Workflow
Nsfocus(300369)
icon
Search documents
绿盟科技(300369) - 2024年度利润分配预案
2025-04-22 11:59
证券代码:300369 证券简称:绿盟科技 公告编号:2025-008 绿盟科技集团股份有限公司 2024 年度利润分配预案 一、2024 年度利润分配预案 经信永中和会计师事务所(特殊普通合伙)的审计,公司 2024 年度实现归属 于上市公司股东的净利润-364,807,400.91 元,母公司 2024 年度实现净利润 -232,110,657.63 元。截至 2024 年 12 月 31 日,母公司报表未分配利润为 480,991,915.60 元,合并报表未分配利润 191,169,555.36 元。 综合考虑公司财务状况、经营发展需要以及利润分配政策,公司董事会拟定 2024 年度利润分配预案为:不派发现金红利,不送红股,不以资本公积金转增股 本。 二、现金分红方案的具体情况 | 项目 | 2024 年度 | 2023 年度 | 2022 年度 | | --- | --- | --- | --- | | 现金分红总额(元) | 0 | 0 | 6,333,073.76 | | 回购注销总额(元) | 8,202,845.60 | 0 | 0 | | 归属于上市公司股东的 净利润(元) | -364, ...
绿盟科技:2024年净亏损3.65亿元
news flash· 2025-04-22 11:57
绿盟科技(300369)公告,2024年营业收入23.58亿元,同比增长40.29%。归属于上市公司股东的净亏 损3.65亿元,去年同期为净亏损9.77亿元。基本每股收益-0.46元/股。公司计划不派发现金红利,不送红 股,不以公积金转增股本。 ...
绿盟科技(300369) - 2024年度内部控制审计报告
2025-04-22 11:55
绿盟科技集团股份有限公司 2024 年度 内控审计报告 内控审计报告 1-2 索引 页码 内部控制审计报告 XYZH/2025TJAA2B0079 绿盟科技集团股份有限公司 绿盟科技集团股份有限公司全体股东: 按照《企业内部控制审计指引》及中国注册会计师执业准则的相关要求,我们审计了 绿盟科技集团股份有限公司(以下简称绿盟科技公司)2024 年 12 月 31 日财务报告内部控 制的有效性。 一、 企业对内部控制的责任 按照《企业内部控制基本规范》、《企业内部控制应用指引》、《企业内部控制评价指引》 的规定,建立健全和有效实施内部控制,并评价其有效性是绿盟科技公司董事会的责任。 二、 注册会计师的责任 我们的责任是在实施审计工作的基础上,对财务报告内部控制的有效性发表审计意 见,并对注意到的非财务报告内部控制的重大缺陷进行披露。 三、 内部控制的固有局限性 内部控制具有固有局限性,存在不能防止和发现错报的可能性。此外,由于情况的变 化可能导致内部控制变得不恰当,或对控制政策和程序遵循的程度降低,根据内部控制审 计结果推测未来内部控制的有效性具有一定风险。 四、 财务报告内部控制审计意见 我们认为,绿盟科技公司 ...
绿盟科技(300369) - 2024年年度审计报告
2025-04-22 11:55
绿盟科技集团股份有限公司 2024 年度 审计报告 | 索引 | | 页码 | | --- | --- | --- | | 审计报告 | | | | 公司财务报表 | | | | — | 合并资产负债表 | 1-2 | | — | 母公司资产负债表 | 3-4 | | — | 合并利润表 | 5 | | — | 母公司利润表 | 6 | | — | 合并现金流量表 | 7 | | — | 母公司现金流量表 | 8 | | — | 合并股东权益变动表 | 9-10 | | — | 母公司股东权益变动表 | 11-12 | | — | 财务报表附注 | 13-132 | 1 审计报告 XYZH/2025TJAA2B0080 绿盟科技集团股份有限公司 绿盟科技集团股份有限公司全体股东: 一、 审计意见 我们审计了绿盟科技集团股份有限公司(以下简称绿盟科技公司)财务报表,包括 2024 年 12 月 31 日的合并及母公司资产负债表,2024 年度的合并及母公司利润表、合并 及母公司现金流量表、合并及母公司股东权益变动表,以及相关财务报表附注。 我们认为,后附的财务报表在所有重大方面按照企业会计准则的规定编制,公允反 ...
