{"id":1752,"date":"2024-06-01T06:06:10","date_gmt":"2024-06-01T06:06:10","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1752"},"modified":"2024-06-01T06:06:13","modified_gmt":"2024-06-01T06:06:13","slug":"the-alarming-rise-of-malicious-phishing-emails-how-ai-like-chatgpt-is-fueling-the-threat","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/the-alarming-rise-of-malicious-phishing-emails-how-ai-like-chatgpt-is-fueling-the-threat\/","title":{"rendered":"\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u7684\u9a5a\u4eba\u6210\u9577\uff1aChatGPT \u7b49\u4eba\u5de5\u667a\u6167\u5982\u4f55\u52a9\u9577\u5a01\u8105"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u8fd1\u5e74\u4f86\uff0c\u4e16\u754c\u5404\u5730\u7684\u7db2\u8def\u5a01\u8105\u6025\u5287\u589e\u52a0\uff0c\u5176\u4e2d\u4e00\u7a2e\u7279\u6b8a\u7684\u5a01\u8105\u65e5\u76ca\u53d7\u5230\u95dc\u6ce8\uff1a\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u3002 \u7db2\u8def\u5b89\u5168\u516c\u53f8 SlashNext \u7684\u4e00\u4efd\u65b0\u5831\u544a\u63ed\u793a\u4e86 ChatGPT \u7b49\u751f\u6210\u4eba\u5de5\u667a\u6167\u5de5\u5177\u5728\u9019\u4e9b\u7db2\u8def\u653b\u64ca\u5448\u6307\u6578\u7d1a\u589e\u9577\u4e2d\u6240\u626e\u6f14\u7684\u89d2\u8272\u3002 \u81ea 2022 \u5e74\u7b2c\u56db\u5b63\u4ee5\u4f86\uff0c\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u6578\u91cf\u6fc0\u589e 1,265%\uff0c\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u6578\u91cf\u589e\u52a0 967%\uff0c\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u986f\u7136\u6b63\u5728\u5229\u7528\u4eba\u5de5\u667a\u6167\u767c\u52d5\u8907\u96dc\u7684\u3001\u6709\u91dd\u5c0d\u6027\u7684\u653b\u64ca\u3002<\/p>\n\n\n\n<p>\u4eba\u5de5\u667a\u6167\u5c0d\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u7684\u5f71\u97ff\uff1a<\/p>\n\n\n\n<p>\u8a72\u5831\u544a\u986f\u793a\uff0c\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u6b63\u5728\u5229\u7528 ChatGPT \u7b49\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u5de5\u5177\u4f86\u88fd\u4f5c\u4ee4\u4eba\u4fe1\u670d\u7684\u5546\u696d\u96fb\u5b50\u90f5\u4ef6\u6d29\u6f0f (BEC) \u548c\u7db2\u8def\u91e3\u9b5a\u8a0a\u606f\u3002 \u9019\u4e9b\u4eba\u5de5\u667a\u6167\u5de5\u5177\u5927\u5927\u964d\u4f4e\u4e86\u9032\u5165\u7db2\u8def\u72af\u7f6a\u4e16\u754c\u7684\u9580\u6abb\uff0c\u4f7f\u65b0\u624b\u548c\u7d93\u9a57\u8c50\u5bcc\u7684\u653b\u64ca\u8005\u90fd\u80fd\u5920\u767c\u52d5\u5927\u898f\u6a21\u7684\u9b5a\u53c9\u5f0f\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u3002 \u57fa\u65bc\u4eba\u5de5\u667a\u6167\u7684\u5a01\u8105\u7684\u901f\u5ea6\u3001\u6578\u91cf\u548c\u8907\u96dc\u7a0b\u5ea6\u9054\u5230\u4e86\u524d\u6240\u672a\u6709\u7684\u6c34\u5e73\uff0c\u7d66\u7db2\u8def\u5b89\u5168\u5c08\u696d\u4eba\u54e1\u5e36\u4f86\u4e86\u56b4\u5cfb\u7684\u6311\u6230\u3002<\/p>\n\n\n\n<p>ChatGPT \u7684\u4f5c\u7528\uff1a<\/p>\n\n\n\n<p>ChatGPT \u662f\u4e00\u7a2e\u6d41\u884c\u7684\u4eba\u5de5\u667a\u6167\u804a\u5929\u6a5f\u5668\u4eba\uff0c\u5728\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u7684\u64f4\u6563\u4e2d\u767c\u63ee\u4e86\u91cd\u8981\u4f5c\u7528\u3002 \u5b83\u65bc\u53bb\u5e74\u5e74\u5e95\u63a8\u51fa\uff0c\u6070\u9022\u9019\u4e9b\u653b\u64ca\u5448\u6307\u6578\u7d1a\u589e\u9577\u3002 \u900f\u904e\u5229\u7528\u751f\u6210\u5f0f\u4eba\u5de5\u667a\u6167\u6280\u8853\uff0c\u5a01\u8105\u884c\u70ba\u8005\u53ef\u4ee5\u4fee\u6539\u60e1\u610f\u8edf\u9ad4\u7a0b\u5f0f\u78bc\u4e26\u5275\u5efa\u6578\u5343\u7a2e\u793e\u6703\u5de5\u7a0b\u653b\u64ca\u8b8a\u9ad4\uff0c\u5f9e\u800c\u589e\u52a0\u6210\u529f\u7684\u53ef\u80fd\u6027\u3002 