{"id":1723,"date":"2024-05-29T07:00:36","date_gmt":"2024-05-29T07:00:36","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1723"},"modified":"2024-05-29T07:00:40","modified_gmt":"2024-05-29T07:00:40","slug":"fujitsu-discovers-malware-on-corporate-network-highlights-potential-data-breach","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/fujitsu-discovers-malware-on-corporate-network-highlights-potential-data-breach\/","title":{"rendered":"\u5bcc\u58eb\u901a\u767c\u73fe\u516c\u53f8\u7db2\u7d61\u4e2d\u7684\u60e1\u610f\u8edf\u9ad4\uff0c\u51f8\u986f\u6f5b\u5728\u7684\u8cc7\u6599\u6d29\u9732\u98a8\u96aa"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u6700\u8fd1\uff0c\u65e5\u672cIT\u5de8\u982d\u5bcc\u58eb\u901a\u63ed\u793a\u4e86\u5176\u516c\u53f8\u7db2\u7d61\u4e2d\u5b58\u5728\u60e1\u610f\u8edf\u9ad4\u7684\u60c5\u6cc1\u3002\u516c\u53f8\u767c\u51fa\u8b66\u544a\uff0c\u8868\u793a\u9019\u8d77\u5b89\u5168\u4e8b\u4ef6\u53ef\u80fd\u5c0e\u81f4\u8cc7\u6599\u6d29\u9732\u3002\u5bcc\u58eb\u901a\u5c0d\u6b64\u60c5\u6cc1\u6df1\u8868\u907a\u61be\uff0c\u4e26\u627f\u8a8d\u500b\u4eba\u548c\u5ba2\u6236\u8cc7\u8a0a\u53ef\u80fd\u53d7\u5230\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u3002\u9019\u4e00\u4ee4\u4eba\u64d4\u6182\u7684\u767c\u73fe\u5f15\u8d77\u4e86\u5c0d\u6d29\u9732\u7684\u7a0b\u5ea6\u4ee5\u53ca\u5c0d\u53d7\u5f71\u97ff\u500b\u4eba\u7684\u5f71\u97ff\u7684\u95dc\u6ce8\u3002<\/p>\n\n\n\n<p>\u60e1\u610f\u8edf\u9ad4\u4e8b\u4ef6\uff1a<\/p>\n\n\n\n<p>\u5bcc\u58eb\u901a\u57283\u670815\u65e5\u7684\u901a\u77e5\u4e2d\u62ab\u9732\u4e86\u60e1\u610f\u8edf\u9ad4\u7684\u767c\u73fe\uff0c\u6700\u521d\u5728\u5f88\u5927\u7a0b\u5ea6\u4e0a\u672a\u88ab\u6ce8\u610f\u5230\uff0c\u76f4\u5230\u6700\u8fd1\u624d\u5f15\u8d77\u95dc\u6ce8\u3002\u516c\u53f8\u7684\u5167\u90e8\u8abf\u67e5\u78ba\u8a8d\u4e86\u5e7e\u53f0\u5de5\u4f5c\u96fb\u8166\u4e0a\u5b58\u5728\u60e1\u610f\u8edf\u9ad4\u7684\u60c5\u6cc1\uff0c\u53ef\u80fd\u6703\u5c0e\u81f4\u500b\u4eba\u548c\u5ba2\u6236\u8cc7\u6599\u7684\u672a\u7d93\u6388\u6b0a\u63d0\u53d6\u3002\u53d7\u5f71\u97ff\u7684\u8a18\u9304\u548c\u500b\u4eba\u6578\u91cf\u7684\u78ba\u5207\u6578\u5b57\u76ee\u524d\u5c1a\u672a\u516c\u958b\u3002\u5bcc\u58eb\u901a\u6b63\u5728\u7a4d\u6975\u8abf\u67e5\u6b64\u4e8b\u4ef6\uff0c\u52aa\u529b\u78ba\u5b9a\u6d29\u9732\u7684\u7a0b\u5ea6\u4ee5\u53ca\u662f\u5426\u6709\u4efb\u4f55\u8cc7\u8a0a\u5916\u6d29\u3002<\/p>\n\n\n\n<p>\u5bcc\u58eb\u901a\u7684\u5168\u7403\u5f71\u97ff\u529b\uff1a<\/p>\n\n\n\n<p>\u4f5c\u70ba\u5168\u7403\u9818\u5148\u7684IT\u516c\u53f8\u4e4b\u4e00\uff0c\u5bcc\u58eb\u901a\u5728\u5168\u7403\u7d04\u6709124,000\u540d\u54e1\u5de5\uff0c\u5728100\u500b\u570b\u5bb6\u958b\u5c55\u696d\u52d9\u3002\u5176\u6536\u5165\u4f86\u81ea\u5404\u7a2e\u7522\u54c1\u548c\u670d\u52d9\uff0c\u5305\u62ec\u786c\u9ad4\uff08\u5982\u96fb\u8166\u3001\u4f3a\u670d