Workflow
网络安全
icon
Search documents
国安部发文提示:境外生产芯片可能故意留“后门” 摄像头被远程开启
news flash· 2025-07-20 23:07
Group 1 - The importance of cybersecurity is increasingly highlighted in the digital age, affecting personal privacy, corporate secrets, and national security [1] - Technical backdoors, which are methods to bypass normal security checks, can pose significant security risks if exploited by malicious attackers [2] - Malicious backdoors can be pre-installed in devices during manufacturing, allowing remote control and unauthorized data collection [2] Group 2 - Security of smart devices and information systems is crucial for both individuals and national security, necessitating heightened awareness and preventive measures [3] - Organizations in sensitive positions are encouraged to use domestically controlled chips and operating systems to mitigate risks from foreign software and hardware backdoors [3] - Citizens and organizations are urged to cooperate with national security agencies in reporting suspicious activities related to cyber espionage [3]
“AI换脸”可以绕过人脸识别防线?
Yang Shi Wang· 2025-07-19 16:48
Core Viewpoint - The case highlights the vulnerabilities in facial recognition systems due to advancements in AI technology, specifically the use of AI face-swapping software to commit fraud [1][2][4]. Group 1: Incident Overview - A defendant named Fu illegally obtained over 1.95 million pieces of personal information and used AI face-swapping software to access the payment accounts of 23 victims [2][4]. - Fu managed to change the payment passwords and bind phone numbers of 5 victims, and fraudulently used one victim's bank card to purchase two mobile phones totaling 15,996 RMB [2][4]. Group 2: Legal Consequences - The court sentenced Fu to 4 years and 6 months in prison for multiple crimes, including violating personal information laws and credit card fraud, and ordered him to pay 15,996 RMB in damages [6]. - The case prompted the prosecution to issue a legal risk warning regarding the vulnerabilities in the financial platform used in the fraud, which has since undergone rectification [6]. Group 3: Security Implications - Experts express concerns about the security of facial recognition systems, noting that no network is completely secure and that each update may introduce new vulnerabilities [7]. - There is a consensus that while vulnerabilities are inevitable, advancements in technology can help mitigate risks associated with facial recognition attacks [8]. Group 4: Recommendations for Improvement - It is suggested that organizations using facial recognition technology should implement stricter security measures and enhance their anti-fraud capabilities [11]. - Individuals are encouraged to be more vigilant about protecting their personal information to prevent unauthorized access [11].
强烈不满!中方坚决反对
中国基金报· 2025-07-19 16:09
我们注意到7月19日新加坡《海峡时报》《联合早报》、亚洲新闻台等媒体在报道新加坡受到 某网络攻击组织UNC3886攻击时,引用某国网络安全公司所谓信息,声称该组织与中国有 关。中方对此表示强烈不满,我们坚决反对任何针对中国的无端抹黑。事实上,中国是网络 攻击的主要受害国之一。我愿在此重申:中方坚决反对并依法打击任何形式的网络攻击,不 会鼓励、支持或纵容黑客攻击行为。网络安全是全球性挑战。中国愿继续同包括新加坡在内 的各方开展合作,共同维护网络空间安全。 来源:中国驻新加坡大使馆 中国驻新加坡大使馆发言人就新有关媒体将网络攻击事件与中国相联系发表谈话 ...
新加坡媒体将网络攻击事件与中国联系 我使馆:强烈不满
news flash· 2025-07-19 05:38
智通财经7月19日电,中国驻新加坡大使馆发言人就新有关媒体将网络攻击事件与中国相联系发表谈话 称,我们注意到7月19日新加坡《海峡时报》《联合早报》、亚洲新闻台等媒体在报道新加坡受到某网 络攻击组织UNC3886攻击时,引用某国网络安全公司所谓信息,声称该组织与中国有关。中方对此表 示强烈不满,我们坚决反对任何针对中国的无端抹黑。事实上,中国是网络攻击的主要受害国之一。我 愿在此重申:中方坚决反对并依法打击任何形式的网络攻击,不会鼓励、支持或纵容黑客攻击行为。网 络安全是全球性挑战。中国愿继续同包括新加坡在内的各方开展合作,共同维护网络空间安全。 新加坡媒体将网络攻击事件与中国联系 我使馆:强烈不满 ...