绿盟科技(300369) - 2024年度营业收入扣除情况的专项报告
2025-04-22 11:55
绿盟科技集团股份有限公司 2024 年度营业收入扣除情况的 专项说明 | 索引 | 页码 | | --- | --- | | 专项说明 | 1-2 | | 2024 年度营业收入扣除情况表 | 1-2 | XYZH/2025TJAA2B0077 绿盟科技集团股份有限公司 绿盟科技集团股份有限公司全体股东: 我们按照中国注册会计师审计准则审计了绿盟科技集团股份有限公司(以下简称绿盟 科技公司) 2024 年度财务报表,包括 2024 年 12 月 31 日的合并及母公司资产负债表、 2024 年度的合并及母公司利润表、合并及母公司现金流量表、合并及母公司股东权益变动 表,以及相关财务报表附注,并于 2025 年 4 月 22 日出具了 XYZH/2025TJAA2B0080 号无保 留意见的审计报告。 根据《深圳证券交易所创业板上市公司自律监管指南第 1 号—业务办理》(以下简称 营业收入扣除)相关规定,绿盟科技公司编制了后附的绿盟科技集团股份有限公司 2024 年度营业收入扣除情况表(以下简称营业收入扣除情况表)。 关于绿盟科技集团股份有限公司 2024年度营业收入扣除情况的专项说明 按照营业收入扣除的相关规 ...
绿盟科技(300369) - 2024年度非经营性资金占用及其他关联资金往来的专项报告
2025-04-22 11:55
绿盟科技集团股份有限公司 2024 年度 2024 年度非经营性资金占用及其他关联资金往来的专项说明 XYZH/2025TJAA2B0078 绿盟科技集团股份有限公司 绿盟科技集团股份有限公司全体股东: 非经营性资金占用及其他关联资金往来的 专项说明 | 索引 | 页码 | | --- | --- | | 专项说明 | 1-2 | | 非经营性资金占用及其他关联资金往来情况汇总表 | 1-2 | | 信念 中和合分析 工 五 元 城 上 豆 元 城 北 下 街 我 下 在 我 | | --- | | telephone: +86 (010) 6554 2288 8 号富华大厦 A 座 9 层 | | 9/F, Block A, Fu Hua Mansion, ShineWing | | No.8, Chaoyangmen Beidajie, | | Dongcheng District, Beijing, 传真: +86 (010) 6554 7190 | | certified public accountants 100027, P.R.China facsimile: +86 (010) 6554 71 ...
绿盟科技(300369) - 2024 Q4 - 年度财报
2025-04-22 11:55
Financial Performance - The company achieved operating revenue of CNY 2,358,012,914.93, a year-on-year increase of 40.29%[24] - The net profit attributable to shareholders was a loss of CNY 364,807,400.91, a reduction in loss of 62.66% compared to the previous year[24] - The net cash flow from operating activities was CNY 135,912,706.16, an increase of 167.20% year-on-year[24] - The basic earnings per share were CNY -0.46, improving by 62.60% from CNY -1.23 in the previous year[24] - Total assets at the end of 2024 were CNY 4,613,581,963.76, an increase of 11.04% from the end of 2023[24] - The company reported a weighted average return on net assets of -13.72%, an improvement of 16.87% from -30.59% in the previous year[24] - The company reported a net profit of ¥150,109,700 for Q1 2024, a decrease from ¥181,466,000 in Q1 2023[121] - The company’s revenue primarily comes from network security product sales, security service provision, and third-party product sales[81] Market and Industry Trends - The market size of the cybersecurity industry continues to grow, with a broad development prospect in the context of digital China construction[4] - The network security industry is experiencing a slowdown in growth despite a recovery in demand, influenced by increasing security threats and evolving regulations[33] - The government aims for the data security industry to reach a total scale of ¥150 billion by 2025, with a compound annual growth rate of 30%[35] - New regulations and policies are being implemented to enhance the network security legal framework, driving compliance and investment in security infrastructure[37] - The emergence of AI technologies is reshaping the industry, creating new security demands and necessitating proactive governance measures[38] Strategic Focus and Initiatives - The company is focusing on strategic implementation to stabilize and recover its operations amidst industry challenges[4] - The company is focusing on digital transformation and innovation in response to the evolving landscape of the digital economy[34] - The company aims to support digital transformation and contribute to the construction of a digital China[59] - The company’s mission is to ensure smooth business operations for clients by acting as "experts behind giants"[59] - The company is committed to exploring new technologies and fields in security research, particularly in response to the emergence of AI technologies[60] Research and Development - The company has invested $500 million in research and development for new technologies aimed at enhancing user experience and security[55] - The company has established eight laboratories focusing on various security fields, enhancing its competitive edge through continuous innovation[92] - The company has launched innovative products in data security, cloud computing security, and industrial internet security, maintaining its competitive edge in core product areas[102] - The company has made significant investments in data security, focusing on standard formulation, pilot applications, and solution development, achieving a comprehensive ranking of first in the national "Data Security Cup" competition[61] - The company has launched the AI Security Capability Platform, integrating various AI models and tools to enhance sensitive data identification and monitoring capabilities, while also addressing risks associated with AI model applications[63] Customer and Market Expansion - The company has established over 70 branches in China and has