{"id":1793,"date":"2024-06-05T08:59:19","date_gmt":"2024-06-05T08:59:19","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1793"},"modified":"2024-06-08T07:25:10","modified_gmt":"2024-06-08T07:25:10","slug":"microsoft-data-breach-employees-credentials-and-passwords-leaked-on-the-internet","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/microsoft-data-breach-employees-credentials-and-passwords-leaked-on-the-internet\/","title":{"rendered":"\u5fae\u8edf\u8cc7\u6599\u5916\u6d29\uff1a\u54e1\u5de5\u7684\u6191\u8b49\u548c\u5bc6\u78bc\u5728\u7db2\u8def\u4e0a\u6d29\u9732"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u64da\u5831\u9053\uff0c\u4e16\u754c\u4e0a\u6700\u5927\u7684\u79d1\u6280\u516c\u53f8\u4e4b\u4e00\u5fae\u8edf\u7d93\u6b77\u4e86\u4e00\u6b21\u91cd\u5927\u8cc7\u6599\u6d29\u9732\uff0c\u5c0e\u81f4\u54e1\u5de5\u7684\u6191\u8b49\u548c\u516c\u53f8\u5167\u90e8\u6587\u4ef6\u66b4\u9732\u5728\u7db2\u8def\u4e0a\uff0c\u9019\u662f\u4ee4\u4eba\u9707\u9a5a\u7684\u6d88\u606f\u3002 \u5b89\u5168\u7814\u7a76\u4eba\u54e1\u6700\u8fd1\u767c\u73fe\u4e86\u4e00\u500b\u8a17\u7ba1\u5728\u5fae\u8edf Azure \u96f2\u7aef\u670d\u52d9\u4e0a\u7684\u958b\u653e\u516c\u5171\u5132\u5b58\u4f3a\u670d\u5668\uff0c\u8a72\u4f3a\u670d\u5668\u5132\u5b58\u8207\u5fae\u8edf Bing \u641c\u5c0b\u5f15\u64ce\u76f8\u95dc\u7684\u5167\u90e8\u8cc7\u8a0a\u3002 \u9019\u6b21\u5916\u6d29\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u654f\u611f\u8cc7\u6599\u548c\u5fae\u8edf\u7cfb\u7d71\u5b89\u5168\u53ef\u80fd\u53d7\u5230\u640d\u5bb3\u7684\u64d4\u6182\u3002<\/p>\n\n\n\n<p>\u8cc7\u6599\u5916\u6d29\u7684\u8a73\u7d30\u8cc7\u8a0a\uff1a<\/p>\n\n\n\n<p>\u6b64\u6b21\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u662f\u7531\u5c08\u9580\u5f9e\u4e8b\u8b58\u5225\u5b89\u5168\u6f0f\u6d1e\u7684\u7db2\u8def\u5b89\u5168\u516c\u53f8 SOCRadar \u7684\u5b89\u5168\u7814\u7a76\u4eba\u54e1 Can Yoleri\u3001Murat \u00d6zfidan \u548c Egemen Ko\u00e7hisarl\u0131 \u767c\u73fe\u7684\u3002 \u4ed6\u5011\u767c\u73fe\u958b\u653e\u4f3a\u670d\u5668\u5305\u542b\u7a0b\u5f0f\u78bc\u3001\u8173\u672c\u548c\u8a2d\u5b9a\u6587\u4ef6\uff0c\u5305\u62ec\u5fae\u8edf\u54e1\u5de5\u7528\u4f86\u5b58\u53d6\u5176\u4ed6\u5167\u90e8\u8cc7\u6599\u5eab\u548c\u7cfb\u7d71\u7684\u5bc6\u78bc\u3001\u91d1\u9470\u548c\u6191\u8b49\u3002 \u4ee4\u4eba\u4e0d\u5b89\u7684\u662f\uff0c\u8a72\u4f3a\u670d\u5668\u6c92\u6709\u5bc6\u78bc\u4fdd\u8b77\uff0c\u7db2\u8def\u4e0a\u7684\u4efb\u4f55\u4eba\u90fd\u53ef\u4ee5\u5b58\u53d6\u5b83\u3002<\/p>\n\n\n\n<p>\u6f5b\u5728\u5f71\u97ff\u548c\u5b89\u5168\u554f\u984c\uff1a<\/p>\n\n\n\n<p>\u4f3a\u670d\u5668\u4e0a\u66b4\u9732\u7684\u8cc7\u6599\u53ef\u80fd\u6703\u70ba\u60e1\u610f\u884c\u70ba\u8005\u63d0\u4f9b\u5c0d\u5176\u4ed6 Microsoft \u5167\u90e8\u6587\u4ef6\u7684\u5b58\u53d6\u6b0a\u9650\uff0c\u5f9e\u800c\u5c0e\u81f4\u9032\u4e00\u6b65\u7684\u8cc7\u6599\u5916\u6d29\u4e26\u5371\u53ca\u6b63\u5728\u4f7f\u7528\u7684\u670d\u52d9\u3002 \u9019\u6b21\u5916\u6d29\u7684\u56b4\u91cd\u6027\u5728\u65bc\uff0c\u5167\u90e8\u6587\u4ef6\u7684\u5132\u5b58\u4f4d\u7f6e\u5f88\u5bb9\u6613\u88ab\u8b58\u5225\uff0c\u5c0d\u5fae\u8edf\u7684\u8cc7\u6599\u5b89\u5168\u69cb\u6210\u91cd\u5927\u98a8\u96aa\uff0c\u4e26\u53ef\u80fd\u6d29\u6f0f\u654f\u611f\u8cc7\u8a0a\u3002<\/p>\n\n\n\n<p>\u56de\u61c9\u548c\u89e3\u6c7a\uff1a<\/p>\n\n\n\n<p>\u767c\u73fe\u6f0f\u6d1e\u5f8c\uff0c\u7814\u7a76\u4eba\u54e1\u7acb\u5373\u5728\u4e8c\u6708\u5411\u5fae\u8edf\u5831\u544a\u4e86\u9019\u500b\u554f\u984c\u3002 \u7136\u800c\uff0c\u8a72\u516c\u53f8\u82b1\u4e86\u8fd1\u4e00\u500b\u6708\u7684\u6642\u9593\u624d\u89e3\u6c7a\u8a72\u5b89\u5168\u6f0f\u6d1e\u4e26\u4fdd\u8b77\u66b4\u9732\u7684\u8cc7\u6599\u3002 \u76ee\u524d\u5c1a\u4e0d\u6e05\u695a\u662f\u5426\u6709\u672a\u7d93\u6388\u6b0a\u7684\u5404\u65b9\u5b58\u53d6\u4e86\u9019\u4e9b\u6578\u64da\uff0c\u4e5f\u4e0d\u6e05\u695a\u9019\u4e9b\u8cc7\u8a0a\u5728\u53d7\u5230\u4fdd\u8b77\u4e4b\u524d\u53ef\u4ee5\u5b58\u53d6\u591a\u9577\u6642\u9593\u3002<\/p>\n\n\n\n<p>\u5fae\u8edf\u5b98\u65b9\u8072\u660e\uff1a<\/p>\n\n\n\n<p>\u622a\u81f3\u76ee\u524d\uff0c\u5fae\u8edf\u5c1a\u672a\u5c31\u6b64\u6b21\u5b89\u5168\u6f0f\u6d1e\u767c\u8868\u5b98\u65b9\u8072\u660e\u3002 \u9019\u7a2e\u6c89\u9ed8\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u8a72\u516c\u53f8\u5728\u53ca\u6642\u6709\u6548\u89e3\u6c7a\u6b64\u985e\u9055\u898f\u884c\u70ba\u65b9\u9762\u7684\u900f\u200b\u200b\u660e\u5ea6\u548c\u554f\u8cac\u5236\u7684\u64d4\u6182\u3002 \u5305\u62ec\u54e1\u5de5\u548c\u5ba2\u6236\u5728\u5167\u7684\u5229\u5bb3\u95dc\u4fc2\u4eba\u8feb\u5207\u7b49\u5f85 Microsoft \u7684\u56de\u61c9\uff0c\u4ee5\u6f84\u6e05\u6b64\u6b21\u6d29\u6f0f\u7684\u5f71\u97ff\u4ee5\u53ca\u70ba\u9632\u6b62\u672a\u4f86\u4e8b\u4ef6\u767c\u751f\u800c\u63a1\u53d6\u7684\u63aa\u65bd\u3002<\/p>\n\n\n\n<p>\u5176\u4ed6\u8cc7\u6599\u5916\u6d29\uff1a<\/p>\n\n\n\n<p>\u4e0d\u5e78\u7684\u662f\uff0c\u9019\u4e00\u4e8b\u4ef6\u5728\u7576\u524d\u7db2\u8def\u5b89\u5168\u9818\u57df\u4e26\u4e0d\u662f\u4e00\u500b\u5b64\u7acb\u7684\u6848\u4f8b\u3002 \u5c31\u5728\u672c\u9031\uff0c\u5370\u5ea6\u7a7f\u6234\u5f0f\u88dd\u7f6e\u516c\u53f8 Boat \u4e5f\u906d\u9047\u4e86\u91cd\u5927\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\uff0c\u8d85\u904e 750 \u842c\u540d\u5ba2\u6236\u7684\u500b\u4eba\u8cc7\u8a0a\u88ab\u63ed\u9732\u5728\u6697\u7db2\u4e0a\u3002 \u6b64\u985e\u9055\u898f\u884c\u70ba\u7684\u589e\u52a0\u51f8\u986f\u4e86\u7d44\u7e54\u8feb\u5207\u9700\u8981\u512a\u5148\u8003\u616e\u8cc7\u6599\u5b89\u5168\u4e26\u5be6\u65bd\u5f37\u6709\u529b\u7684\u63aa\u65bd\u4f86\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u6d89\u53ca\u54e1\u5de5\u6191\u8b49\u548c\u5bc6\u78bc\u5916\u6d29\u7684 Microsoft \u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u6e05\u695a\u5730\u63d0\u9192\u4eba\u5011\uff0c\u7d44\u7e54\u5728\u4fdd\u8b77\u8cc7\u6599\u514d\u53d7\u7db2\u8def\u5a01\u8105\u65b9\u9762\u6240\u9762\u81e8\u7684\u6301\u7e8c\u6311\u6230\u3002 \u96a8\u8457\u6280\u8853\u4e0d\u65b7\u9032\u6b65\uff0c\u8cc7\u6599\u5916\u6d29\u548c\u7db2\u8def\u653b\u64ca\u7684\u98a8\u96aa\u8b8a\u5f97\u66f4\u52a0\u666e\u904d\u3002 \u50cf Microsoft \u9019\u6a23\u7684\u516c\u53f8\u5fc5\u9808\u4e0d\u65b7\u8a55\u4f30\u548c\u589e\u5f37\u5176\u5b89\u5168\u5354\u8b70\uff0c\u4ee5\u9632\u6b62\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u654f\u611f\u8cc7\u8a0a\u3002 \u89e3\u6c7a\u6b64\u985e\u4e8b\u4ef6\u7684\u900f\u660e\u5ea6\u548c\u53ca\u6642\u97ff\u61c9\u5c0d\u65bc\u7dad\u6301\u5229\u76ca\u76f8\u95dc\u8005\u4e4b\u9593\u7684\u4fe1\u4efb\u548c\u78ba\u4fdd\u6578\u4f4d\u6642\u4ee3\u7684\u8cc7\u6599\u5b89\u5168\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#MicrosoftDataBreach #Cybersecurity #DataSecurity #DataPrivacy #DataProtection #InternetSecurity #DataBreachAlert #PasswordLeak #CyberThreats #DataSecurityMatters #MicrosoftSecurity #DataProtectionMatters #CyberSafety #DigitalSecurity #SecuringData #DataBreachResponse #MicrosoftAzure #BingSearchEngine #DataLeakage #CyberDefense #DataSecurityIncident #ProtectYourData #SecureYourCredentials<\/p>","protected":false},"excerpt":{"rendered":"<p>\u64da\u5831\u9053\uff0c\u4e16\u754c\u4e0a\u6700\u5927\u7684\u79d1\u6280\u516c\u53f8\u4e4b\u4e00\u5fae\u8edf\u7d93\u6b77\u4e86\u4e00\u6b21\u91cd\u5927\u8cc7\u6599\u6d29\u9732\uff0c\u5c0e\u81f4\u54e1\u5de5\u7684\u6191\u8b49\u548c\u516c\u53f8\u5167\u90e8\u6587\u4ef6\u66b4\u9732\u5728\u7db2\u8def\u4e0a\uff0c\u9019\u662f\u4ee4\u4eba\u9707\u9a5a\u7684\u6d88\u606f\u3002 \u5b89\u5168\u7814\u7a76\u4eba\u54e1\u6700\u8fd1\u767c\u73fe\u4e86\u4e00\u500b\u8a17\u7ba1\u5728\u5fae\u8edf Azure \u96f2\u7aef\u670d\u52d9\u4e0a\u7684\u958b\u653e\u516c\u5171\u5132\u5b58\u4f3a\u670d\u5668\uff0c\u8a72\u4f3a\u670d\u5668\u5132\u5b58\u8207\u5fae\u8edf Bing \u641c\u5c0b\u5f15\u64ce\u76f8\u95dc\u7684\u5167\u90e8\u8cc7\u8a0a\u3002 \u9019\u6b21\u5916\u6d29\u5f15\u767c\u4e86\u4eba\u5011\u5c0d\u654f\u611f\u8cc7\u6599\u548c\u5fae\u8edf\u7cfb\u7d71\u5b89\u5168\u53ef\u80fd\u53d7\u5230\u640d\u5bb3\u7684\u64d4\u6182\u3002<\/p>","protected":false},"author":2,"featured_media":1837,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152436.png","jetpack-related-posts":[{"id":1785,"url":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","url_meta":{"origin":1793,"position":0},"title":"Microsoft&#8217;s 38TB Leak: How IT Leaders Should Respond","author":"Harry Spira","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital landscape, cybersecurity breaches continue to pose significant challenges for organizations worldwide. One notable incident that caught the attention of IT leaders and cybersecurity professionals was Microsoft's 38TB leak. This massive data breach raised concerns about cloud security and the importance of robust cybersecurity measures. In this\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1686,"url":"https:\/\/first-unity.com.hk\/zh\/microsoft-legacy-account-hacked-by-russian-apt-the-importance-of-multi-factor-authentication\/","url_meta":{"origin":1793,"position":1},"title":"Microsoft Legacy Account Hacked by Russian APT: The Importance of Multi-Factor Authentication","author":"Rhona Goskirk","date":"14 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent cyber attack, Microsoft's legacy test tenant account fell victim to a sophisticated hacking operation conducted by a Russian Advanced Persistent Threat (APT) group. The breach, attributed to the notorious Russian nation-state actor known as Midnight Blizzard or APT29, revealed a critical security oversight: the compromised account\u2026","rel":"","context":"\u5728\u300cTechnology Update\u300d\u4e2d","block_context":{"text":"Technology Update","link":"https:\/\/first-unity.com.hk\/zh\/category\/technology-update\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-14-230007.