{"id":1797,"date":"2024-06-06T06:16:09","date_gmt":"2024-06-06T06:16:09","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1797"},"modified":"2024-06-06T06:16:12","modified_gmt":"2024-06-06T06:16:12","slug":"cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates\/","title":{"rendered":"AnyDesk \u4e0a\u7684\u7db2\u8def\u653b\u64ca\uff1a\u900f\u904e\u7acb\u5373\u66f4\u65b0\u78ba\u4fdd\u5b89\u5168\u8a2a\u554f"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u5728\u6211\u5011\u65e5\u76ca\u4e92\u806f\u7684\u4e16\u754c\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u5a01\u8105\u6301\u7e8c\u70ba\u500b\u4eba\u548c\u7d44\u7e54\u5e36\u4f86\u91cd\u5927\u98a8\u96aa\u3002 \u6700\u8fd1\uff0c\u77e5\u540d\u9060\u7aef\u684c\u9762\u8edf\u9ad4\u4f9b\u61c9\u5546 AnyDesk \u906d\u9047\u4e86\u7db2\u8def\u653b\u64ca\uff0c\u5f15\u8d77\u4e86\u7528\u6236\u7fa4\u7684\u64d4\u6182\u3002 \u672c\u90e8\u843d\u683c\u65e8\u5728\u95e1\u660e\u6b64\u4e8b\u4ef6\uff0c\u6982\u8ff0 AnyDesk \u70ba\u89e3\u6c7a\u8a72\u60c5\u6cc1\u800c\u63a1\u53d6\u7684\u63aa\u65bd\uff0c\u4e26\u5f37\u8abf\u66f4\u65b0\u81f3\u6700\u65b0\u8edf\u9ad4\u7248\u672c\u4ee5\u589e\u5f37\u5b89\u5168\u6027\u7684\u91cd\u8981\u6027\u3002<\/p>\n\n\n\n<p>AnyDesk \u4e0a\u7684\u7db2\u8def\u653b\u64ca\uff1a<\/p>\n\n\n\n<p>AnyDesk \u7684\u7db2\u8def\u653b\u64ca\u9996\u6b21\u65bc 1 \u6708\u4e2d\u65ec\u88ab\u767c\u73fe\uff0c\u7576\u6642\u8a72\u516c\u53f8\u7684\u7cfb\u7d71\u5167\u767c\u73fe\u4e86\u7570\u5e38\u60c5\u6cc1\u3002 \u70ba\u4e86\u53ca\u6642\u89e3\u6c7a\u9019\u500b\u554f\u984c\uff0cAnyDesk \u8207\u7db2\u8def\u5b89\u5168\u5c08\u5bb6 CrowdStrike \u5408\u4f5c\u555f\u52d5\u4e86\u5168\u9762\u7684\u88dc\u6551\u548c\u56de\u61c9\u8a08\u756b\u3002 \u8a72\u8a08\u5283\u6210\u529f\u57f7\u884c\uff0c\u78ba\u4fdd\u4e86\u653b\u64ca\u7684\u904f\u5236\u4e26\u6700\u5927\u9650\u5ea6\u5730\u964d\u4f4e\u4e86\u6f5b\u5728\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>\u4f7f\u7528\u8005\u6191\u8b49\u548c\u5f71\u97ff\u8a55\u4f30\uff1a<\/p>\n\n\n\n<p>\u96d6\u7136 AnyDesk \u6c92\u6709\u8b49\u64da\u8868\u660e\u7528\u6236\u6191\u8b49\u906d\u5230\u6d29\u9732\uff0c\u4f46\u4ed6\u5011\u5df2\u63a1\u53d6\u9810\u9632\u63aa\u65bd\u4f86\u78ba\u4fdd\u7528\u6236\u7684\u5b89\u5168\u3002 \u4f5c\u70ba\u4e00\u9805\u4e3b\u52d5\u63aa\u65bd\uff0c\u6211\u5011\u5c0d\u6240\u6709\u5ba2\u6236\u5be6\u65bd\u4e86\u5f37\u5236\u5bc6\u78bc\u91cd\u8a2d\u3002 AnyDesk \u5411\u7528\u6236\u4fdd\u8b49\uff0c\u79c1\u9470\u3001\u5b89\u5168\u4ee4\u724c\u548c\u5bc6\u78bc\u4e0d\u6703\u88ab\u5b58\u5132\uff0c\u5f9e\u800c\u5927\u5927\u964d\u4f4e\u4e86\u88ab\u5229\u7528\u7684\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>\u8edf\u9ad4\u5b8c\u6574\u6027\u548c\u60e1\u610f\u8edf\u9ad4\u50b3\u64ad\uff1a<\/p>\n\n\n\n<p>\u70ba\u4e86\u4fdd\u6301\u900f\u660e\u5ea6\u548c\u7528\u6236\u4fe1\u4efb\uff0cAnyDesk\u5c0d\u5176\u7a0b\u5f0f\u78bc\u9032\u884c\u4e86\u5fb9\u5e95\u5be9\u67e5\uff0c\u4e26\u78ba\u8a8d\u4e0d\u5b58\u5728\u4efb\u4f55\u60e1\u610f\u4fee\u6539\u3002 \u6c92\u6709\u8b49\u64da\u8868\u660e\u4efb\u4f55\u60e1\u610f\u8edf\u9ad4\u662f\u900f\u904e\u4ed6\u5011\u7684\u7cfb\u7d71\u50b3\u64ad\u7684\u3002 