591\u6d3b\u52d5\u7684\u5831\u544a\u3002 \u5fb7\u570b\u5b89\u5168\u90e8\u843d\u5ba2G\u00fcnter Born\u5206\u4eab\u4e86\u4e00\u4e9b\u8b80\u8005\u63d0\u4ea4\u7684\u5831\u544a\uff0c\u5176\u4e2d\u4e00\u4e9b\u6700\u7d42\u88ab\u8b49\u660e\u662f\u8aa4\u5831\u3002 \u4e0d\u904e\uff0c\u6709\u4e00\u500b\u6848\u4f8b\u8207\u5df2\u78ba\u8a8d\u7684\u5165\u4fb5\u76f8\u543b\u5408\uff0c\u4e26\u6d89\u53ca\u6545\u969c\u5f8c\u57fa\u790e\u8a2d\u65bd\u7684\u8b8a\u66f4\u3002<\/p>\n\n\n\n<p>\u5728\u53e6\u4e00\u500b\u6848\u4f8b\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u516c\u53f8Resecurity\u5831\u544a\u7a31\uff0c\u6709\u4eba\u5728\u7db2\u8def\u72af\u7f6a\u8ad6\u58c7\u4e0a\u51fa\u552eAnyDesk\u5ba2\u6236\u5e33\u6236\u6191\u8b49\u3002 \u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c\u9019\u4e9b\u88ab\u76dc\u5e33\u6236\u986f\u7136\u8207\u6700\u8fd1\u7684\u6f0f\u6d1e\u7121\u95dc\uff0c\u662f\u7531\u8cc7\u8a0a\u7aca\u53d6\u60e1\u610f\u8edf\u9ad4\u9020\u6210\u7684\u3002<\/p>\n\n\n\n<p>\u4fdd\u8b77\u60a8\u7684\u5e33\u6236<\/p>\n\n\n\n<p>\u9451\u65bc\u6b64\u6f0f\u6d1e\u7684\u8cc7\u8a0a\u6709\u9650\uff0cAnyDesk\u63d0\u4f9b\u4e86\u4ee5\u4e0b\u4e3b\u8981\u5b89\u5168\u5efa\u8b70\u4ee5\u52a0\u5f37\u7528\u6236\u5b89\u5168:<\/p>\n\n\n\n<p>\u4e0b\u8f09\u4e26\u5b89\u88dd\u6700\u65b0\u7248\u672c\uff08v8.0.8\uff09\u7684AnyDesk\u5ba2\u6236\u7aef\u8edf\u9ad4\uff0c\u8a72\u7248\u672c\u4f7f\u7528\u65b0\u7684\u7a0b\u5f0f\u78bc\u7c3d\u7f72\u6191\u8b49\u9032\u884c\u7c3d\u7f72<\/p>\n\n\n\n<p>\u8003\u616e\u66f4\u6539AnyDesk\u7db2\u8def\u5165\u53e3\u7db2\u7ad9\u5bc6\u78bc\u4e26\u555f\u7528\u96d9\u91cd\u9a57\u8b49\u4ee5\u63d0\u9ad8\u5b89\u5168\u6027<\/p>\n\n\n\n<p>\u66f4\u65b0\u548c\u5176\u4ed6\u4fdd\u8b49<\/p>\n\n\n\n<p>\u57282024\u5e742\u67088\u65e5\u767c\u5e03\u7684\u66f4\u65b0\u4e2d\uff0cAnyDesk\u63d0\u4f9b\u4e86\u6709\u95dc\u6b64\u4e8b\u4ef6\u7684\u66f4\u591a\u8cc7\u8a0a\u3002 \u4ed6\u5011\u6f84\u6e05\u8aaa\uff0c\u5165\u4fb5\u59cb\u65bc2023\u5e7412\u6708\u5e95\uff0c\u4e26\u78ba\u8a8d\u9019\u4e0d\u662f\u52d2\u7d22\u8edf\u9ad4\u6216\u52d2\u7d22\u4f01\u5716\uff1bAnyDesk\u5c0d\u7a0b\u5f0f\u78bc\u9032\u884c\u4e86\u5fb9\u5e95\u5be9\u67e5\uff0c\u6c92\u6709\u767c\u73fe\u60e1\u610f\u4fee\u6539\u6216\u5411\u5ba2\u6236\u5206\u767c\u6709\u5bb3\u7a0b\u5f0f\u78bc\u7684\u8b49\u64da\u3002<\/p>\n\n\n\n<p>\u95dc\u65bc\u7528\u6236\u5bc6\u78bc\uff0cAnyDesk\u8a8d\u70ba\u7531\u65bc\u9055\u898f\u884c\u70ba\u7684\u6027\u8cea\uff0c\u5b83\u5011\u4e26\u672a\u88ab\u6d29\u9732\u3002\u7136\u800c\uff0c\u4f5c\u70ba\u4e00\u7a2e\u9810\u9632\u63aa\u65bd\uff0c\u4ed6\u5011\u5df2\u7d93\u5c0d\u6240\u6709\u5ba2\u6236\u5be6\u65bd\u4e86\u5bc6\u78bc\u91cd\u7f6e\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u6700\u8fd1\u6d89\u53caAnyDesk\u7684\u5b89\u5168\u6f0f\u6d1e\u63d0\u9192\u6211\u5011\uff0c\u4eca\u5929\u7684\u6578\u5b57\u5316\u74b0\u5883\u4e2d\u4ecd\u7136\u5b58\u5728\u8457\u6301\u7e8c\u7684\u5a01\u8105\u3002\u96d6\u7136AnyDesk\u5df2\u7d93\u8fc5\u901f\u63a1\u53d6\u884c\u52d5\u4f86\u89e3\u6c7a\u9019\u500b\u6f0f\u6d1e\u4e26\u78ba\u4fdd\u4ed6\u5011\u7684\u8edf\u9ad4\u7684\u5b89\u5168\uff0c\u4f46\u5c0d\u65bc\u7528\u6236\u4f86\u8aaa\uff0c\u4e3b\u52d5\u63a1\u53d6\u63aa\u65bd\u4fdd\u8b77\u4ed6\u5011\u7684\u5e33\u6236\u662f\u81f3\u95dc\u91cd\u8981\u7684\u3002\u901a\u904e\u9075\u5faaAnyDesk\u7684\u5efa\u8b70\uff0c\u5305\u62ec\u66f4\u65b0\u8edf\u9ad4\u548c\u5be6\u65bd\u5f37\u