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1723,"url":"https:\/\/first-unity.com.hk\/zh\/fujitsu-discovers-malware-on-corporate-network-highlights-potential-data-breach\/","url_meta":{"origin":1793,"position":2},"title":"Fujitsu Discovers Malware on Corporate Network, Highlights Potential Data Breach","author":"Lewis Lok","date":"29 5 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent announcement, Fujitsu, the Japan-based IT giant, revealed the presence of malware on its corporate network. The company issued a warning, stating that this security incident could potentially lead to a data breach. Fujitsu expressed deep regret for the situation and acknowledged the potential unauthorized access to\u2026","rel":"","context":"\u5728\u300cOn Demand IT\u300d\u4e2d","block_context":{"text":"On Demand IT","link":"https:\/\/first-unity.com.hk\/zh\/category\/on-demand-it\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-29-145936.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1771,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data\/","url_meta":{"origin":1793,"position":3},"title":"Cybersecurity Breach at Hong Kong Tech Park Exposes Sensitive Data","author":"Dr. Ken","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Hong Kong's prominent technology hub, Cyberport, has announced that it fell victim to a \"malicious intrusion\" in mid-August, resulting in a significant data breach. The breach, which was only disclosed recently, has raised concerns regarding cybersecurity measures and the protection of sensitive information. This incident\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1700,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-hacked-urgent-password-change-required-to-secure-your-account\/","url_meta":{"origin":1793,"position":4},"title":"AnyDesk Hacked: Urgent Password Change Required to Secure Your Account","author":"Dr. Ken","date":"18 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking turn of events, AnyDesk Software GmbH, the German company behind the widely used remote desktop application, has recently confirmed a security breach. The company's production systems were compromised, leading to concerns about user data and privacy. This blog post aims to provide you with an overview\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1767,"url":"https:\/\/first-unity.com.hk\/zh\/japanese-mobile-game-developer-accidentally-sets-wrong-google-drive-permissions-resulting-in-data-breach\/","url_meta":{"origin":1793,"position":5},"title":"Japanese Mobile Game Developer Accidentally Sets Wrong Google Drive Permissions, Resulting in Data Breach","author":"Rhona Goskirk","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a recent incident, a Japanese mobile game developer, known as ATeam, has mistakenly set incorrect permissions on their Google Drive, leading to a massive data breach affecting millions of users. This oversight has raised concerns about the security practices of developers and the potential risks users face when\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-145536.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1793"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1793"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1793\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1837"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}