AnyDesk \u5f37\u8abf\u5176\u8edf\u9ad4\u7684\u53d7\u640d\u7248\u672c\u4e0d\u6703\u88ab\u5206\u767c\uff0c\u4e26\u6566\u4fc3\u7528\u6236\u50c5\u5f9e\u5b98\u65b9\u4f86\u6e90\u4e0b\u8f09\u8edf\u9ad4\u3002<\/p>\n\n\n\n<p>\u7acb\u5373\u66f4\u65b0\u7684\u91cd\u8981\u6027\uff1a<\/p>\n\n\n\n<p>\u9451\u65bc\u6b64\u7db2\u8def\u653b\u64ca\uff0cAnyDesk \u5f37\u70c8\u5efa\u8b70\u7528\u6236\u5c07\u8edf\u9ad4\u66f4\u65b0\u81f3\u6700\u65b0\u7248\u672c\uff0c\u7279\u5225\u662f\u7248\u672c 7.0.15 \u548c 8.0.8\u3002 \u9019\u4e9b\u66f4\u65b0\u5305\u62ec\u91cd\u8981\u7684\u5b89\u5168\u6027\u4fee\u88dc\u7a0b\u5f0f\u548c\u589e\u5f37\u529f\u80fd\uff0c\u53ef\u589e\u5f37\u8edf\u9ad4\u62b5\u79a6\u6f5b\u5728\u6f0f\u6d1e\u7684\u80fd\u529b\u3002 \u900f\u904e\u53ca\u6642\u66f4\u65b0\uff0c\u4f7f\u7528\u8005\u53ef\u4ee5\u78ba\u4fdd\u7e7c\u7e8c\u5b58\u53d6 AnyDesk \u7684\u670d\u52d9\uff0c\u540c\u6642\u964d\u4f4e\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u6216\u8cc7\u6599\u5916\u6d29\u7684\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>\u7dad\u8b77\u7528\u6236\u4fe1\u5fc3\uff1a<\/p>\n\n\n\n<p>\u5728\u6574\u500b\u4e8b\u4ef6\u4e2d\uff0cAnyDesk \u5c55\u73fe\u4e86\u5c0d\u900f\u660e\u5ea6\u3001\u8aa0\u4fe1\u5ea6\u548c\u7528\u6236\u4fe1\u5fc3\u7684\u627f\u8afe\u3002 \u4ed6\u5011\u8fc5\u901f\u8207\u7528\u6236\u7fa4\u9032\u884c\u4e86\u6e9d\u901a\uff0c\u63d0\u4f9b\u4e86\u6709\u95dc\u7db2\u8def\u653b\u64ca\u7684\u8a73\u7d30\u8cc7\u8a0a\u4ee5\u53ca\u89e3\u6c7a\u8a72\u554f\u984c\u6240\u63a1\u53d6\u7684\u6b65\u9a5f\u3002 AnyDesk \u7684\u7a4d\u6975\u4e3b\u52d5\u7684\u65b9\u6cd5\u3001\u8207\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u7684\u5408\u4f5c\u4ee5\u53ca\u5c0d\u5b89\u5168\u8edf\u9ad4\u7248\u672c\u7684\u91cd\u8996\u53cd\u6620\u4e86\u4ed6\u5011\u5c0d\u4f7f\u7528\u8005\u5b89\u5168\u7684\u5949\u737b\u3002<\/p>\n\n\n\n<p>\u7db2\u8def\u5b89\u5168\u6700\u4f73\u5be6\u8e10\uff1a<\/p>\n\n\n\n<p>\u96d6\u7136\u50cf AnyDesk \u9019\u6a23\u7684\u8edf\u9ad4\u4f9b\u61c9\u5546\u5728\u4fdd\u8b77\u7528\u6236\u8cc7\u6599\u65b9\u9762\u767c\u63ee\u8457\u81f3\u95dc\u91cd\u8981\u7684\u4f5c\u7528\uff0c\u4f46\u5c0d\u65bc\u500b\u4eba\u548c\u7d44\u7e54\u4f86\u8aaa\uff0c\u63a1\u7528\u7db2\u8def\u5b89\u5168\u6700\u4f73\u5be6\u8e10\u4e5f\u540c\u6a23\u91cd\u8981\u3002 \u4e00\u4e9b\u95dc\u9375\u5efa\u8b70\u5305\u62ec\uff1a<\/p>\n\n\n\n<ol>\n<li>\u5b9a\u671f\u66f4\u65b0\u8edf\u9ad4\u548c\u61c9\u7528\u7a0b\u5f0f\u4ee5\u53d7\u76ca\u65bc\u6700\u65b0\u7684\u5b89\u5168\u6027\u4fee\u88dc\u7a0b\u5f0f<\/li>\n\n\n\n<li>\u70ba\u6240\u6709\u5e33\u6236\u4f7f\u7528\u5f37\u800c\u7368\u7279\u7684\u5bc6\u78bc\uff0c\u4e26\u5118\u53ef\u80fd\u555f\u7528\u96d9\u91cd\u8a8d\u8b49<\/li>\n\n\n\n<li>\u9ede\u64ca\u9023\u7d50\u6216\u5f9e\u672a\u77e5\u6216\u53ef\u7591\u4f86\u6e90\u4e0b\u8f09\u9644\u4ef6\u6642\u8acb\u52d9\u5fc5\u5c0f\u5fc3<\/li>\n\n\n\n<li>\u6295\u8cc7\u53ef\u9760\u7684\u9632\u6bd2\u8edf\u9ad4<\/li>\n\n\n\n<li>\u8b93\u81ea\u5df1\u548c\u60a8\u7684\u5718\u968a\u4e86\u89e3\u5e38\u898b\u7684\u7db2\u8def\u5b89\u5168\u5a01\u8105\uff0c\u4f8b\u5982\u7db2\u8def\u91e3\u9b5a\u548c\u793e\u6703\u5de5\u7a0b\u653b\u64ca<\/li>\n<\/ol>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u7db2\u8def\u5b89\u5168\u4e8b\u4ef6\u63d0\u9192\u6211\u5011\uff0c\u6578\u4f4d\u74b0\u5883\u9700\u8981\u96a8\u6642\u4fdd\u6301\u8b66\u60d5\u4e26\u63a1\u53d6\u4e3b\u52d5\u63aa\u65bd\u4f86\u4fdd\u8b77\u654f\u611f\u8cc7\u8a0a\u3002 