{"id":1789,"date":"2024-06-05T08:53:01","date_gmt":"2024-06-05T08:53:01","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1789"},"modified":"2024-06-08T07:22:33","modified_gmt":"2024-06-08T07:22:33","slug":"cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report\/","title":{"rendered":"\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u5728\u7db2\u8def\u653b\u64ca\u4e2d\u5229\u7528\u9060\u7aef\u684c\u9762\u5354\u5b9a - \u4ee4\u4eba\u4e0d\u5b89\u7684\u5831\u544a"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u5728\u6578\u4f4d\u6642\u4ee3\uff0c\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u4e0d\u65b7\u5c0b\u627e\u65b0\u7684\u65b9\u6cd5\u4f86\u5371\u5bb3\u500b\u4eba\u548c\u7d44\u7e54\u7684\u5b89\u5168\u3002 \u5168\u7403\u7db2\u8def\u5b89\u5168\u516c\u53f8 Sophos \u6700\u8fd1\u7684\u4e00\u4efd\u5831\u544a\u63ed\u793a\u4e86\u4e00\u500b\u4ee4\u4eba\u64d4\u6182\u7684\u8da8\u52e2 - \u5728\u7db2\u8def\u653b\u64ca\u4e2d\u5229\u7528\u9060\u7aef\u684c\u9762\u5354\u5b9a (RDP)\u3002 \u672c\u90e8\u843d\u683c\u63a2\u8a0e\u4e86\u8a72\u5831\u544a\u7684\u4e3b\u8981\u767c\u73fe\uff0c\u4e26\u5f37\u8abf\u4e86\u52a0\u5f37\u5b89\u5168\u63aa\u65bd\u4ee5\u6e1b\u8f15\u6b64\u985e\u98a8\u96aa\u7684\u91cd\u8981\u6027\u3002<\/p>\n\n\n\n<p>\u9060\u7aef\u684c\u9762\u5354\u5b9a\u5728\u7db2\u8def\u653b\u64ca\u4e2d\u7684\u4e3b\u5c0e\u5730\u4f4d\uff1a<\/p>\n\n\n\n<p>\u6839\u64da Sophos Active Adversary Report\uff0c\u9060\u7aef\u684c\u9762\u5354\u5b9a\u5df2\u6210\u70ba\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u7684\u9996\u9078\u65b9\u6cd5\uff0c\u4f54\u653b\u64ca\u7684\u6bd4\u4f8b\u9ad8\u9054 90%\u3002 RDP \u662f Microsoft \u958b\u767c\u7684\u4e00\u7a2e\u5354\u8b70\uff0c\u4f7f\u7528\u6236\u80fd\u5920\u900f\u904e\u7db2\u8def\u9023\u63a5\u9060\u7aef\u9023\u63a5\u4e26\u63a7\u5236\u53e6\u4e00\u53f0\u96fb\u8166\u3002 \u4e0d\u5e78\u7684\u662f\uff0c\u9019\u500b\u65b9\u4fbf\u7684\u529f\u80fd\u5df2\u6210\u70ba\u60e1\u610f\u884c\u70ba\u8005\u7684\u4e3b\u8981\u76ee\u6a19\u3002<\/p>\n\n\n\n<p>\u6f0f\u6d1e\u548c\u9055\u898f\u884c\u70ba\uff1a<\/p>\n\n\n\n<p>\u8a72\u5831\u544a\u986f\u793a\uff0c\u5728 65% \u7684\u5206\u6790\u6848\u4f8b\u4e2d\uff0c\u5916\u90e8\u9060\u7aef\u670d\u52d9\uff08\u5305\u62ec\u66b4\u9732\u7684 RDP \u9023\u63a5\u57e0\uff09\u4e00\u76f4\u662f\u521d\u59cb\u7db2\u8def\u6f0f\u6d1e\u7684\u4e3b\u8981\u5a92\u4ecb\u3002 \u7db2\u8def\u72af\u7f6a\u5206\u5b50\u5229\u7528\u9019\u4e9b\u6f0f\u6d1e\u53d6\u5f97\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u3001\u5728\u7db2\u8def\u5167\u6a6b\u5411\u79fb\u52d5\u4e26\u57f7\u884c\u60e1\u610f\u6d3b\u52d5\u3002 \u6191\u8b49\u5916\u6d29\u548c\u5229\u7528\u6f0f\u6d1e\u4ecd\u7136\u662f\u6210\u529f\u653b\u64ca\u7684\u6700\u5e38\u898b\u6839\u672c\u539f\u56e0\u3002<\/p>\n\n\n\n<p>\u98a8\u96aa\u548c\u5f8c\u679c\uff1a<\/p>\n\n\n\n<p>\u7d44\u7e54\u5fc5\u9808\u8a8d\u8b58\u5230\u8207\u66b4\u9732\u548c\u6613\u53d7\u653b\u64ca\u7684\u9060\u7aef\u684c\u9762\u5354\u5b9a\u76f8\u95dc\u7684\u98a8\u96aa\u3002 \u653b\u64ca\u8005\u4e86\u89e3\u9019\u4e9b\u670d\u52d9\u4ee5\u5916\u7684\u6f5b\u5728\u56de\u5831\uff0c\u4f7f\u4ed6\u5011\u6210\u70ba\u5229\u6f64\u8c50\u539a\u7684\u76ee\u6a19\u3002 \u5982\u679c\u7121\u6cd5\u53ca\u6642\u89e3\u6c7a\u9019\u4e9b\u98a8\u96aa\uff0c\u53ef\u80fd\u6703\u5c0e\u81f4\u59a5\u5354\u3001\u8cc7\u6599\u5916\u6d29\u4ee5\u53ca\u91cd\u5927\u7684\u8ca1\u52d9\u548c\u8072\u8b7d\u640d\u5931\u3002<\/p>\n\n\n\n<p>\u6e1b\u8f15\u5a01\u8105\uff1a<\/p>\n\n\n\n<p>\u70ba\u4e86\u589e\u5f37\u7db2\u8def\u5b89\u5168\u9632\u79a6\uff0c\u7d44\u7e54\u9700\u8981\u512a\u5148\u8003\u616e\u9060\u7aef\u684c\u9762\u5354\u5b9a\u7684\u7ba1\u7406\u548c\u5b89\u5168\u3002 \u6e1b\u5c11\u66b4\u9732\u548c\u6613\u53d7\u653b\u64ca\u7684\u670d\u52d9\u3001\u5be6\u65bd\u5f37\u5927\u7684\u8eab\u4efd\u9a57\u8b49\u6a5f\u5236\u4ee5\u53ca\u5b9a\u671f\u66f4\u65b0\u548c\u4fee\u88dc\u7cfb\u7d71\u7b49\u63aa\u65bd\u53ef\u4ee5\u986f\u8457\u964d\u4f4e\u6210\u529f\u653b\u64ca\u7684\u98a8\u96aa\u3002 \u4e3b\u52d5\u98a8\u96aa\u7ba1\u7406\u548c\u6301\u7e8c\u76e3\u63a7\u5c0d\u65bc\u9818\u5148\u65bc\u9811\u56fa\u7684\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>IT \u9818\u5c0e\u8005\u7684\u89d2\u8272\uff1a<\/p>\n\n\n\n<p>IT \u9818\u5c0e\u8005\u5728\u4fdd\u8b77\u7d44\u7e54\u514d\u53d7\u7db2\u8def\u5a01\u8105\u65b9\u9762\u767c\u63ee\u8457\u81f3\u95dc\u91cd\u8981\u7684\u4f5c\u7528\u3002 \u4ed6\u5011\u5fc5\u9808\u8a8d\u8b58\u5230\u9060\u7aef\u684c\u9762\u5354\u5b9a\u7684\u91cd\u8981\u6027\uff0c\u4e26\u78ba\u4fdd\u63a1\u53d6\u9069\u7576\u7684\u5b89\u5168\u63a7\u5236\u63aa\u65bd\u3002 \u9019\u5305\u62ec\u5be6\u65bd\u5f37\u6709\u529b\u7684\u5b58\u53d6\u63a7\u5236\u63aa\u65bd\u3001\u5b9a\u671f\u9032\u884c\u5b89\u5168\u5be9\u8a08\u4ee5\u53ca\u63d0\u9ad8\u54e1\u5de5\u7684\u7db2\u8def\u5b89\u5168\u610f\u8b58\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>Sophos \u5831\u544a\u70ba\u7d44\u7e54\u6572\u97ff\u4e86\u8b66\u9418\uff0c\u8981\u6c42\u4ed6\u5011\u7acb\u5373\u63a1\u53d6\u884c\u52d5\u4fdd\u8b77\u5176\u9060\u7aef\u684c\u9762\u5354\u5b9a\u3002 \u7db2\u8def\u72af\u7f6a\u5206\u5b50\u7e7c\u7e8c\u5229\u7528\u9019\u4e9b\u6f0f\u6d1e\uff0c\u56e0\u6b64\u4f01\u696d\u5fc5\u9808\u5728\u7db2\u8def\u5b89\u5168\u5de5\u4f5c\u4e2d\u4fdd\u6301\u8b66\u60d5\u4e26\u7a4d\u6975\u4e3b\u52d5\u3002 \u900f\u904e\u512a\u5148\u7ba1\u7406\u9060\u7aef\u684c\u9762\u5354\u5b9a\u4e26\u5be6\u65bd\u5f37\u5927\u7684\u5b89\u5168\u63aa\u65bd\uff0c\u7d44\u7e54\u53ef\u4ee5\u6e1b\u8f15\u9019\u4e9b\u653b\u64ca\u5e36\u4f86\u7684\u98a8\u96aa\u4e26\u4fdd\u8b77\u5176\u5bf6\u8cb4\u7684\u8cc7\u7522\u3002<\/p>\n\n\n\n<p>\u8acb\u8a18\u4f4f\uff0c\u5728\u4e0d\u65b7\u767c\u5c55\u7684\u7db2\u8def\u5b89\u5168\u683c\u5c40\u4e2d\uff0c\u9818\u5148\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u4e00\u6b65\u5c0d\u65bc\u4fdd\u8b77\u654f\u611f\u8cc7\u6599\u548c\u7dad\u6301\u6578\u4f4d\u9818\u57df\u7684\u4fe1\u4efb\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#Cybersecurity #DataProtection #RemoteDesktopProtocols #CyberAttacks #ITSecurity #RiskManagement #CyberThreats #StaySecure #SophosReport #CyberCrime #NetworkSecurity #DataBreachPrevention #ITLeadership #SecureRemoteAccess<\/p>","protected":false},"excerpt":{"rendered":"<p>\u5728\u6578\u4f4d\u6642\u4ee3\uff0c\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u4e0d\u65b7\u5c0b\u627e\u65b0\u7684\u65b9\u6cd5\u4f86\u5371\u5bb3\u500b\u4eba\u548c\u7d44\u7e54\u7684\u5b89\u5168\u3002 \u5168\u7403\u7db2\u8def\u5b89\u5168\u516c\u53f8 Sophos \u6700\u8fd1\u7684\u4e00\u4efd\u5831\u544a\u63ed\u793a\u4e86\u4e00\u500b\u4ee4\u4eba\u64d4\u6182\u7684\u8da8\u52e2 - \u5728\u7db2\u8def\u653b\u64ca\u4e2d\u5229\u7528\u9060\u7aef\u684c\u9762\u5354\u5b9a (RDP)\u3002 \u672c\u90e8\u843d\u683c\u63a2\u8a0e\u4e86\u8a72\u5831\u544a\u7684\u4e3b\u8981\u767c\u73fe\uff0c\u4e26\u5f37\u8abf\u4e86\u52a0\u5f37\u5b89\u5168\u63aa\u65bd\u4ee5\u6e1b\u8f15\u6b64\u985e\u98a8\u96aa\u7684\u91cd\u8981\u6027\u3002<\/p>","protected":false},"author":11,"featured_media":1835,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png","jetpack-related-posts":[{"id":1752,"url":"https:\/\/first-unity.com.hk\/zh\/the-alarming-rise-of-malicious-phishing-emails-how-ai-like-chatgpt-is-fueling-the-threat\/","url_meta":{"origin":1789,"position":0},"title":"The Alarming Rise of Malicious Phishing Emails: How AI like ChatGPT is Fueling the Threat","author":"Rhona Goskirk","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent years, the world has witnessed a staggering increase in cyber threats, with one particular menace gaining significant traction: malicious phishing emails. A new report by cybersecurity firm SlashNext has shed light on the role of generative artificial intelligence tools, such as ChatGPT, in the exponential growth of\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1822,"url":"https:\/\/first-unity.com.hk\/zh\/troubleshooting-remote-desktop-black-screen-issues-on-windows-10\/","url_meta":{"origin":1789,"position":1},"title":"Troubleshooting Remote Desktop Black Screen Issues on Windows 10","author":"Dr. Ken","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: The Remote Desktop feature in Windows 10 allows users to connect to their computers remotely, providing convenience and flexibility. However, some users have encountered a frustrating issue where they are faced with a black screen when attempting to use Remote Desktop after updating to the Windows 10 May update.