\u5668\u548c\u901a\u4fe1\u8a2d\u5099\uff09\u3001\u5b58\u5132\u7cfb\u7d71\u3001\u8edf\u9ad4\u548cIT\u670d\u52d9\u3002\u516c\u53f8\u7684\u5ba2\u6236\u7fa4\u9ad4\u5305\u62ec\u65e5\u672c\u653f\u5e9c\u7b49\u91cd\u8981\u6a5f\u69cb\u3002<\/p>\n\n\n\n<p>\u5148\u524d\u7684\u5b89\u5168\u4e8b\u4ef6\uff1a<\/p>\n\n\n\n<p>\u9019\u8d77\u6700\u8fd1\u7684\u60e1\u610f\u8edf\u9ad4\u4e8b\u4ef6\u4e26\u975e\u5bcc\u58eb\u901a\u9996\u6b21\u9762\u81e8\u5b89\u5168\u6311\u6230\u30022021\u5e74\uff0c\u7531\u65bc\u4e00\u6b21\u99ed\u5ba2\u653b\u64ca\u4e8b\u4ef6\uff0c\u8a72\u516c\u53f8\u4e0d\u5f97\u4e0d\u95dc\u9589\u5176\u8edf\u9ad4\u5373\u670d\u52d9\u5e73\u53f0ProjectWEB\uff0c\u5f71\u97ff\u4e86\u591a\u500b\u65e5\u672c\u653f\u5e9c\u6a5f\u69cb\uff0c\u751a\u81f3\u5305\u62ec\u6210\u7530\u6a5f\u5834\u3002\u6b64\u5916\uff0c\u5167\u95a3\u5b98\u623f\u3001\u570b\u571f\u4ea4\u901a\u7701\u548c\u5916\u52d9\u7701\u7b49\u6a5f\u69cb\u4e5f\u66fe\u56e0\u5bcc\u58eb\u901a\u63d0\u4f9b\u7684\u53e6\u4e00\u500b\u96f2\u670d\u52d9Fenics\u7684\u5b89\u5168\u6f0f\u6d1e\u800c\u65a5\u8cac\u8a72\u516c\u53f8\u3002\u6b64\u5916\uff0c\u5bcc\u58eb\u901a\u9084\u56e0\u8edf\u9ad4\u6f0f\u6d1e\u5c0e\u81f4\u591a\u540d\u90f5\u653f\u5c40\u54e1\u5de5\u88ab\u932f\u8aa4\u5b9a\u7f6a\u800c\u53d7\u5230\u6279\u8a55\uff0c\u9020\u6210\u4e86\u91cd\u5927\u640d\u5bb3\u548c\u56f0\u64fe\u3002<\/p>\n\n\n\n<p>\u56de\u61c9\u8207\u9053\u6b49\uff1a<\/p>\n\n\n\n<p>\u5bcc\u58eb\u901a\u5c0d\u9019\u8d77\u6700\u65b0\u6d29\u9732\u4e8b\u4ef6\u8fc5\u901f\u63a1\u53d6\u884c\u52d5\uff0c\u5411\u65e5\u672c\u7684\u6578\u64da\u4fdd\u8b77\u6a5f\u69cb\u5831\u544a\u4e86\u6b64\u6b21\u4e8b\u4ef6\u3002\u516c\u53f8\u5c0d\u6b64\u60c5\u6cc1\u6df1\u8868\u907a\u61be\uff0c\u4e26\u5c0d\u53ef\u80fd\u7d66\u6240\u6709\u76f8\u95dc\u65b9\u5e36\u4f86\u7684\u4e0d\u4fbf\u8868\u793a\u9053\u6b49\u3002\u76ee\u524d\u5c1a\u672a\u767c\u73fe\u4efb\u4f55\u53d7\u5f71\u97ff\u7684\u5ba2\u6236\u8cc7\u6599\u88ab\u6feb\u7528\u7684\u8b49\u64da\uff0c\u4f46\u5bcc\u58eb\u901a\u610f\u8b58\u5230\u6b64\u60c5\u6cc1\u7684\u56b4\u91cd\u6027\uff0c\u61c9\u8a72\u63a1\u53d6\u9810\u9632\u63aa\u65bd\u4e26\u7a4d\u6975\u8abf\u67e5\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u5728\u5bcc\u58eb\u901a\u7684\u4f01\u696d\u7db2\u7d61\u4e0a\u767c\u73fe\u60e1\u610f\u8edf\u9ad4\u5f15\u8d77\u4e86\u4eba\u5011\u7684\u64d4\u6182\uff0c\u56e0\u70ba\u9019\u53ef\u80fd\u5c07\u500b\u4eba\u548c\u5ba2\u6236\u4fe1\u606f\u66b4\u9732\u65bc\u672a\u7d93\u6388\u6b0a\u7684\u8a2a\u554f\u4e4b\u4e0b\u3002\u9019\u6b21\u4e8b\u4ef6\u51f8\u986f\u4e86\u7d44\u7e54\u5728\u4fdd\u8b77\u654f\u611f\u6578\u64da\u514d\u53d7\u7db2\u7d61\u5a01\u8105\u7684\u6301\u7e8c\u6311\u6230\u3002\u5bcc\u58eb\u901a\u5c0d\u8abf\u67e5\u6b64\u6b21\u9055\u898f\u884c\u70ba\u7684\u627f\u8afe\u4ee5\u53ca\u5176\u7a4d\u6975\u89e3\u6c7a\u554f\u984c\u7684\u65b9\u6cd5\u5c0d\u65bc\u6062\u