AnyDesk \u5c0d\u6700\u8fd1\u7db2\u8def\u653b\u64ca\u7684\u56de\u61c9\u53cd\u6620\u4e86\u4ed6\u5011\u5c0d\u7528\u6236\u5b89\u5168\u7684\u627f\u8afe\u3002 \u900f\u904e\u53ca\u6642\u66f4\u65b0\u81f3\u5efa\u8b70\u7684\u8edf\u9ad4\u7248\u672c\u4e26\u9075\u5faa\u7db2\u8def\u5b89\u5168\u6700\u4f73\u5be6\u8e10\uff0c\u4f7f\u7528\u8005\u53ef\u4ee5\u5728\u4fdd\u8b77\u81ea\u5df1\u7684\u6578\u4f4d\u8cc7\u7522\u65b9\u9762\u767c\u63ee\u7a4d\u6975\u4f5c\u7528\u3002 \u8b93\u6211\u5011\u5171\u540c\u512a\u5148\u8003\u616e\u7db2\u8def\u5b89\u5168\uff0c\u4ee5\u78ba\u4fdd\u4e00\u500b\u66f4\u5b89\u5168\u3001\u66f4\u6709\u5f48\u6027\u7684\u7dda\u4e0a\u74b0\u5883\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#AnyDeskCyber\u200b\u200battack #SecureAccess #ImmediateUpdates #Cyber\u200b\u200bsecurityThreats #UserSafety #SoftwareSecurity #DataProtection #Cyber\u200b\u200bsecurityBestPractices #StayUpdated #VigilanceOnline #DigitalSafety #ProwareYourDataa #StayUpwareADatayity #ProwaretectYourDatay #ProwaretectYourDatayData<\/p>","protected":false},"excerpt":{"rendered":"<p>\u5728\u6211\u5011\u65e5\u76ca\u4e92\u806f\u7684\u4e16\u754c\u4e2d\uff0c\u7db2\u8def\u5b89\u5168\u5a01\u8105\u6301\u7e8c\u70ba\u500b\u4eba\u548c\u7d44\u7e54\u5e36\u4f86\u91cd\u5927\u98a8\u96aa\u3002 \u6700\u8fd1\uff0c\u77e5\u540d\u9060\u7aef\u684c\u9762\u8edf\u9ad4\u4f9b\u61c9\u5546 AnyDesk \u906d\u9047\u4e86\u7db2\u8def\u653b\u64ca\uff0c\u5f15\u8d77\u4e86\u7528\u6236\u7fa4\u7684\u64d4\u6182\u3002 \u672c\u90e8\u843d\u683c\u65e8\u5728\u95e1\u660e\u6b64\u4e8b\u4ef6\uff0c\u6982\u8ff0 AnyDesk \u70ba\u89e3\u6c7a\u8a72\u60c5\u6cc1\u800c\u63a1\u53d6\u7684\u63aa\u65bd\uff0c\u4e26\u5f37\u8abf\u66f4\u65b0\u81f3\u6700\u65b0\u8edf\u9ad4\u7248\u672c\u4ee5\u589e\u5f37\u5b89\u5168\u6027\u7684\u91cd\u8981\u6027\u3002<\/p>","protected":false},"author":10,"featured_media":1798,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png","jetpack-related-posts":[{"id":1700,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-hacked-urgent-password-change-required-to-secure-your-account\/","url_meta":{"origin":1797,"position":0},"title":"AnyDesk Hacked: Urgent Password Change Required to Secure Your Account","author":"Dr. Ken","date":"18 4 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking turn of events, AnyDesk Software GmbH, the German company behind the widely used remote desktop application, has recently confirmed a security breach. The company's production systems were compromised, leading to concerns about user data and privacy. This blog post aims to provide you with an overview\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105229.