5bc6\u78bc\u8207\u96d9\u56e0\u7d20\u8a8d\u8b49\uff0c\u7528\u6236\u53ef\u4ee5\u5c07\u9019\u6b21\u4e0d\u5e78\u4e8b\u4ef6\u7684\u6f5b\u5728\u5f71\u97ff\u964d\u5230\u6700\u4f4e\u3002<\/p>\n\n\n\n<p>\u96a8\u8457\u7db2\u7d61\u5b89\u5168\u98a8\u96aa\u7684\u4e0d\u65b7\u6f14\u8b8a\uff0c\u4fdd\u6301\u8b66\u89ba\u4e26\u63a1\u53d6\u7db2\u7d61\u5b89\u5168\u7684\u6700\u4f73\u5be6\u8e10\u662f\u81f3\u95dc\u91cd\u8981\u7684\u3002\u5b9a\u671f\u66f4\u65b0\u8edf\u9ad4\uff0c\u4f7f\u7528\u7368\u7279\u4e14\u5f37\u5927\u7684\u5bc6\u78bc\uff0c\u4e26\u555f\u7528\u984d\u5916\u7684\u5b89\u5168\u63aa\u65bd\uff0c\u662f\u4fdd\u8b77\u500b\u4eba\u548c\u654f\u611f\u4fe1\u606f\u7684\u57fa\u672c\u6b65\u9a5f\u3002\u8acb\u8a18\u4f4f\uff0c\u60a8\u7684\u8b66\u89ba\u5728\u78ba\u4fdd\u60a8\u7684\u7db2\u7d61\u5b89\u5168\u4e2d\u8d77\u8457\u81f3\u95dc\u91cd\u8981\u7684\u4f5c\u7528\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#AnyDesk #SecurityBreach #PasswordChange #Cybersecurity #RemoteDesktop #DataPrivacy #ProtectYourAccount #TwoFactorAuthentication #SoftwareUpdate #OnlineSafety<\/p>","protected":false},"excerpt":{"rendered":"<p>AnyDesk Software GmbH\u662f\u4e00\u5bb6\u958b\u767c\u5ee3\u6cdb\u4f7f\u7528\u7684\u9060\u7aef\u684c\u9762\u61c9\u7528\u7a0b\u5f0f\u7684\u5fb7\u570b\u516c\u53f8\uff0c\u6700\u8fd1\u4ee4\u4eba\u9707\u9a5a\u5730\u78ba\u8a8d\u767c\u751f\u4e86\u5b89\u5168\u6f0f\u6d1e\u3002 \u8a72\u516c\u53f8\u7684\u751f\u7522\u7cfb\u7d71\u906d\u5230\u5165\u4fb5\uff0c\u5f15\u767c\u4e86\u5c0d\u7528\u6236\u8cc7\u6599\u548c\u96b1\u79c1\u7684\u64d4\u6182\u3002 \u672c\u6587\u65e8\u5728\u6982\u8ff0AnyDesk\u99ed\u5ba2\u4e8b\u4ef6\u3001\u516c\u53f8\u63a1\u53d6\u7684\u63aa\u65bd\u4ee5\u53ca\u70ba\u4fdd\u8b77\u5e33\u6236\u800c\u63a1\u53d6\u7684\u6b65\u9a5f\u3002<\/p>","protected":false},"author":10,"featured_media":1701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[63],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png","jetpack-related-posts":[{"id":1809,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-faces-network-attack-steps-users-can-take-to-ensure-security\/","url_meta":{"origin":1700,"position":0},"title":"AnyDesk Faces Network Attack: Steps Users Can Take to Ensure Security","author":"Randy Yip","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent news, AnyDesk, a popular remote control software used by many individuals in Hong Kong, has been reported to have suffered a network attack. This incident has raised concerns among its users regarding the security of their information. Reports suggest that the program's source code and signing certificates\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1797,"url":"https:\/\/first-unity.com.hk\/zh\/cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates\/","url_meta":{"origin":1700,"position":1},"title":"Cyberattack on AnyDesk: Ensuring Secure Access through Immediate Updates","author":"Dr. Ken","date":"6 6 \u6708, 2024","format":false,"excerpt":"Introduction: In our increasingly connected world, cybersecurity threats continue to pose significant risks to individuals and organizations alike. Recently, AnyDesk, a prominent provider of remote desktop software, experienced a cyberattack that has raised concerns among its user base. This blog aims to shed light on the incident, outline the