\u2026","rel":"","context":"\u5728\u300cDr. Ken's Tech Course\u300d\u4e2d","block_context":{"text":"Dr. Ken's Tech Course","link":"https:\/\/first-unity.com.hk\/zh\/category\/dr-kens-tech-course\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-143627.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1533,"url":"https:\/\/first-unity.com.hk\/zh\/the-future-of-remote-surgery-transforming-medical-science\/","url_meta":{"origin":1789,"position":2},"title":"The Future of Remote Surgery: Transforming Medical Science","author":"Harry Spira","date":"3 1 \u6708, 2024","format":false,"excerpt":"https:\/\/youtu.be\/aNRURuTJL0Y?si=dMekn0q2-tXtx27l Introduction Welcome to the exciting and transformative world of remote surgery! In this blog, we will explore the exceptional benefits and challenges associated with this groundbreaking technology. Surgical procedures have traditionally been time-consuming, costly, and inaccessible to many. However, remote surgery offers a solution that allows doctors to perform\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/aNRURuTJL0Y\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1496,"url":"https:\/\/first-unity.com.hk\/zh\/veterinary-cyber-security-protecting-your-practice-in-the-digital-era\/","url_meta":{"origin":1789,"position":3},"title":"Veterinary Cyber Security: Protecting Your Practice in the Digital Era","author":"Thomas","date":"18 12 \u6708, 2023","format":false,"excerpt":"https:\/\/youtu.be\/joGzD4yrf-c?si=CQY11NYHXu078LFA The Importance of Cyber Security in Veterinary Practices In today's interconnected world, cyber security plays a crucial role in safeguarding electronic devices and networks from malicious attacks. For veterinary practices, the need for robust cyber security measures is even more essential. Why? Because it involves the safety of sensitive\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/joGzD4yrf-c\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1539,"url":"https:\/\/first-unity.com.hk\/zh\/the-future-of-remote-work-unlocking-productivity-and-flexibility\/","url_meta":{"origin":1789,"position":4},"title":"The Future of Remote Work: Unlocking Productivity and Flexibility","author":"Harry Spira","date":"3 1 \u6708, 2024","format":false,"excerpt":"https:\/\/youtu.be\/UYcoGc25Xj0?si=g7hroKyrBBK581H4 Introduction The world has entered into a new era of work - remote work. Gone are the days of commuting to the office, as the usual office desks have been replaced by living room tables. With this transition, there comes a great opportunity for companies to unlock more productivity\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/UYcoGc25Xj0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1789,"position":5},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1789"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1789"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1835"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}