{"id":1767,"date":"2024-06-01T06:56:06","date_gmt":"2024-06-01T06:56:06","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1767"},"modified":"2024-06-01T06:56:09","modified_gmt":"2024-06-01T06:56:09","slug":"japanese-mobile-game-developer-accidentally-sets-wrong-google-drive-permissions-resulting-in-data-breach","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/japanese-mobile-game-developer-accidentally-sets-wrong-google-drive-permissions-resulting-in-data-breach\/","title":{"rendered":"\u65e5\u672c\u638c\u4e0a\u904a\u6232\u6a5f\u958b\u767c\u5546\u932f\u8aa4\u914d\u7f6eGoogle Drive\u8a31\u53ef\u6b0a\uff0c\u5c0e\u81f4\u6578\u767e\u842c\u4f7f\u7528\u8005\u8cc7\u6599\u6d29\u9732"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u6700\u8fd1\uff0c\u65e5\u672c\u4e00\u5bb6\u79fb\u52d5\u904a\u6232\u958b\u767c\u5546 Ateam \u932f\u8aa4\u914d\u7f6e\u4e86Google Drive\u8a31\u53ef\u6b0a\uff0c\u5c0e\u81f4\u6578\u767e\u842c\u4f7f\u7528\u8005\u7684\u5927\u898f\u6a21\u8cc7\u6599\u6d29\u9732\u3002\u9019\u4e00\u758f\u5ffd\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u958b\u767c\u5546\u7684\u5b89\u5168\u5be6\u8e10\u4ee5\u53ca\u4f7f\u7528\u8005\u5728\u5171\u7528\u500b\u4eba\u8cc7\u8a0a\u6642\u6240\u9762\u81e8\u7684\u6f5b\u5728\u98a8\u96aa\u7684\u64d4\u6182\u3002<\/p>\n\n\n\n<p>Google Drive\u8a31\u53ef\u6b0a\u914d\u7f6e\u932f\u8aa4\uff1a<\/p>\n\n\n\n<p>Google Drive\u5141\u8a31\u7528\u6236\u5171\u7528\u6a94\u4e26\u81ea\u8a02\u5171\u7528\u8a2d\u7f6e\u3002\u7136\u800c\uff0cATEAM \u516c\u53f8\u516d\u5e74\u4f86\u4e00\u76f4\u5728\u4f7f\u7528Google Drive\u4e0a\u7684\u932f\u8aa4\u5171\u7528\u8a2d\u7f6e\u3002\u4ed6\u5011\u5c07\u8a31\u53ef\u6b0a\u8a2d\u7f6e\u70ba \"\u6709\u9023\u7d50\u7684\u4efb\u4f55\u4eba\"\uff0c\u9019\u53ef\u80fd\u5c0e\u81f4\u654f\u611f\u7684\u4f7f\u7528\u8005\u8cc7\u6599\u6d29\u9732\u3002<\/p>\n\n\n\n<p>Ateam \u61c9\u7528\u7a0b\u5f0f\u548c\u904a\u6232\uff1a<\/p>\n\n\n\n<p>Ateam \u662f\u4e00\u5bb6\u77e5\u540d\u7684\u65e5\u672c\u958b\u767c\u5546\uff0c\u66fe\u5728Google Play\u4e0a\u767c\u4f48\u904e\u591a\u6b3e\u71b1\u9580\u904a\u6232\u548c\u61c9\u7528\u7a0b\u5f0f\u3002\u9019\u4e9b\u77e5\u540d\u904a\u6232\u5305\u62ec\u300a\u795e\u57df\u53ec\u559a\u5e2b\u300b\u3001\u300a\u8ecd\u5718\u6230\u722d\u300b\u3001\u300a\u9ed1\u6697\u53ec\u559a\u5e2b\u300b\u548c\u300a\u521d\u97f3\u672a\u4f86-TAP WONDER\u300b\u3002\u9019\u4e9b\u61c9\u7528\u7a0b\u5f0f\u7684\u4e0b\u8f09\u6b21\u6578\u5df2\u8d85\u904e\u4e00\u767e\u842c\u6b21\uff0c\u9019\u6b21\u6f5b\u5728\u8cc7\u6599\u6d29\u9732\u7684\u898f\u6a21\u4ee4\u4eba\u64d4\u6182\u3002<\/p>\n\n\n\n<p>\u6d29\u9732\u7684\u8cc7\u6599\uff1a<\/p>\n\n\n\n<p>2023\u5e7411\u670821\u65e5\uff0cAteam \u5728\u5176\u5b98\u65b9\u7db2\u7ad9\u4e0a\u767c\u8868\u8072\u660e\u7a31\uff0c\u767c\u73feGoogle Drive\u8a31\u53ef\u6b0a\u914d\u7f6e\u932f\u8aa4\u3002\u8abf\u67e5\u986f\u793a\uff0c\u6709 1369 \u500b\u6a94\u88ab\u6d29\u9732\uff0c\u5176\u4e2d\u5305\u542b Ateam \u5ba2\u6236\u3001\u696d\u52d9\u5408\u4f5c\u5925\u4f34\u3001\u73fe\u4efb\u548c\u524d\u4efb\u54e1\u5de5\u3001\u5be6\u7fd2\u751f\u548c\u6c42\u8077\u8005\u7684\u500b\u4eba\u8cc7\u6599\u3002\u88ab\u6d29\u9732\u7684\u8cc7\u8a0a\u5305\u62ec\u4f7f\u7528\u8005\u7684\u5168\u540d\u3001\u96fb\u5b50\u90f5\u5bc4\u5730\u5740\u3001\u96fb\u8a71\u865f\u78bc\u3001\u5ba2\u6236\u7de8\u865f\u548c\u8a2d\u5099\u8b58\u5225\u5b57\u3002<\/p>\n\n\n\n<p>\u98a8\u96aa\u8a55\u4f30\u548c\u9810\u9632\u63aa\u65bd\uff1a<\/p>\n\n\n\n<p>Ateam \u5f37\u8abf\uff0c\u6c92\u6709\u8b49\u64da\u8868\u660e\u99ed\u5ba2\u7aca\u53d6\u4e86\u500b\u4eba\u8cc7\u8a0a\u3002\u4e0d\u904e\uff0c\u4ed6\u5011\u5efa\u8b70\u7528\u6236\u4fdd\u6301\u8b66\u60d5\uff0c\u6ce8\u610f\u53ef\u7591\u4f86\u96fb\u548c\u901a\u4fe1\u3002\u8cc7\u6599\u6d29\u9732\u53ef\u80fd\u5c0e\u81f4\u8eab\u4efd\u76dc\u7528\u3001\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u548c\u5176\u4ed6\u6b3a\u8a50\u6d3b\u52d5\u3002\u4f7f\u7528\u8005\u61c9\u76e3\u63a7\u81ea\u5df1\u7684\u5e33\u6236\uff0c\u66f4\u6539\u5bc6\u78bc\uff0c\u4e26\u5c0d\u610f\u5916\u6216\u53ef\u7591\u7684\u500b\u4eba\u8cc7\u8a0a\u8acb\u6c42\u4fdd\u6301\u8b66\u60d5\u3002<\/p>\n\n\n\n<p>\u5438\u53d6\u6559\u8a13\uff0c\u52a0\u5f37\u5b89\u5168\u63aa\u65bd\uff1a<\/p>\n\n\n\n<p>\u9019\u6b21\u4e8b\u4ef6\u63d0\u9192\u6211\u5011\uff0c\u5be6\u65bd\u5f37\u6709\u529b\u7684\u5b89\u5168\u63aa\u65bd\u975e\u5e38\u91cd\u8981\uff0c\u5c24\u5176\u662f\u5728\u8655\u7406\u654f\u611f\u7684\u4f7f\u7528\u8005\u8cc7\u6599\u6642\u3002\u958b\u767c\u4eba\u54e1\u9700\u8981\u5b9a\u671f\u5be9\u67e5\u5176\u5b89\u5168\u63aa\u65bd\uff0c\u5c07\u4fdd\u8b77\u4f7f\u7528\u8005\u8cc7\u8a0a\u4f5c\u70ba\u91cd\u4e2d\u4e4b\u91cd\u3002\u5fc5\u9808\u9032\u884c\u5be9\u8a08\uff0c\u78ba\u4fdd\u9069\u7576\u7684\u8a31\u53ef\u6b0a\u548c\u5b58\u53d6\u63a7\u5236\uff0c\u9632\u6b62\u672a\u7d93\u6388\u6b0a\u8a2a\u554f\u654f\u611f\u6027\u8cc7\u6599\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u65e5\u672c\u638c\u4e0a\u904a\u6232\u6a5f\u958b\u767c\u5546 Ateam \u932f\u8aa4\u914d\u7f6e\u4e86Google Drive\u8a31\u53ef\u6b0a\uff0c\u5c0e\u81f4\u6578\u767e\u842c\u4f7f\u7528\u8005\u8cc7\u6599\u6d29\u9732\u3002\u9019\u4e00\u4e8b\u4ef6\u51f8\u986f\u4e86\u958b\u767c\u4eba\u54e1\u5c07\u8cc7\u6599\u5b89\u5168\u653e\u5728\u9996\u4f4d\u4e26\u5be6\u65bd\u56b4\u683c\u63aa\u65bd\u4fdd\u8b77\u4f7f\u7528\u8005\u8cc7\u8a0a\u7684\u5fc5\u8981\u6027\u3002\u8207\u6b64\u540c\u6642\uff0c\u4f7f\u7528\u8005\u4e5f\u9700\u8981\u4fdd\u6301\u8b66\u60d5\uff0c\u63a1\u53d6\u5fc5\u8981\u7684\u9810\u9632\u63aa\u65bd\uff0c\u5728\u9023\u63a5\u65e5\u76ca\u7dca\u5bc6\u7684\u6578\u4f4d\u74b0\u5883\u4e2d\u78ba\u4fdd\u500b\u4eba\u8cc7\u6599\u5b89\u5168\u3002<br><\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#DataBreach #InformationSecurity #JapaneseMobileGameDeveloper #UserPrivacy #GoogleDrive #DataProtection #SecurityAwareness #CyberSecurity #DataSecurity #PersonalInformationProtection<\/p>","protected":false},"excerpt":{"rendered":"<p>\u6700\u8fd1\uff0c\u65e5\u672c\u4e00\u5bb6\u79fb\u52d5\u904a\u6232\u958b\u767c\u5546 Ateam \u932f\u8aa4\u914d\u7f6e\u4e86Google Drive\u8a31\u53ef\u6b0a\uff0c\u5c0e\u81f4\u6578\u767e\u842c\u4f7f\u7528\u8005\u7684\u5927\u898f\u6a21\u8cc7\u6599\u6d29\u9732\u3002\u9019\u4e00\u758f\u5ffd\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u958b\u767c\u5546\u7684\u5b89\u5168\u5be6\u8e10\u4ee5\u53ca\u4f7f\u7528\u8005\u5728\u5171\u7528\u500b\u4eba\u8cc7\u8a0a\u6642\u6240\u9762\u81e8\u7684\u6f5b\u5728\u98a8\u96aa\u7684\u64d4\u6182\u3002<\/p>","protected":false},"author":11,"featured_media":1768,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png","jetpack-related-posts":[{"id":1778,"url":"https:\/\/first-unity.com.hk\/zh\/files-disappeared-report-is-google-drive-desktop-app-the-culprit\/","url_meta":{"origin":1767,"position":0},"title":"Files Disappeared Report: Is Google Drive Desktop App the Culprit?","author":"Steve Parker","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, cloud storage has become an integral part of our lives. Google Drive, one of the most popular cloud storage platforms, offers users a convenient way to store and access their files from anywhere. However, recent reports have surfaced claiming that files are mysteriously disappearing when\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151046.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151046.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151046.