远望谷与西电携手:深耕AI研发,筑牢技术壁垒
Quan Jing Wang· 2025-07-19 02:12
在科技飞速发展的当下,企业的核心竞争力越来越依赖于技术研发。远望谷(002161.SZ)深知这一 点,近日与西安电子科技大学共建西电-远望谷深维智能实验室,持续加码AI领域投入,致力于增强企 业核心竞争力。 根据合作协议,西电-远望谷深维智能实验室将物联网、人工智能、网络安全作为工作重点,双方围绕 这些方向展开联合攻关与合作,共同研发相关技术、产品、系统等。合作期限为十年,远望谷将通过在 算法、算力、人才等方面与西安电子科技大学的深度合作,保持公司在物联网、人工智能、网络安全方 面的技术领先性。 此次合作结合了远望谷在信息技术、RFID等领域的技术优势、制造优势、市场优势以及西安电子科技 大学的研发优势,有望实现远望谷业务场景与西安电子科技大学科研技术的精准匹配和深度融合。远望 谷将充分通过"深维智能实验室"开展在主营业务市场垂直应用大模型的研究和训练,这对于公司在AI领 域的技术突破和应用落地具有重要意义。 通过与高校的"双向奔赴",远望谷能够借助高校的科研实力和人才资源,加速AI技术的研发和创新,不 断筑牢技术壁垒,为公司的长远发展提供强大的技术支撑,在激烈的市场竞争中占据有利地位。 远望谷是国内物联网产 ...
INE Security Alert: Critical Cisco ISE Vulnerabilities Demand Immediate Attention
GlobeNewswire News Room· 2025-07-18 14:51
Core Insights - INE has responded to Cisco's urgent security advisory regarding three critical vulnerabilities in Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that pose an extreme threat to enterprise network security [1][6] Vulnerabilities Overview - The vulnerabilities are tracked as CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337, each assigned a maximum CVSS score of 10.0, indicating the highest severity [2] - These flaws allow unauthenticated remote attackers to execute arbitrary commands with root privileges on affected systems [2][5] Expert Analysis - The vulnerabilities represent a cybersecurity nightmare scenario, with maximum exploitability and zero authentication requirements, effectively acting as a master key for attackers [3] - Compromising ISE could allow attackers to control access throughout the entire network, highlighting the importance of comprehensive network security training [3][9] Technical Details and Impact - CVE-2025-20281 and CVE-2025-20337 affect ISE and ISE-PIC releases 3.3 and 3.4, while CVE-2025-20282 affects only ISE and ISE-PIC release 3.4 [5] - Successful exploitation grants attackers complete root-level access, the ability to execute arbitrary commands, and access to sensitive identity and authentication data [5] Industry Impact and Response - The vulnerabilities were discovered through responsible disclosure by security researchers, and Cisco's PSIRT reports no evidence of active exploitation at this time [6][7] - Security experts anticipate these flaws will become high-priority targets for threat actors due to the critical nature of ISE in enterprise security [7] INE's Commitment to Cybersecurity Education - INE emphasizes the importance of comprehensive IT training and incident response preparedness for cybersecurity teams in light of these vulnerabilities [8][9] - Continuous education in vulnerability management and incident response is deemed business-critical for organizations [9] Recommendations for Organizations - Organizations are advised to inventory all Cisco ISE and ISE-PIC installations, prioritize patching, monitor networks for unusual activity, review access controls, and ensure incident response teams are prepared [11]
网宿安全发布《2024年度网络安全态势报告》
Yang Guang Wang· 2025-07-18 07:37
Core Insights - The report emphasizes the urgent need for enterprises to adopt an "AI-driven systematic proactive security" approach to address the increasing risks associated with digital transformation and asset exposure [1][6] Group 1: Cybersecurity Landscape - In 2024, the risk of asset exposure has surged dramatically, with global CVE vulnerabilities exceeding 40,000 for the first time, and high-risk vulnerabilities accounting for 67.98% [3] - The report highlights a significant increase in attacks targeting domestic software vulnerabilities, particularly in collaborative office, content management, and enterprise resource planning systems [3] - The number of T-level DDoS attacks reached 219, marking a tenfold increase year-on-year, with 60% of web attacks focusing on API interfaces [4] Group 2: AI-Driven Threats - The report identifies that AI applications have seen a 36% year-on-year increase in CVE vulnerabilities, with 250 new vulnerabilities reported in 2024 [3][6] - Prompt injection attacks have evolved from leaking sensitive information to high-risk behaviors that exploit system permissions, underscoring the need for robust defense mechanisms for large models [3] Group 3: Defensive Strategies - The report advocates for a three-pronged dynamic defense architecture comprising exposure surface convergence, depth defense, and intelligent operations [6] - It suggests utilizing Managed Security Services (MSS) for dynamic risk governance and employing cutting-edge frameworks like WAAP and SASE for comprehensive threat detection and defense [6] - The report proposes a partitioned defense strategy for large model applications, emphasizing cloud-native security technologies and zero-trust mechanisms for dynamic control [6] Group 4: Case Studies and Implementation - Successful case studies were presented, demonstrating the effectiveness of the proposed security framework, such as intercepting 99% of abnormal order traffic for a toy mall and reducing incident response time for state-owned enterprises from 8 hours to 10 minutes [7] - The company aims to continuously iterate on its proactive security capabilities to support the stable development of the digital ecosystem [9]