5fa9\u4fe1\u4efb\u4e26\u9632\u6b62\u672a\u4f86\u7684\u4e8b\u4ef6\u81f3\u95dc\u91cd\u8981\u3002\u96a8\u8457\u8abf\u67e5\u7684\u5c55\u958b\uff0c\u53d7\u5f71\u97ff\u7684\u500b\u4eba\u548c\u5ba2\u6236\u4fdd\u6301\u8b66\u60d5\u4e26\u9075\u5faa\u5bcc\u58eb\u901a\u63d0\u4f9b\u7684\u4efb\u4f55\u63a8\u85a6\u7684\u5b89\u5168\u63aa\u65bd\u662f\u81f3\u95dc\u91cd\u8981\u7684\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#FujitsuMalwareBreach #DataSecurity #Cybersecurity #MalwareIncident #PersonalDataProtection #FujitsuIT #DataBreachAlert #ITSecurity #FujitsuResponse #CyberThreats #DataPrivacy #CustomerInformation #FujitsuApology #DataBreachInvestigation #PreventiveMeasures<\/p>","protected":false},"excerpt":{"rendered":"<p>\u6700\u8fd1\uff0c\u65e5\u672cIT\u5de8\u982d\u5bcc\u58eb\u901a\u63ed\u793a\u4e86\u5176\u516c\u53f8\u7db2\u7d61\u4e2d\u5b58\u5728\u60e1\u610f\u8edf\u9ad4\u7684\u60c5\u6cc1\u3002\u516c\u53f8\u767c\u51fa\u8b66\u544a\uff0c\u8868\u793a\u9019\u8d77\u5b89\u5168\u4e8b\u4ef6\u53ef\u80fd\u5c0e\u81f4\u8cc7\u6599\u6d29\u9732\u3002\u5bcc\u58eb\u901a\u5c0d\u6b64\u60c5\u6cc1\u6df1\u8868\u907a\u61be\uff0c\u4e26\u627f\u8a8d\u500b\u4eba\u548c\u5ba2\u6236\u8cc7\u8a0a\u53ef\u80fd\u53d7\u5230\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u3002\u9019\u4e00\u4ee4\u4eba\u64d4\u6182\u7684\u767c\u73fe\u5f15\u8d77\u4e86\u5c0d\u6d29\u9732\u7684\u7a0b\u5ea6\u4ee5\u53ca\u5c0d\u53d7\u5f71\u97ff\u500b\u4eba\u7684\u5f71\u97ff\u7684\u95dc\u6ce8\u3002<\/p>","protected":false},"author":8,"featured_media":1724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[22],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png","jetpack-related-posts":[{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1723,"position":0},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1700,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-hacked-urgent-password-change-required-to-secure-your-account\/","url_meta":{"origin":1723,"position":1},"title":"AnyDesk Hacked: Urgent Password Change Required to Secure Your Account","author":"Dr. Ken","date":"18 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking turn of events, AnyDesk Software GmbH, the German company behind the widely used remote desktop application, has recently confirmed a security breach. The company's production systems were compromised, leading to concerns about user data and privacy. This blog post aims to provide you with an overview\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1793,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-data-breach-employees-credentials-and-passwords-leaked-on-the-internet\/","url_meta":{"origin":1723,"position":2},"title":"Microsoft Data Breach: Employees&#8217; Credentials and Passwords Leaked on the Internet","author":"Randy Yip","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Microsoft, one