Workflow
网络安全
icon
Search documents
国芯科技涨2.01%,成交额2.24亿元,主力资金净流入393.99万元
Xin Lang Cai Jing· 2025-09-22 05:52
Group 1 - The core viewpoint of the news highlights the recent stock performance and financial metrics of Guoxin Technology, indicating a positive trend in stock price with a year-to-date increase of 11.70% and a recent trading volume of 2.24 billion yuan [1] - As of June 30, Guoxin Technology's revenue for the first half of 2025 was 171 million yuan, reflecting a year-on-year decrease of 34.74%, while the net profit attributable to the parent company was -86.41 million yuan, a decrease of 4.66% [2] - The company has a diverse revenue structure, with 42.19% from self-developed chips and modules, 28.54% from chip customization services, and smaller contributions from IP licensing and other services [2] Group 2 - Guoxin Technology has a total market capitalization of 10.396 billion yuan and a trading turnover rate of 2.18% [1] - The company has seen a net inflow of main funds amounting to 3.94 million yuan, with significant buying and selling activities from large orders [1] - Since its A-share listing, Guoxin Technology has distributed a total of 120 million yuan in dividends, with 59.99 million yuan distributed over the past three years [3]
技术赋能,共筑网络安全防线
Ren Min Ri Bao· 2025-09-22 04:30
Group 1 - The event showcased advancements in network security technology, emphasizing the shift from passive defense to intelligent perception and proactive protection [2] - A variety of new technologies and applications were presented to enhance network security, addressing real-life needs and concerns of the public [2] - The exhibition featured interactive experiences, allowing attendees to engage with AI-driven security solutions and learn about their practical applications [3] Group 2 - The "gPass" framework by Ant Group integrates various biometric technologies to ensure secure authentication and enhance user experience with smart glasses [3] - The event highlighted the importance of public awareness in network security, with initiatives aimed at making security education more relatable to everyday life [3] - Companies like China Telecom and Qihoo 360 demonstrated innovative solutions for drone detection and AI model security, showcasing the integration of AI in safeguarding information [2][3]
纳思达涨2.03%,成交额9958.66万元,主力资金净流出388.93万元
Xin Lang Cai Jing· 2025-09-22 02:30
Core Viewpoint - Nastech's stock price has shown volatility, with a year-to-date decline of 18.07% and a recent increase of 2.53% over the last five trading days, indicating potential market fluctuations and investor sentiment changes [1][2]. Company Overview - Nastech, established on November 27, 1991, and listed on November 13, 2007, is based in Zhuhai, Guangdong Province. The company specializes in integrated circuit research, production, and sales, as well as the production and sales of printing consumables and laser printers [1]. - The main revenue sources for Nastech include original printers and consumables (74.46%), general consumables and accessories (19.90%), other products (2.98%), and chips (2.66%) [1]. Financial Performance - As of June 30, 2025, Nastech reported a revenue of 12.327 billion yuan, reflecting a year-on-year decrease of 3.65%. The net profit attributable to shareholders was -312 million yuan, a significant decline of 132.02% compared to the previous period [2]. - Cumulative cash dividends since the A-share listing amount to 903 million yuan, with 169 million yuan distributed over the past three years [3]. Shareholder Structure - As of June 30, 2025, the number of shareholders increased to 60,700, with an average of 22,502 circulating shares per person, a slight decrease of 0.52% [2]. - The top ten circulating shareholders include Hong Kong Central Clearing Limited, which holds 27.7851 million shares, and E Fund Quality Momentum Three-Year Holding Mixed A, holding 22.4106 million shares, both showing increases in their holdings [3].