international subsidiaries in locations such as Hong Kong, the United States, and the United Kingdom, providing a comprehensive range of cybersecurity products and services globally[43] - The company is actively expanding its global business, particularly in ASEAN, MEA, and LATAM regions, leveraging the "Belt and Road" initiative[107] - Market expansion efforts include entering three new international markets by Q3 2024, targeting a 10% increase in global market share[56] - The company has completed two strategic acquisitions in the last quarter, expected to contribute an additional $200 million in annual revenue[56] Governance and Management - The company has implemented a performance evaluation and incentive mechanism for directors and senior management, linking compensation to company performance[188] - The company maintains independence from major shareholders, with no single shareholder holding more than 30% of the total shares[186] - The company has a comprehensive governance structure in compliance with relevant laws and regulations, ensuring the protection of shareholder interests[185] - The management team has a mix of experience in technology, finance, and legal sectors, contributing to strategic decision-making[199] Risks and Challenges - The company faces risks related to tax incentives, which could negatively impact performance if government policies change[174] - There is a risk of core personnel turnover, which could affect product development and technological leadership[175] - To mitigate personnel risks, the company implements employee stock ownership plans and performance-based incentives to retain key talent[176] Customer Satisfaction and Service - The overall customer satisfaction rate has improved to 90%, reflecting the effectiveness of recent service enhancements and product updates[55] - The company’s security service offerings include comprehensive lifecycle services, with a focus on risk management for financial institutions in response to national regulatory requirements[72] Future Outlook - Future outlook indicates a projected revenue growth of 15% for the next fiscal year, driven by new product launches and market expansion strategies[56] - The company plans to increase its marketing budget by 30% to support the launch of new products and enhance brand visibility in key markets[56] - For 2025, the company plans to pursue stable operations, balance key performance indicators, and enhance cash flow management to support sustainable growth[169]
隐私计算行业产业链全景梳理及区域热力地图
Sou Hu Cai Jing· 2025-04-15 04:11
Core Insights - The privacy computing industry is characterized by a collaborative development across its entire value chain, which includes upstream hardware, midstream technology services, and downstream applications across various sectors such as government, finance, and education [1][2]. Industry Overview - The upstream of the privacy computing industry primarily consists of trusted hardware such as encryption chips and specialized processors, while the midstream includes technology and service providers offering various security protection technologies and application technologies [1]. - The downstream application layer encompasses a wide range of sectors, indicating a broad market potential for privacy computing solutions [1]. Regional Distribution - The distribution of representative companies in the privacy computing industry is relatively dispersed, with Shanghai having a well-established layout across the entire value chain, followed by Beijing, Guangdong, and Zhejiang [2]. Company Performance - Tencent leads in R&D investment within the privacy computing sector, followed closely by Alibaba and Baidu, with significant variations in R&D expenditure as a percentage of revenue among companies [6]. - Notable advancements in privacy computing have been reported by companies such as AsiaInfo, NSFOCUS, and Tuolsi [6]. R&D Investment - AsiaInfo's R&D investment totaled 319 million yuan, accounting for 28.8% of its revenue, while NSFOCUS invested 416 million yuan, representing 32.7% of its revenue [7]. - The R&D efforts of various companies are focused on developing comprehensive solutions in privacy computing, including secure execution environments and integrated systems [7]. Investment Trends - Privacy computing companies are actively investing in sectors such as scientific research, technology services, and financial services to enhance their technological capabilities and expand their market reach [10]. - Recent investments include AsiaInfo's 10 million yuan investment in Tianjin AsiaInfo Security Technology Co., and NSFOCUS's 510 million yuan investment in Nanjing Tuolsi Intelligent Systems Co., among others [11][12].