of the world's largest technology companies, has reportedly experienced a significant data breach that has exposed employees' credentials and internal company files to the internet. Security researchers recently discovered an open and public storage server hosted on Microsoft's Azure cloud service, which was\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1767,"url":"https:\/\/first-unity.com.hk\/zh\/japanese-mobile-game-developer-accidentally-sets-wrong-google-drive-permissions-resulting-in-data-breach\/","url_meta":{"origin":1723,"position":3},"title":"Japanese Mobile Game Developer Accidentally Sets Wrong Google Drive Permissions, Resulting in Data Breach","author":"Rhona Goskirk","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent incident, a Japanese mobile game developer, known as ATeam, has mistakenly set incorrect permissions on their Google Drive, leading to a massive data breach affecting millions of users. This oversight has raised concerns about the security practices of developers and the potential risks users face when\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1717,"url":"https:\/\/first-unity.com.hk\/zh\/strengthening-cybersecurity-measures-in-hong-kong-the-urgent-need-for-enhanced-regulation\/","url_meta":{"origin":1723,"position":4},"title":"Strengthening Cybersecurity Measures in Hong Kong: The Urgent Need for Enhanced Regulation","author":"Steve Parker","date":"5 5 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, cybersecurity has become a critical concern for individuals, organizations, and governments worldwide. The recent incident of a hacker breaching the cybersecurity defenses of Cyberport, a prominent digital hub in Hong Kong, has raised serious questions about the region's cybersecurity infrastructure. This blog post will delve\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-05-133439.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1771,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data\/","url_meta":{"origin":1723,"position":5},"title":"Cybersecurity Breach at Hong Kong Tech Park Exposes Sensitive Data","author":"Dr. Ken","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Hong Kong's prominent technology hub, Cyberport, has announced that it fell victim to a \"malicious intrusion\" in mid-August, resulting in a significant data breach. The breach, which was only disclosed recently, has raised concerns regarding cybersecurity measures and the protection of sensitive information. This incident\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1723"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1723"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1723\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1724"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}