{"id":1731,"date":"2024-05-30T06:16:19","date_gmt":"2024-05-30T06:16:19","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1731"},"modified":"2024-05-30T06:16:23","modified_gmt":"2024-05-30T06:16:23","slug":"the-growing-security-risks-of-ai-a-race-against-time-for-companies","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/the-growing-security-risks-of-ai-a-race-against-time-for-companies\/","title":{"rendered":"\u4eba\u5de5\u667a\u6167\u7684\u5b89\u5168\u98a8\u96aa\u8207\u65e5\u4ff1\u589e\uff1a\u4f01\u696d\u8207\u6642\u9593\u7684\u8cfd\u8dd1"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u4eba\u5de5\u667a\u6167\uff08AI\uff09\u88ab\u8b7d\u70ba\u4e00\u9805\u7a81\u7834\u6027\u6280\u8853\uff0c\u6709\u671b\u63d0\u9ad8\u5404\u884c\u5404\u696d\u7684\u751f\u7522\u529b\u548c\u6548\u7387\u3002 \u7136\u800c\uff0c\u96a8\u8457\u4eba\u5de5\u667a\u6167\u751f\u6210\u8edf\u9ad4\u7684\u5feb\u901f\u767c\u5c55\uff0c\u6f5b\u5728\u7684\u7db2\u8def\u5b89\u5168\u98a8\u96aa\u70ba\u4f01\u696d\u6280\u8853\u9818\u5c0e\u8005\u5e36\u4f86\u4e86\u5de8\u5927\u6311\u6230\u3002<\/p>\n\n\n\n<p>\u8a8d\u77e5\u7684\u5fc5\u8981\u6027:<\/p>\n\n\n\n<p>\u96a8\u8457\u5fae\u8edfCopilot\u7b49\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u5de5\u5177\u5728\u5de5\u4f5c\u5834\u6240\u8d8a\u4f86\u8d8a\u666e\u904d\uff0c\u8ca0\u8cac\u5be6\u65bd\u9019\u4e9b\u6280\u8853\u7684\u4f01\u696d\u9818\u5c0e\u8005\u767c\u73fe\u81ea\u5df1\u5f88\u96e3\u7406\u89e3\u8207\u4e4b\u76f8\u95dc\u7684\u7db2\u8def\u5b89\u5168\u98a8\u96aa\u3002 \u8207\u50b3\u7d71\u8edf\u9ad4\u4e0d\u540c\uff0c\u4eba\u5de5\u667a\u6167\u6a21\u578b\u975e\u5e38\u8907\u96dc\uff0c\u5e7e\u4e4e\u4e0d\u53ef\u80fd\u9032\u884c\u8a73\u7d30\u5be9\u8a08\uff0c\u5b89\u5168\u9818\u5c0e\u8005\u64d4\u5fc3\u67d0\u4e9b\u4eba\u5de5\u667a\u6167\u529f\u80fd\u7f3a\u4e4f\u53ef\u898b\u6027\u3001\u76e3\u7763\u548c\u53ef\u89e3\u91cb\u6027\u3002<\/p>\n\n\n\n<p>\u4f9b\u61c9\u93c8\u6f0f\u6d1e:<\/p>\n\n\n\n<p>\u5728Solarwinds \u7b49\u7db2\u8def\u5b89\u5168\u4e8b\u4ef6\u767c\u751f\u5f8c\uff0c\u5404\u7d44\u7e54\u5df2\u610f\u8b58\u5230\u4f9b\u61c9\u93c8\u7ba1\u7406\u7684\u91cd\u8981\u6027\u3002 \u4eba\u5de5\u667a\u6167\u6a21\u578b\u662f\u6839\u64da\u516c\u53f8\u8cc7\u6599\u9032\u884c\u8a13\u7df4\u7684\uff0c\u56e0\u6b64\u516c\u53f8\u9700\u8981\u5bc6\u5207\u95dc\u6ce8\u4f9b\u61c9\u93c8\u4e2d\u7684\u6f5b\u5728\u98a8\u96aa\u9ede\u3002 \u76ee\u524d\u9762\u81e8\u7684\u6311\u6230\u662f\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u7684\u5feb\u901f\u767c\u5c55\uff0c\u9019\u5f80\u5f80\u8feb\u4f7f\u4f01\u696d\u6025\u65bc\u61c9\u5c0d\u65b0\u7684\u5b89\u5168\u6311\u6230\u548c\u6f0f\u6d1e\uff0c\u800c\u9019\u985e\u6280\u8853\u53ef\u80fd\u6703\u653e\u5927\u9019\u4e9b\u6311\u6230\u548c\u6f0f\u6d1e\u3002<\/p>\n\n\n\n<p>AI \u6750\u6599\u6e05\u55ae:<\/p>\n\n\n\n<p>\u70ba\u89e3\u6c7a\u8edf\u9ad4\u6f0f\u6d1e\u554f\u984c\uff0c\u5404\u7d44\u7e54\u90fd\u63a1\u7528\u4e86 \"\u8edf\u9ad4\u7269\u6599\u6e05\u55ae \"\u7684\u6982\u5ff5\uff0c\u5176\u4e2d\u5217\u51fa\u4e86\u8edf\u9ad4\u7a0b\u5f0f\u78bc\u7684\u5404\u500b\u7d44\u6210\u90e8\u5206\u3002 \u7136\u800c\uff0c\u70ba\u5927\u578b\u4eba\u5de5\u667a\u6167\u8a9e\u8a00\u6a21\u578b\u5275\u5efa\u4e00\u500b\u5168\u9762\u7684\u6e05\u55ae\u5df2\u88ab\u8b49\u660e\u662f\u4e00\u9805\u8271\u9245\u7684\u4efb\u52d9\u3002 \u9019\u4e9b\u6a21\u578b\u7684\u8907\u96dc\u6027\uff0c\u52a0\u4e0a\u57fa\u65bc\u4eba\u5de5\u667a\u6167\u7684\u65b0\u529f\u80fd\u548c\u5de5\u5177\u7684\u5feb\u901f\u5f15\u5165\uff0c\u4f7f\u5f97\u4f01\u696d\u8d8a\u4f86\u8d8a\u96e3\u4ee5\u6709\u6548\u7ba1\u7406\u548c\u8ffd\u8e64\u4eba\u5de5\u667a\u6167\u7269\u6599\u6e05\u55ae\u3002<\/p>\n\n\n\n<p>\u65b0\u98a8\u96aa\u7684\u51fa\u73fe:<\/p>\n\n\n\n<p>\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u4f9d\u8cf4\u73fe\u6709\u7a0b\u5f0f\u78bc\uff0c\u56e0\u6b64\u6703\u5e36\u4f86\u81ea\u8eab\u7684\u5b89\u5168\u98a8\u96aa\u3002 \u7a0b\u5f0f\u78bc\u4e2d\u5b58\u5728\u7684\u6f0f\u6d1e\u53ef\u80fd\u6703\u4fdd\u7559\u5728\u4eba\u5de5\u667a\u6167\u6a21\u578b\u7684\u8f38\u51fa\u4e2d\uff0c\u4f7f\u7cfb\u7d71\u9762\u81e8\u7db2\u8def\u5a01\u8105\u3002 \u6b64\u5916\uff0c\"\u6697\u793a\u6ce8\u5165 \"\u7b49\u65b0\u6280\u8853\u4e5f\u5e36\u4f86\u4e86\u99ed\u5ba2\u5229\u7528\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u7cfb\u7d71\u6d29\u9732\u654f\u611f\u8cc7\u8a0a\u7684\u98a8\u96aa\u3002 Protect AI\u7b49\u65b0\u5275\u516c\u53f8\u5e6b\u52a9\u4f01\u696d\u8ffd\u8e64\u7d44\u4ef6\u4e26\u8b58\u5225\u9055\u53cd\u5b89\u5168\u653f\u7b56\u7684\u884c\u70ba\uff0c\u70ba\u964d\u4f4e\u9019\u4e9b\u4e0d\u65b7\u8b8a\u5316\u7684\u98a8\u96aa\u63d0\u4f9b\u4e86\u4e00\u7a2e\u65b9\u6cd5\u3002<\/p>\n\n\n\n<p>\u8cc7\u8a0a\u9577\u548c\u4f9b\u61c9\u5546\u7684\u89d2\u8272:<\/p>\n\n\n\n<p>\u8cc7\u8a0a\u9577\u5728\u63a1\u7528\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u529f\u80fd\u6642\u8b8a\u5f97\u66f4\u52a0\u8b39\u614e\uff0c\u4e26\u8981\u6c42\u4f9b\u61c9\u5546\u63d0\u9ad8\u900f\u660e\u5ea6\u3002 \u8cc7\u8a0a\u9577\u6b63\u5728\u6df1\u5165\u7814\u7a76\u6578\u64da\u7684\u4f7f\u7528\u65b9\u5f0f\uff0c\u4ee5\u78ba\u4fdd\u4ed6\u5011\u7684\u5c08\u6709\u8cc7\u8a0a\u4e0d\u6703\u7121\u610f\u4e2d\u88ab\u7528\u65bc\u64f4\u5c55\u4eba\u5de5\u667a\u6167\u6a21\u578b\u3002 \u63d0\u4f9b\u4fdd\u8b49\u548c\u5f37\u5927\u5b89\u5168\u63aa\u65bd\u7684\u53ef\u4fe1\u4efb\u4f9b\u61c9\u5546\u8d8a\u4f86\u8d8a\u53d7\u5230\u8cc7\u8a0a\u9577\u7684\u9752\u775e\uff0c\u5f9e\u800c\u6e1b\u8f15\u4e86\u4ed6\u5011\u5c0d\u8cc7\u6599\u5916\u6d29\u548c\u672a\u7d93\u6388\u6b0a\u4f7f\u7528\u7684\u64d4\u6182\u3002<\/p>\n\n\n\n<p>\u4ee3\u78bc\u96e3\u984c:<\/p>\n\n\n\n<p>\u4e9e\u99ac\u905c\u7684CodeWhisperer\u548cGitHub\u7684Copilot\u7b49\u4eba\u5de5\u667a\u6167\u8f14\u52a9\u7de8\u78bc\u5de5\u5177\u662f\u958b\u767c\u4eba\u54e1\u7684\u5bf6\u8cb4\u8cc7\u6e90\u3002 \u7136\u800c\uff0c\u4f9d\u8cf4\u9019\u4e9b\u5de5\u5177\u6703\u5e36\u4f86\u6f5b\u5728\u98a8\u96aa\uff0c\u5305\u62ec\u7a0b\u5f0f\u78bc\u6587\u4ef6\u4e0d\u6e96\u78ba\u3001\u7de8\u78bc\u5be6\u8e10\u4e0d\u5b89\u5168\u4ee5\u53ca\u610f\u5916\u6d29\u9732\u654f\u611f\u8cc7\u8a0a\u3002 \u4f9b\u61c9\u5546\u9700\u8981\u63d0\u4f9b\u6709\u95dc\u6f5b\u5728\u5b89\u5168\u6f0f\u6d1e\u7684\u5168\u9762\u5831\u544a\uff0c\u4e26\u5c0d\u4eba\u5de5\u667a\u6167\u7522\u751f\u7684\u7a0b\u5f0f\u78bc\u9032\u884c\u56b4\u683c\u6e2c\u8a66\uff0c\u4ee5\u78ba\u4fdd\u5176\u5b8c\u6574\u6027\u3002<\/p>\n\n\n\n<p>\u5c0e\u822a\u672a\u4f86:<\/p>\n\n\n\n<p>\u7522\u751f\u7684\u4eba\u5de5\u667a\u6167\u7a0b\u5f0f\u78bc\u5ee3\u6cdb\u64f4\u6563\uff0c\u5373\u6240\u8b02\u7684 \"\u4eba\u5de5\u667a\u6167\u7a0b\u5f0f\u78bc\u64f4\u6563\"\uff0c\u5e36\u4f86\u4e86\u5de8\u5927\u7684\u7db2\u8def\u5b89\u5168\u6311\u6230\u3002 \u96a8\u8457\u958b\u767c\u4eba\u54e1\u5229\u7528\u4eba\u5de5\u667a\u6167\u529f\u80fd\u52a0\u901f\u8edf\u9ad4\u958b\u767c\uff0c\u6613\u53d7\u653b\u64ca\u7684\u7a0b\u5f0f\u78bc\u7522\u751f\u7387\u5c07\u6703\u589e\u52a0\u3002 \u9019\u5c31\u9700\u8981\u91cd\u65b0\u8a55\u4f30\u570d\u7e5e\u8edf\u9ad4\u958b\u767c\u548c\u4f9b\u61c9\u93c8\u7684\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u3002 \u4f01\u696d\u61c9\u52aa\u529b\u7dad\u8b77\u6700\u65b0\u7684\u8edf\u9ad4\u7269\u6599\u6e05\u55ae\uff0c\u6559\u80b2\u54e1\u5de5\uff0c\u5236\u5b9a\u6307\u5c0e\u65b9\u91dd\uff0c\u4e26\u63a1\u7528\u6cbb\u7406\u6a21\u5f0f\u4f86\u78ba\u5b9a\u754c\u9650\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u4eba\u5de5\u667a\u6167\u5177\u6709\u8b8a\u9769\u6f5b\u529b\uff0c\u4f46\u5176\u5feb\u901f\u767c\u5c55\u9700\u8981\u63d0\u9ad8\u8b66\u60d5\uff0c\u4ee5\u61c9\u5c0d\u5176\u5e36\u4f86\u7684\u5b89\u5168\u98a8\u96aa\u3002 \u4f01\u696d\u9700\u8981\u4e86\u89e3\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u53ef\u80fd\u5e36\u4f86\u7684\u6f5b\u5728\u6f0f\u6d1e\uff0c\u4e26\u5236\u5b9a\u5f37\u800c\u6709\u529b\u7684\u7b56\u7565\u4f86\u964d\u4f4e\u9019\u4e9b\u98a8\u96aa\uff0c\u5f9e\u800c\u4fdd\u6301\u9818\u5148\u5730\u4f4d\u3002 \u900f\u904e\u4fc3\u9032\u7522\u696d\u9818\u5c0e\u8005\u3001\u6280\u8853\u4f9b\u61c9\u5546\u548c\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u4e4b\u9593\u7684\u5408\u4f5c\uff0c\u4ed6\u5011\u53ef\u4ee5\u5171\u540c\u61c9\u5c0d\u4eba\u5de5\u667a\u6167\u9019\u9805\u5f37\u5927\u6280\u8853\u6240\u5e36\u4f86\u7684\u8907\u96dc\u554f\u984c\uff0c\u4e26\u78ba\u4fdd\u63a1\u7528\u9019\u9805\u6280\u8853\u7684\u7d44\u7e54\u64c1\u6709\u4e00\u500b\u5b89\u5168\u7684\u672a\u4f86\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#AIsecurityRisks #GenerativeAI #CybersecurityChallenges #DataProtection #SupplyChainVulnerabilities #AIbillOfMaterials #CodeSecurity #AIrisksMitigation #CIOsRole #TransparentVendors #AIcodeSprawl #GovernanceModels #CyberThreats #DataPrivacy #SecureAIIntegration<\/p>","protected":false},"excerpt":{"rendered":"<p>\u4eba\u5de5\u667a\u6167\uff08AI\uff09\u88ab\u8b7d\u70ba\u4e00\u9805\u7a81\u7834\u6027\u6280\u8853\uff0c\u6709\u671b\u63d0\u9ad8\u5404\u884c\u5404\u696d\u7684\u751f\u7522\u529b\u548c\u6548\u7387\u3002 \u7136\u800c\uff0c\u96a8\u8457\u4eba\u5de5\u667a\u6167\u751f\u6210\u8edf\u9ad4\u7684\u5feb\u901f\u767c\u5c55\uff0c\u6f5b\u5728\u7684\u7db2\u8def\u5b89\u5168\u98a8\u96aa\u70ba\u4f01\u696d\u6280\u8853\u9818\u5c0e\u8005\u5e36\u4f86\u4e86\u5de8\u5927\u6311\u6230\u3002<\/p>","protected":false},"author":2,"featured_media":1732,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png","jetpack-related-posts":[{"id":1752,"url":"https:\/\/first-unity.com.hk\/zh\/the-alarming-rise-of-malicious-phishing-emails-how-ai-like-chatgpt-is-fueling-the-threat\/","url_meta":{"origin":1731,"position":0},"title":"The Alarming Rise of Malicious Phishing Emails: How AI like ChatGPT is Fueling the Threat","author":"Rhona Goskirk","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent years, the world has witnessed a staggering increase in cyber threats, with one particular menace gaining significant traction: malicious phishing emails. A new report by cybersecurity firm SlashNext has shed light on the role of generative artificial intelligence tools, such as ChatGPT, in the exponential growth of\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1676,"url":"https:\/\/first-unity.com.hk\/zh\/ai-powered-scams-rampage-through-hong-kong-an-engineers-cautionary-tale\/","url_meta":{"origin":1731,"position":1},"title":"AI-Powered Scams Rampage Through Hong Kong: An Engineer&#8217;s Cautionary Tale","author":"Dr. Ken","date":"6 3 \u6708, 2024","format":false,"excerpt":"As an experienced engineer in Hong Kong, I've witnessed firsthand the