ChatGPT \u7684\u6613\u7528\u6027\u548c\u591a\u529f\u80fd\u6027\u4f7f\u5176\u6210\u70ba\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u5c0b\u6c42\u5229\u7528\u6beb\u7121\u6212\u5fc3\u7684\u500b\u4eba\u548c\u7d44\u7e54\u7684\u6709\u5438\u5f15\u529b\u7684\u5de5\u5177\u3002<\/p>\n\n\n\n<p>\u4ee4\u4eba\u9707\u9a5a\u7684\u7d71\u8a08\u6578\u64da\uff1a<\/p>\n\n\n\n<p>SlashNext \u9032\u884c\u7684\u7814\u7a76\u51f8\u986f\u4e86\u554f\u984c\u7684\u56b4\u91cd\u6027\u3002 \u5e73\u5747\u6bcf\u5929\u767c\u8d77\u7684\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u6578\u91cf\u9ad8\u9054 31,000 \u6b21\uff0c\u6578\u91cf\u9a5a\u4eba\u3002 \u8fd1\u4e00\u534a\u53d7\u8a2a\u7684\u7db2\u8def\u5b89\u5168\u5c08\u696d\u4eba\u54e1\u8868\u793a\u81ea\u5df1\u6210\u70ba\u4e86 BEC \u653b\u64ca\u7684\u53d7\u5bb3\u8005\uff0c\u800c 77% \u7684\u4eba\u8868\u793a\u6210\u70ba\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u7684\u76ee\u6a19\u3002 \u9019\u4e9b\u6578\u5b57\u8868\u660e\u8feb\u5207\u9700\u8981\u7acb\u5373\u63a1\u53d6\u884c\u52d5\u61c9\u5c0d\u65e5\u76ca\u589e\u9577\u7684\u5a01\u8105\u60c5\u6cc1\u3002<\/p>\n\n\n\n<p>\u696d\u52d9\u5f71\u97ff\uff1a<\/p>\n\n\n\n<p>\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u9020\u6210\u7684\u7d93\u6fdf\u640d\u5931\u662f\u5de8\u5927\u7684\u3002 FBI \u7684\u7db2\u8def\u72af\u7f6a\u5831\u544a\u6307\u51fa\uff0c2022 \u5e74\uff0c\u5149\u662f BEC \u5c31\u9020\u6210\u4e86\u7d04 27 \u5104\u7f8e\u5143\u7684\u640d\u5931\uff0c\u5176\u4ed6\u985e\u578b\u7684\u7db2\u8def\u91e3\u9b5a\u4e5f\u9020\u6210\u4e86 5,200 \u842c\u7f8e\u5143\u7684\u640d\u5931\u3002 \u9019\u4e9b\u653b\u64ca\u7684\u6210\u529f\u7387\u52a0\u4e0a\u6f5b\u5728\u7684\u734e\u52f5\uff0c\u6703\u6fc0\u52f5\u7db2\u8def\u72af\u7f6a\u8005\u52a0\u5f37\u7db2\u8def\u91e3\u9b5a\u548c BEC \u5617\u8a66\u3002 \u9019\u5c0d\u5927\u578b\u548c\u5c0f\u578b\u4f01\u696d\u7684\u5f71\u97ff\u90fd\u662f\u53ef\u6015\u7684\uff0c\u6a5f\u5bc6\u6578\u64da\u3001\u8ca1\u52d9\u8cc7\u6e90\u548c\u8072\u8b7d\u90fd\u53d7\u5230\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u61c9\u5c0d\u5a01\u8105\uff1a<\/p>\n\n\n\n<p>\u70ba\u4e86\u61c9\u5c0d\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u7684\u6fc0\u589e\uff0c\u7d44\u7e54\u548c\u7db2\u8def\u5b89\u5168\u9818\u5c0e\u8005\u5fc5\u9808\u63a1\u53d6\u4e3b\u52d5\u63aa\u65bd\u4f86\u4fdd\u8b77\u5176\u4fc2\u7d71\u548c\u54e1\u5de5\u3002 \u6301\u7e8c\u7684\u6700\u7d42\u7528\u6236\u6559\u80b2\u548c\u57f9\u8a13\u5c0d\u65bc\u63d0\u9ad8\u5a01\u8105\u610f\u8b58\u548c\u57f9\u990a\u5b89\u5168\u610f\u8b58\u6587\u5316\u81f3\u95dc\u91cd\u8981\u3002 \u5be6\u65bd\u5229\u7528\u6a5f\u5668\u5b78\u7fd2\u548c\u4eba\u5de5\u667a\u6167\u7684\u96fb\u5b50\u90f5\u4ef6\u904e\u6ffe\u5de5\u5177\u53ef\u4ee5\u6709\u6548\u5075\u6e2c\u548c\u963b\u6b62\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\uff0c\u4f46\u5fc5\u9808\u5b9a\u671f\u66f4\u65b0\u5b83\u5011\u4ee5\u61c9\u5c0d\u4e0d\u65b7\u8b8a\u5316\u7684\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u5b9a\u671f\u6e2c\u8a66\u548c\u5b89\u5168\u5be9\u8a08\u5c0d\u65bc\u8b58\u5225\u7d44\u7e54\u9632\u79a6\u4e2d\u7684\u6f0f\u6d1e\u548c\u5f31\u9ede\u81f3\u95dc\u91cd\u8981\u3002 \u900f\u904e\u53ca\u6642\u89e3\u6c7a\u9019\u4e9b\u554f\u984c\uff0c\u53ef\u4ee5\u6e1b\u5c11\u653b\u64ca\u9762\uff0c\u5f9e\u800c\u4f7f\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u66f4\u96e3\u5229\u7528\u6f0f\u6d1e\u3002 \u6b64\u5916\uff0c\u5be6\u65bd\u96f6\u4fe1\u4efb\u7b56\u7565\u4e26\u63a1\u7528\u5206\u5c64\u9632\u79a6\u53ef\u4ee5\u63d0\u4f9b\u91dd\u5c0d\u4eba\u5de5\u667a\u6167\u7522\u751f\u7684\u96fb\u5b50\u90f5\u4ef6\u653b\u64ca\u7684\u5168\u9762\u5b89\u5168\u6846\u67b6\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u7684\u8208\u8d77\u5c0d\u4e0d\u65b7\u8b8a\u5316\u7684\u7db2\u8def\u5a01\u8105\u69cb\u6210\u4e86\u91cd\u5927\u6311\u6230\u3002 ChatGPT \u7b49\u4eba\u5de5\u667a\u6167\u5de5\u5177\u7684\u4f7f\u7528\u52a9\u9577\u4e86\u9019\u4e9b\u653b\u64ca\u7684\u6210\u9577\uff0c\u4f7f\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u80fd\u5920\u767c\u52d5\u8907\u96dc\u4e14\u4ee4\u4eba\u4fe1\u670d\u7684\u6d3b\u52d5\u3002 \u7d44\u7e54\u5fc5\u9808\u512a\u5148\u8003\u616e\u7db2\u8def\u5b89\u5168\u63aa\u65bd\uff0c\u4f8b\u5982\u7e7c\u7e8c\u6559\u80b2\u3001\u9032\u968e\u904e\u6ffe\u5de5\u5177\u3001\u5b9a\u671f\u6e2c\u8a66\u548c\u589e\u5f37\u7684\u5b89\u5168\u57fa\u790e\u8a2d\u65bd\u3002 \u900f\u904e\u4fdd\u6301\u8b66\u60d5\u548c\u7a4d\u6975\u4e3b\u52d5\uff0c\u6211\u5011\u53ef\u4ee5\u6e1b\u8f15\u4eba\u5de5\u667a\u6167\u9a45\u52d5\u7684\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u5e36\u4f86\u7684\u98a8\u96aa\uff0c\u4e26\u4fdd\u8b77\u6211\u5011\u7684\u6578\u4f4d\u751f\u614b\u7cfb\u7d71\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#PhishingThreats #Cybersecurity #AIinCybercrime #ChatGPT #MaliciousEmails #BECAttacks #PhishingAwareness #DigitalSecurity #ProtectYourself #CyberDefense #CyberThreats #AIinPhishingAttacks #StayVigilant #SecureYourData #PhishingPrevention<\/p>","protected":false},"excerpt":{"rendered":"<p>\u8fd1\u5e74\u4f86\uff0c\u4e16\u754c\u5404\u5730\u7684\u7db2\u8def\u5a01\u8105\u6025\u5287\u589e\u52a0\uff0c\u5176\u4e2d\u4e00\u7a2e\u7279\u6b8a\u7684\u5a01\u8105\u65e5\u76ca\u53d7\u5230\u95dc\u6ce8\uff1a\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u3002 \u7db2\u8def\u5b89\u5168\u516c\u53f8 SlashNext \u7684\u4e00\u4efd\u65b0\u5831\u544a\u63ed\u793a\u4e86 ChatGPT \u7b49\u751f\u6210\u4eba\u5de5\u667a\u6167\u5de5\u5177\u5728\u9019\u4e9b\u7db2\u8def\u653b\u64ca\u5448\u6307\u6578\u7d1a\u589e\u9577\u4e2d\u6240\u626e\u6f14\u7684\u89d2\u8272\u3002 \u81ea 2022 \u5e74\u7b2c\u56db\u5b63\u4ee5\u4f86\uff0c\u60e1\u610f\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u6578\u91cf\u6fc0\u589e 1,265%\uff0c\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u6578\u91cf\u589e\u52a0 967%\uff0c\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u986f\u7136\u6b63\u5728\u5229\u7528\u4eba\u5de5\u667a\u6167\u767c\u52d5\u8907\u96dc\u7684\u3001\u6709\u91dd\u5c0d\u6027\u7684\u653b\u64ca\u3002<\/p>","protected":false},"author":11,"featured_media":1753,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png","jetpack-related-posts":[{"id":1676,"url":"https:\/\/first-unity.com.hk\/zh\/ai-powered-scams-rampage-through-hong-kong-an-engineers-cautionary-tale\/","url_meta":{"origin":1752,"position":0},"title":"AI-Powered Scams Rampage Through Hong Kong: An Engineer&#8217;s Cautionary Tale","author":"Dr. Ken","date":"6 3 \u6708, 2024","format":false,"excerpt":"As an experienced engineer in Hong Kong, I've witnessed firsthand the debilitating impact of technology on society, particularly the insidious nature of Artificial Intelligence (AI). Recently, the Hong Kong Computer Security Incident Response Team (HKCERT) unveiled staggering data that paints a grim picture of the rising tide