网络安全赋千企 护航成都智造升级
Sou Hu Cai Jing· 2025-07-18 02:36
Group 1 - The event "Cybersecurity Empowering Thousands of Enterprises" focused on addressing pain points in network and data security within the industrial internet sector [1] - Companies such as Qin Chuan IoT, China Electronics Ninth Design Institute, and Xingyun Zhili participated alongside security service providers like Unicom (Sichuan) and Sichuan Aocheng Technology to enhance communication through policy interpretation and case sharing [1] - The invited security firms discussed key areas including industrial control system protection, industrial cloud platform security, critical data leakage prevention, ransomware response, and supply chain security, providing practical references for enterprises [1] Group 2 - The interactive session allowed representatives from industrial internet platforms and application service providers to address security needs directly, facilitating in-depth discussions to uncover cooperation potential [2] - The Chengdu Economic and Information Bureau plans to continue the "Cybersecurity Empowering Thousands of Enterprises" series, focusing on enhancing corporate security awareness and providing tailored products and services based on local cybersecurity industry strengths [2] - The initiative aims to support high-quality development in Chengdu through high-level security guarantees by accurately identifying enterprises' genuine needs and pain points [2]
海南全力营造清朗有序网络空间
Hai Nan Ri Bao· 2025-07-18 01:06
Core Viewpoint - The Hainan provincial government is actively enhancing internet law enforcement to create a clear and orderly online environment, focusing on key areas such as content safety, operational security, data security, and personal information protection [2][5]. Group 1: Law Enforcement Actions - Hainan's internet information office has implemented various enforcement measures including administrative fines, account handling, and website closures to address illegal online activities, resulting in the removal of over 13,600 pieces of illegal content and 32,000 accounts [2][4]. - Specific penalties were imposed on companies for violations, including a fine of 10,000 yuan for unauthorized news publication, 400,000 yuan for failing to manage user-generated content, and 200,000 yuan for disseminating illegal information in a youth mode [3][4]. Group 2: Regulatory Framework - The provincial government has emphasized the importance of legal compliance in internet operations, issuing guidelines for personal information protection in commercial sectors and conducting inspections on mobile applications that improperly collect user data [4][5]. - The enforcement actions are part of a broader initiative to ensure that internet enterprises fulfill their responsibilities regarding network security and data protection, aligning with national laws such as the Cybersecurity Law and the Data Security Law [4][5]. Group 3: Future Directions - The provincial government aims to strengthen internet law enforcement and supervision to maintain a safe online space, which is crucial for the development of Hainan as a free trade port with global influence [5]. - The internet information office will continue to address various online issues and ensure compliance among internet enterprises to protect the rights and interests of the public [5].
未履行网络安全义务致购票系统数据泄露,一科技公司被处罚
Nan Fang Du Shi Bao· 2025-07-17 15:24
Group 1 - A technology company in Chengdu was penalized for failing to implement necessary cybersecurity measures, leading to data leakage that was exploited for illegal activities [1] - The company, as the developer and operator of the involved information system, did not fulfill its legal obligations under the Cybersecurity Law, specifically regarding the implementation of a cybersecurity protection system [1] - The Cybersecurity Law mandates that network operators must adhere to security protection obligations to prevent data leakage or unauthorized access [1] Group 2 - In March, a unit in Qinghai was penalized for not fulfilling cybersecurity protection obligations, which included vulnerabilities that could lead to personal information leaks [2] - In September, a company in Jiangxi was fined for failing to establish cybersecurity management protocols and allowing illegal content to be embedded in its system [2] - A company in Anhui faced penalties for not taking necessary technical measures to prevent data breaches, resulting in sensitive data leakage [2]