debilitating impact of technology on society, particularly the insidious nature of Artificial Intelligence (AI). Recently, the Hong Kong Computer Security Incident Response Team (HKCERT) unveiled staggering data that paints a grim picture of the rising tide of AI-driven scamming\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1731,"position":2},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1785,"url":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","url_meta":{"origin":1731,"position":3},"title":"Microsoft&#8217;s 38TB Leak: How IT Leaders Should Respond","author":"Harry Spira","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital landscape, cybersecurity breaches continue to pose significant challenges for organizations worldwide. One notable incident that caught the attention of IT leaders and cybersecurity professionals was Microsoft's 38TB leak. This massive data breach raised concerns about cloud security and the importance of robust cybersecurity measures. In this\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1789,"url":"https:\/\/first-unity.com.hk\/zh\/cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report\/","url_meta":{"origin":1731,"position":4},"title":"Cybercriminals Exploit Remote Desktop Protocols in Cyber Attacks &#8211; A Disturbing Report","author":"Rhona Goskirk","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In the digital age, cybercriminals are constantly finding new ways to compromise the security of individuals and organizations. A recent report from a global cybersecurity company, Sophos, sheds light on a concerning trend - the exploitation of remote desktop protocols (RDP) in cyber attacks. This blog explores the key\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1966,"url":"https:\/\/first-unity.com.hk\/zh\/the-rise-of-generative-ai-transforming-content-creation-and-beyond\/","url_meta":{"origin":1731,"position":5},"title":"The Rise of Generative AI: Transforming Content Creation and Beyond","author":"Dr. Ken","date":"29 1 \u6708, 2025","format":false,"excerpt":"Have you ever wondered how a computer can create realistic art or write compelling stories? The answer lies in the rapidly evolving field of generative AI. This technology is no longer a futuristic concept; it's transforming how we create content and interact with technology. What is Generative AI? Generative AI\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1731"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1731"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1732"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}