of AI-driven scamming\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1496,"url":"https:\/\/first-unity.com.hk\/zh\/veterinary-cyber-security-protecting-your-practice-in-the-digital-era\/","url_meta":{"origin":1752,"position":1},"title":"Veterinary Cyber Security: Protecting Your Practice in the Digital Era","author":"Thomas","date":"18 12 \u6708, 2023","format":false,"excerpt":"https:\/\/youtu.be\/joGzD4yrf-c?si=CQY11NYHXu078LFA The Importance of Cyber Security in Veterinary Practices In today's interconnected world, cyber security plays a crucial role in safeguarding electronic devices and networks from malicious attacks. For veterinary practices, the need for robust cyber security measures is even more essential. Why? Because it involves the safety of sensitive\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/joGzD4yrf-c\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1789,"url":"https:\/\/first-unity.com.hk\/zh\/cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report\/","url_meta":{"origin":1752,"position":2},"title":"Cybercriminals Exploit Remote Desktop Protocols in Cyber Attacks &#8211; A Disturbing Report","author":"Rhona Goskirk","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In the digital age, cybercriminals are constantly finding new ways to compromise the security of individuals and organizations. A recent report from a global cybersecurity company, Sophos, sheds light on a concerning trend - the exploitation of remote desktop protocols (RDP) in cyber attacks. This blog explores the key\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1564,"url":"https:\/\/first-unity.com.hk\/zh\/using-technology-to-enhance-legal-practice-a-case-study\/","url_meta":{"origin":1752,"position":3},"title":"Using Technology to Enhance Legal Practice: A Case Study","author":"Steve Parker","date":"6 1 \u6708, 2024","format":false,"excerpt":"https:\/\/youtu.be\/dUSfQRtWyGE?si=I4ZH56FoRizz6-t_ Hello everyone, I am a technical staff member responsible for a client who is a small to medium-sized law firm. Today's video will cover five main points. Firstly, I will introduce the client and their needs. Secondly, I will discuss how technology can be used to improve daily operations.\u2026","rel":"","context":"\u5728\u300cBusiness Case Study\u300d\u4e2d","block_context":{"text":"Business Case Study","link":"https:\/\/first-unity.com.hk\/zh\/category\/business-case-study\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/dUSfQRtWyGE\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1752,"position":4},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1940,"url":"https:\/\/first-unity.com.hk\/zh\/the-rise-of-generative-ai-beyond-the-hype\/","url_meta":{"origin":1752,"position":5},"title":"The Rise of Generative AI: Beyond the Hype","author":"Rhona Goskirk","date":"11 1 \u6708, 2025","format":false,"excerpt":"The term \u201cgenerative AI\u201d is everywhere, from news headlines to social media feeds. But what exactly is it, and why is everyone talking about it? In simple terms, generative AI refers to a type of artificial intelligence that can create new content, from text and images to music and code.\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1752"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1752"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1752\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1753"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}