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1809,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-faces-network-attack-steps-users-can-take-to-ensure-security\/","url_meta":{"origin":1797,"position":1},"title":"AnyDesk Faces Network Attack: Steps Users Can Take to Ensure Security","author":"Randy Yip","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent news, AnyDesk, a popular remote control software used by many individuals in Hong Kong, has been reported to have suffered a network attack. This incident has raised concerns among its users regarding the security of their information. Reports suggest that the program's source code and signing certificates\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1797,"position":2},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1731,"url":"https:\/\/first-unity.com.hk\/zh\/the-growing-security-risks-of-ai-a-race-against-time-for-companies\/","url_meta":{"origin":1797,"position":3},"title":"The Growing Security Risks of AI: A Race Against Time for Companies","author":"Randy Yip","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: Artificial intelligence (AI) has been hailed as a revolutionary technology, promising increased productivity and efficiency across various industries. However, as the rapid growth of generative AI-based software continues, it presents a significant challenge for business technology leaders to keep up with potential cybersecurity risks. In this blog post, we\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1744,"url":"https:\/\/first-unity.com.hk\/zh\/beware-of-the-rising-threat-of-fakeupdates-safeguarding-cybersecurity\/","url_meta":{"origin":1797,"position":4},"title":"Beware of the Rising Threat of FakeUpdates: Safeguarding Cybersecurity","author":"Thomas Leung","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In recent months, Hong Kong has witnessed a surge in the prevalence of a malicious software called \"FakeUpdates\" or \"SocGholish.\" This JavaScript-based download program has affected over 2.44% of local organizations, highlighting the alarming trend of hackers bypassing traditional defenses and deceiving users through simple techniques. In Check Point's\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1771,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-breach-at-hong-kong-tech-park-exposes-sensitive-data\/","url_meta":{"origin":1797,"position":5},"title":"Cybersecurity Breach at Hong Kong Tech Park Exposes Sensitive Data","author":"Dr. Ken","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In a shocking revelation, Hong Kong's prominent technology hub, Cyberport, has announced that it fell victim to a \"malicious intrusion\" in mid-August, resulting in a significant data breach. The breach, which was only disclosed recently, has raised concerns regarding cybersecurity measures and the protection of sensitive information. This incident\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-150342.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1797"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1797"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1797\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1798"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}