measures\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1793,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-data-breach-employees-credentials-and-passwords-leaked-on-the-internet\/","url_meta":{"origin":1700,"position":2},"title":"Microsoft Data Breach: Employees&#8217; Credentials and Passwords Leaked on the Internet","author":"Randy Yip","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Microsoft, one of the world's largest technology companies, has reportedly experienced a significant data breach that has exposed employees' credentials and internal company files to the internet. Security researchers recently discovered an open and public storage server hosted on Microsoft's Azure cloud service, which was\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1723,"url":"https:\/\/first-unity.com.hk\/zh\/fujitsu-discovers-malware-on-corporate-network-highlights-potential-data-breach\/","url_meta":{"origin":1700,"position":3},"title":"Fujitsu Discovers Malware on Corporate Network, Highlights Potential Data Breach","author":"Lewis Lok","date":"29 5 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent announcement, Fujitsu, the Japan-based IT giant, revealed the presence of malware on its corporate network. The company issued a warning, stating that this security incident could potentially lead to a data breach. Fujitsu expressed deep regret for the situation and acknowledged the potential unauthorized access to\u2026","rel":"","context":"\u5728\u300cOn Demand IT\u300d\u4e2d","block_context":{"text":"On Demand IT","link":"https:\/\/first-unity.com.hk\/zh\/category\/on-demand-it\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1771,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data\/","url_meta":{"origin":1700,"position":4},"title":"Cybersecurity Breach at Hong Kong Tech Park Exposes Sensitive Data","author":"Dr. Ken","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Hong Kong's prominent technology hub, Cyberport, has announced that it fell victim to a \"malicious intrusion\" in mid-August, resulting in a significant data breach. The breach, which was only disclosed recently, has raised concerns regarding cybersecurity measures and the protection of sensitive information. This incident\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1562,"url":"https:\/\/first-unity.com.hk\/zh\/leveraging-it-to-drive-business-operations-a-case-study\/","url_meta":{"origin":1700,"position":5},"title":"Leveraging IT to Drive Business Operations: A Case Study","author":"Steve Parker","date":"6 1 \u6708, 2024","format":false,"excerpt":"https:\/\/youtu.be\/wGZb-U1HlPY?si=VhCWae6mYaalp8Eq Hello everyone, today I would like to share a business case study with you. This case study revolves around a non-profit organization that I recently worked with. The organization has approximately 80 employees and primarily consists of a single company that owns a large number of servers. Some of\u2026","rel":"","context":"\u5728\u300cBusiness Case Study\u300d\u4e2d","block_context":{"text":"Business Case Study","link":"https:\/\/first-unity.com.hk\/zh\/category\/business-case-study\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/wGZb-U1HlPY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1700"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1700"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1701"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}