心智观察所:美国网络安全智库的“反华合唱团”
Guan Cha Zhe Wang· 2025-09-22 01:58
Core Viewpoint - The article discusses the increasing scrutiny and criticism of Chinese cybersecurity companies by U.S. experts and institutions, particularly focusing on the actions of Dakota Cary and the implications for the cybersecurity industry. Group 1: Criticism of Chinese Cybersecurity Companies - Dakota Cary, a prominent figure in U.S. cybersecurity, has accused several Chinese companies, including Alibaba and Baidu, of being "weapons suppliers" for state-sponsored hacking, distorting the nature of penetration testing services [1][3][6] - Cary's claims are seen as part of a broader strategy to isolate Chinese cybersecurity firms from international collaborations, particularly the Microsoft Active Protections Program (MAPP) [6][7] - Following Cary's accusations, Microsoft announced restrictions on Chinese companies' access to vulnerability information, which was celebrated by Cary as a victory [7][8] Group 2: Historical Context and Evolution - The article traces the origins of U.S. criticism of Chinese cybersecurity back to a 2012 congressional hearing where Richard Bejtlich accused the Chinese government of extensive cyber espionage [9][13] - This hearing marked the beginning of a decade-long focus on China as a primary adversary in cyberspace, leading to a series of reports and accusations against Chinese firms [13][14] - The narrative has evolved, with newer figures like Cary taking the lead in shaping public perception and policy against Chinese cybersecurity entities [17][20] Group 3: The Role of U.S. Cybersecurity Firms - U.S. cybersecurity firms, such as SentinelOne, have benefited from the political climate by increasing government contracts, with SentinelOne's government orders rising from 12% in 2021 to 37% by 2025 [32][33] - The article highlights a pattern where U.S. cybersecurity companies publish reports that criticize Chinese firms, which in turn helps them secure government contracts and funding [32][34] - The rise of companies like CrowdStrike and SentinelOne is linked to their ability to align with U.S. government interests and narratives against China [33][34] Group 4: Response from Chinese Cybersecurity Firms - In response to the accusations, Chinese cybersecurity companies have begun to publish their own reports exposing U.S. cyber activities, aiming to counter the narrative and assert their capabilities [36][37] - Reports from firms like Qihoo 360 and Antiy have detailed U.S. cyber attacks, marking a shift towards a more aggressive defense strategy against U.S. claims [35][36] - The article notes that these responses are part of a broader struggle for legitimacy and recognition in the global cybersecurity landscape [34][38] Group 5: Future Implications - The ongoing conflict between U.S. and Chinese cybersecurity firms reflects a larger geopolitical struggle, with implications for international cybersecurity cooperation and competition [48][49] - The article suggests that the U.S. is conducting a comprehensive assessment of China's cybersecurity capabilities, which may signal preparations for future cyber confrontations [48][49] - The narrative constructed by U.S. experts may influence policy decisions and funding allocations within the U.S. government, further entrenching the divide between the two nations in the cybersecurity domain [57][58]
美国网络安全智库的“反华合唱团”
Guan Cha Zhe Wang· 2025-09-22 01:38
【文/观察者网专栏作者 心智观察所】 一、"微脱钩"的吹鼓手 2025年7月26日,美国社交媒体X上,认证为"中国网络安全问题专家"的达科塔·卡里(Dakota Cary)突 然开启了"猎巫"行动。他点名了十家互联网和网络安全企业,阿里巴巴、百度、安天、安恒、绿盟等都 在其中。他列举了这些企业的公开资料中安全服务品类中有渗透测试服务的截图,并用红框标注:这些 企业伪装成守护者,实为国家级黑客的"武器供应商"。 渗透测试服务是网络安全行业常见的服务品类,是网络安全公司为协助客户发现安全缺陷的一项基础服 务。这一服务模式本来就是美国网络安全企业所创造的,全球主要网络安全企业,包括美国主流安全企 业都提供该项服务,只是在称呼上,部分美国企业称之为"红队"(Red Team)服务而已。 卡里的真实意图,意在将中国网络安全企业从一项微软漏洞分享体系MAPP中剥离。MAPP(Microsoft Active Protections Program微软主动防护计划)是一个由微软安全响应中心(MSRC)发起的全球性安全 合作项目,旨在通过提前向认证安全厂商共享漏洞信息,缩短漏洞修复的防护窗口期,提升整体网络安 全防御能力。微 ...
华为全联接大会总结
2025-09-22 00:59