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1809,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-faces-network-attack-steps-users-can-take-to-ensure-security\/","url_meta":{"origin":1767,"position":1},"title":"AnyDesk Faces Network Attack: Steps Users Can Take to Ensure Security","author":"Randy Yip","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent news, AnyDesk, a popular remote control software used by many individuals in Hong Kong, has been reported to have suffered a network attack. This incident has raised concerns among its users regarding the security of their information. Reports suggest that the program's source code and signing certificates\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1686,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-legacy-account-hacked-by-russian-apt-the-importance-of-multi-factor-authentication\/","url_meta":{"origin":1767,"position":2},"title":"Microsoft Legacy Account Hacked by Russian APT: The Importance of Multi-Factor Authentication","author":"Rhona Goskirk","date":"14 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent cyber attack, Microsoft's legacy test tenant account fell victim to a sophisticated hacking operation conducted by a Russian Advanced Persistent Threat (APT) group. The breach, attributed to the notorious Russian nation-state actor known as Midnight Blizzard or APT29, revealed a critical security oversight: the compromised account\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-14-230007.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1748,"url":"https:\/\/first-unity.com.hk\/zh\/safeguarding-your-google-account-understanding-the-exploit-that-allows-hackers-to-bypass-passwords\/","url_meta":{"origin":1767,"position":3},"title":"Safeguarding Your Google Account: Understanding the Exploit That Allows Hackers to Bypass Passwords","author":"Lewis Lok","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, online security has become a major concern for individuals and businesses alike. One of the most widely used platforms, Google, is often considered to have robust security measures in place. However, recent reports have revealed a new vulnerability that allows hackers to gain control of\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1500,"url":"https:\/\/first-unity.com.hk\/zh\/the-zero-trust-model-revolutionizing-cyber-security\/","url_meta":{"origin":1767,"position":4},"title":"The Zero Trust Model: Revolutionizing Cyber Security","author":"Lewis Lok","date":"18 12 \u6708, 2023","format":false,"excerpt":"https:\/\/youtu.be\/ZdjfDFbpzRs?si=BzuRI6Nv52DNW0mr Introduction In today's digital world, where cyber threats are constantly evolving, organizations need to adopt robust security measures to protect their sensitive data and networks. One such approach gaining significant attention is the Zero Trust Model. In this blog, we will delve deep into the concept of Zero Trust,\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ZdjfDFbpzRs\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1785,"url":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","url_meta":{"origin":1767,"position":5},"title":"Microsoft&#8217;s 38TB Leak: How IT Leaders Should Respond","author":"Harry Spira","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital landscape, cybersecurity breaches continue to pose significant challenges for organizations worldwide. One notable incident that caught the attention of IT leaders and cybersecurity professionals was Microsoft's 38TB leak. This massive data breach raised concerns about cloud security and the importance of robust cybersecurity measures. In this\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1767"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1767"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1767\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1768"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}