绿盟科技:2025版Botnet趋势报告
Sou Hu Cai Jing· 2025-04-11 04:35
Group 1 - The core viewpoint of the report is that botnets are increasingly being used as tools in geopolitical conflicts, impacting critical infrastructure and influencing public opinion [16][22][25] - Botnets are evolving into weapons for state-level cyber warfare, with significant DDoS attacks observed during major geopolitical events such as the Russia-Ukraine war and the Israel-Palestine conflict [16][22] - The report highlights that botnets are being utilized by advanced persistent threat (APT) groups and ransomware gangs for intelligence gathering and launching subsequent attacks [17][39] Group 2 - The report indicates that the Mirai botnet family is the most active, with a significant number of command and control (C&C) servers located in the United States [67][68] - The infection methods for botnets include exploiting vulnerabilities in Linux/IoT platforms and using phishing emails for Windows platforms, with the U.S. having the highest number of infected devices [51][58] - The report notes that botnets are increasingly employing advanced evasion techniques to avoid detection, such as using Domain Generation Algorithms (DGA) and DNS over HTTPS (DoH) [2][17] Group 3 - New botnet families are emerging, showcasing unique functionalities and communication patterns, which pose increasing threats to cybersecurity [3][67] - Active botnet groups like Hail and KekSec are frequently launching attacks, while new groups like Bigpanzi are also contributing to the evolving threat landscape [4][3] - The report predicts that botnets will be used more efficiently by APT and ransomware groups for profit-driven activities, with enhanced stealth in their propagation methods [4][16]
Botnet趋势报告(2025版)
Lv Meng Ke Ji· 2025-04-10 01:55
Investment Rating - The report does not explicitly state an investment rating for the industry or specific companies. Core Insights - The report highlights the increasing significance of botnets as tools for geopolitical conflict, particularly in the context of recent global events such as the Russia-Ukraine war and the Israel-Palestine conflict, where botnets have been used for DDoS attacks against critical infrastructure [14][18]. - The report indicates that the threat landscape posed by botnets is escalating, with a notable increase in the number of command and control (C&C) servers and attack activities, particularly targeting domestic critical infrastructure [14][15]. - Botnets are increasingly being utilized as a launchpad for advanced persistent threats (APTs) and ransomware groups, enhancing their operational efficiency by gathering intelligence and facilitating subsequent attacks [15][43]. Summary by Sections Executive Summary - In 2024, the global landscape is marked by turmoil and challenges, with the cyber domain becoming a battleground for major powers, where botnets play a crucial role in state-sponsored cyber operations [14]. - Botnets have been observed to execute high-intensity DDoS attacks against critical infrastructure, manipulate public opinion, and express political stances during significant geopolitical events [14][15]. Botnet Development Trends - Botnets have evolved into essential tools for state-level cyber warfare, with their operational capabilities being leveraged for both offensive and defensive strategies in the digital realm [18]. - The report notes that the Mirai botnet family remains the most active, with the Mozi malware continuing to spread at high levels, primarily exploiting vulnerabilities in Linux/IoT platforms [14][15]. Botnet Vulnerability and Propagation - The report identifies that Linux/IoT botnets primarily exploit outdated vulnerabilities and weak passwords for propagation, while Windows platforms are more susceptible to phishing and social engineering tactics [59][67]. - The geographical distribution of infected devices shows that the United States has the highest number of infected endpoints, followed by India, Russia, and Brazil [70][71]. Botnet Attack Activity Analysis - The Mirai botnet family is responsible for the majority of attack commands issued, with a significant spike in activity noted in September 2024 [80]. - China is reported to be the most targeted country for DDoS attacks, accounting for 34% of all recorded incidents, necessitating enhanced protection for critical infrastructure [80].