Summary of Huawei's Full Connection Conference Industry and Company Overview - The conference focused on Huawei's advancements in AI infrastructure, particularly through the launch of the Lingxi Interactive Interconnection Protocol and three major super node products: Atlas 950, Atlas 960, and TaiShan 950 [1][2][3] Key Points and Arguments AI Infrastructure Developments - Huawei aims to build a comprehensive computing foundation to meet market demands for super nodes and consulting computing solutions, indicating a significant leap in AI computing capabilities [1][2] - The Atlas 950 and 960 super nodes are set to launch in Q4 2026 and Q4 2027, respectively, with a notable increase in computing power and interconnect bandwidth reaching up to 34PB per second [1][4] AI Chip Roadmap - The Ascend 950PR/G7 chip is scheduled for release in 2026, with plans for the Ascend 970 chip in 2028, showcasing Huawei's commitment to technological independence in AI chip development [1][5][8] - The Ascend 950PR chip will focus on pre-training tasks, while the Ascend 950G7 will support more complex operations, indicating a strategic shift in chip capabilities [5][8] Ecosystem Expansion - Huawei is opening its super node technology, including the Lingxi protocol and reference architecture, to foster collaboration with ecosystem partners, aiming to reshape the AI infrastructure market [1][7] - The launch of the HarmonyOS 5 and the investment of 1 billion in the Tian Gong plan to support the Harmony AI ecosystem are expected to attract more developers and enhance AI application innovation [3][11][13] Cybersecurity Solutions - The introduction of the Xinghe AI cybersecurity solution aims to unify network and security management, addressing new threats faced by branches, campuses, and data centers [1][10] Additional Important Content - The Atlas 950 super node will consist of 160 cabinets, achieving 800 million FLOPS (FB8) and 1.6 billion FLOPS (FB4), while the Atlas 960 will have 220 cabinets with 3.4 billion FLOPS (LLP8) and 6 billion FLOPS (LLB4) [4] - HarmonyOS 5 has been integrated into over 17 million devices, with 33,000 applications and services available, indicating a growing ecosystem [12] - The AI capabilities of the HarmonyOS, particularly through the voice assistant Xiaoyi, are being positioned as a central feature in various applications, enhancing user interaction and device connectivity [11][12]
守护你我向“网”的生活
Xin Hua Wang· 2025-09-22 00:31
"黑科技"打造安全"金钟罩"—— AI鉴伪、智能反诈……今年的网络安全博览会暨网络安全产品和服务国际推介会上,一款款网络 安全"黑科技"竞相亮相,为观众呈现了一场精彩纷呈的网络安全科技盛宴。 原标题:守护你我向"网"的生活——2025年国家网络安全宣传周观察 新华社北京9月21日电 题:守护你我向"网"的生活——2025年国家网络安全宣传周观察 新华社记者丁怡全、王思北、王贤思 9月15日至21日,以"网络安全为人民,网络安全靠人民——以高水平安全守护高质量发展"为主题 的2025年国家网络安全宣传周在全国范围内统一开展。 开幕式、网络安全技术高峰论坛主论坛及分论坛智慧激荡,网络安全博览会暨网络安全产品和服务 国际推介会以及主题日等活动各具特色,今年网络安全宣传周通过群众通俗易懂、喜闻乐见的方式,宣 传网络安全理念、普及网络安全知识、推广网络安全技能,有力推动全社会网络安全意识和防护技能提 升。 "科技进步日新月异,网络安全风险也在不断演变。"博览会现场,体验了"AI换脸"、声音克隆及数 字人生成等技术的昆明市民李皓说,通过体验活动学到了不少网络安全知识,也感到这些前沿技术为人 们的生活筑起了一道"数字防线" ...
筑牢网络安全屏障 共建清朗网络空间——2025年河南省网络安全宣传周活动掠影
He Nan Ri Bao· 2025-09-21 23:42
网络安全为人民,网络安全靠人民。9月15日至21日,2025年国家网络安全宣传周河南省活动在全省各 地同步启动,通过线上线下相结合的方式,深入宣传贯彻习近平总书记关于网络强国的重要思想,普及 网络安全知识,推广防护技能,凝聚社会共识,共同绘就网络安全的"同心圆",营造了人人参与、人人 有责、人人共享的浓厚氛围。 "电信日"当天,洛阳市涧西区武汉路社区邻里中心现场模拟"假冒客服"诈骗场景。刚接到"退款电话"的 张大爷,立刻向志愿者求证:"你们昨天教过,这种电话要先挂断、再找官方核实!"周围群众纷纷称赞 老人学得快、用得准。 随着"法治日""金融日""青少年日""个人信息保护日"等主题活动的接连开展,全省各地通过专家讲座、 实景演练、现场咨询、短视频推广等形式,把网络安全知识送进校园、机关、社区、家庭。 多元共建 夯实网络安全基石 多方联动 共筑网络安全屏障 "陌生链接不乱点,网络谣言不轻信,密码设置不单一,社交分享需谨慎……" 9月15日,2025年国家网络安全宣传周河南省活动在商丘正式启动,活动现场,由河南日报社与商丘工 学院联合创演的微短剧《告白安全码》,从日常场景切入,以轻松剧情揭露AI换脸、过度收集个人 ...
大港街道开展网络安全宣传活动
Zhen Jiang Ri Bao· 2025-09-21 23:40
活动开始后,各参与单位分工协作,积极投入现场服务。在科普宣传区,辖区民警与网络安全讲师 围绕中秋期间可能多发的诈骗类型,简要介绍了包括假冒电商、虚假红包和中奖诈骗等常见手法,并向 居民发放防诈手册,有效增强大家的防范意识。趣味互动区开展的"安全猜谜赢好礼"活动吸引了大量居 民踊跃参与,大家通过一道道贴近生活的网络安全题目,在趣味竞答中加深了对相关知识的理解和记 忆。实践体验区的肆阅居家养老服务中心工作人员则为居民提供家庭安全义诊服务,免费为居民测量血 压、开展义剪服务,传递社区的温暖与关怀。(杨蕾 记者 张琼霞) 近日,经开区大港街道新时代文明实践所联合银山社区、振港社区及肆阅居家养老服务中心等单 位,在紫荆苑中心公园文化长廊举办"月满中秋,安全'网'伴——共建无诈平安社区"主题宣传活动。 ...
技术赋能,共筑网络安全防线 ——2025年国家网络安全宣传周网络安全博览会侧记
Ren Min Ri Bao· 2025-09-21 22:00
Group 1 - The event showcased advancements in network security technology, emphasizing a shift from passive defense to intelligent perception and proactive protection [3] - New technologies such as AI algorithms and cloud collaboration were highlighted, particularly in the context of drone detection and control systems [3] - The integration of biometric technologies for secure authentication was demonstrated, with a focus on enhancing user experience through seamless interactions [4] Group 2 - The event featured various interactive experiences aimed at raising public awareness about network security, making it more relatable to everyday life [4] - Companies presented innovative solutions to address real-life security needs, reinforcing the importance of network security for the public [3][4] - The exhibition included demonstrations of AI-based security products and solutions, showcasing the application of AI in safeguarding information security [3]