网络安全
Search documents
企业服务器软件遭攻击,微软发布安全更新
news flash· 2025-07-21 03:29
Core Points - Microsoft’s enterprise server software is under attack by unidentified hackers targeting SharePoint servers [1] - On July 20, Microsoft detected active attacks against SharePoint server customers [1] - A security update was released on July 21 to protect customers using SharePoint subscription and SharePoint 2019 from the attack [1] - The U.S. Cybersecurity and Infrastructure Security Agency acknowledged the vulnerability, which allows hackers to access file systems and internal configurations [1]
警惕“电子间谍”!境外生产芯片可能故意留“后门”,摄像头被远程开启
财联社· 2025-07-20 23:41
Group 1 - The importance of cybersecurity is increasingly prominent in today's highly digitalized era, affecting personal privacy, corporate secrets, and even national security [1] - There is a warning about malicious designs or implanted backdoors that could lead to data leaks [1] - The National Security Department has disclosed potential "invisible eavesdropping channels" that may be present around individuals [1]
警惕“电子间谍”!境外生产芯片可能故意留“后门” 摄像头被远程开启
news flash· 2025-07-20 23:07
Core Viewpoint - The importance of cybersecurity is increasingly highlighted in today's highly digitalized era, affecting personal privacy, corporate secrets, and even national security [1] Group 1 - Cybersecurity is crucial for protecting personal privacy and corporate secrets [1] - Maliciously designed technologies or implanted backdoors pose significant risks of data leaks [1] - The current digital landscape necessitates heightened vigilance regarding cybersecurity threats [1]
国安部发文提示:境外生产芯片可能故意留“后门” 摄像头被远程开启
news flash· 2025-07-20 23:07
Group 1 - The importance of cybersecurity is increasingly highlighted in the digital age, affecting personal privacy, corporate secrets, and national security [1] - Technical backdoors, which are methods to bypass normal security checks, can pose significant security risks if exploited by malicious attackers [2] - Malicious backdoors can be pre-installed in devices during manufacturing, allowing remote control and unauthorized data collection [2] Group 2 - Security of smart devices and information systems is crucial for both individuals and national security, necessitating heightened awareness and preventive measures [3] - Organizations in sensitive positions are encouraged to use domestically controlled chips and operating systems to mitigate risks from foreign software and hardware backdoors [3] - Citizens and organizations are urged to cooperate with national security agencies in reporting suspicious activities related to cyber espionage [3]
“AI换脸”可以绕过人脸识别防线?
Yang Shi Wang· 2025-07-19 16:48
Core Viewpoint - The case highlights the vulnerabilities in facial recognition systems due to advancements in AI technology, specifically the use of AI face-swapping software to commit fraud [1][2][4]. Group 1: Incident Overview - A defendant named Fu illegally obtained over 1.95 million pieces of personal information and used AI face-swapping software to access the payment accounts of 23 victims [2][4]. - Fu managed to change the payment passwords and bind phone numbers of 5 victims, and fraudulently used one victim's bank card to purchase two mobile phones totaling 15,996 RMB [2][4]. Group 2: Legal Consequences - The court sentenced Fu to 4 years and 6 months in prison for multiple crimes, including violating personal information laws and credit card fraud, and ordered him to pay 15,996 RMB in damages [6]. - The case prompted the prosecution to issue a legal risk warning regarding the vulnerabilities in the financial platform used in the fraud, which has since undergone rectification [6]. Group 3: Security Implications - Experts express concerns about the security of facial recognition systems, noting that no network is completely secure and that each update may introduce new vulnerabilities [7]. - There is a consensus that while vulnerabilities are inevitable, advancements in technology can help mitigate risks associated with facial recognition attacks [8]. Group 4: Recommendations for Improvement - It is suggested that organizations using facial recognition technology should implement stricter security measures and enhance their anti-fraud capabilities [11]. - Individuals are encouraged to be more vigilant about protecting their personal information to prevent unauthorized access [11].
强烈不满!中方坚决反对
中国基金报· 2025-07-19 16:09
我们注意到7月19日新加坡《海峡时报》《联合早报》、亚洲新闻台等媒体在报道新加坡受到 某网络攻击组织UNC3886攻击时,引用某国网络安全公司所谓信息,声称该组织与中国有 关。中方对此表示强烈不满,我们坚决反对任何针对中国的无端抹黑。事实上,中国是网络 攻击的主要受害国之一。我愿在此重申:中方坚决反对并依法打击任何形式的网络攻击,不 会鼓励、支持或纵容黑客攻击行为。网络安全是全球性挑战。中国愿继续同包括新加坡在内 的各方开展合作,共同维护网络空间安全。 来源:中国驻新加坡大使馆 中国驻新加坡大使馆发言人就新有关媒体将网络攻击事件与中国相联系发表谈话 ...
新加坡媒体将网络攻击事件与中国联系 我使馆:强烈不满
news flash· 2025-07-19 05:38
智通财经7月19日电,中国驻新加坡大使馆发言人就新有关媒体将网络攻击事件与中国相联系发表谈话 称,我们注意到7月19日新加坡《海峡时报》《联合早报》、亚洲新闻台等媒体在报道新加坡受到某网 络攻击组织UNC3886攻击时,引用某国网络安全公司所谓信息,声称该组织与中国有关。中方对此表 示强烈不满,我们坚决反对任何针对中国的无端抹黑。事实上,中国是网络攻击的主要受害国之一。我 愿在此重申:中方坚决反对并依法打击任何形式的网络攻击,不会鼓励、支持或纵容黑客攻击行为。网 络安全是全球性挑战。中国愿继续同包括新加坡在内的各方开展合作,共同维护网络空间安全。 新加坡媒体将网络攻击事件与中国联系 我使馆:强烈不满 ...
远望谷与西电携手:深耕AI研发,筑牢技术壁垒
Quan Jing Wang· 2025-07-19 02:12
Core Insights - The core viewpoint of the articles emphasizes the importance of technological research and development as a key competitive advantage for companies in the rapidly evolving tech landscape, with Yuanwanggu (002161.SZ) partnering with Xi'an University of Electronic Science and Technology to enhance its capabilities in AI [1][2] Company Overview - Yuanwanggu is a leading player in the domestic IoT industry and the first publicly listed company in China specializing in RFID solutions, showcasing significant technological expertise in this field [1] - As of the end of 2024, the company has accumulated over 600 authorized patents and proprietary technologies, including 85 invention patents, 279 utility model patents, and 101 design patents [1] - The company has been recognized as a champion product in Guangdong's manufacturing sector for two consecutive years and received the national "Eighth Batch of Manufacturing Single Champion Enterprises" award in 2024, highlighting its strong industrialization of core technologies [1] Collaboration Details - The collaboration agreement establishes the Xi'an University of Electronic Science and Technology-Yuanwanggu Deep Dimension Intelligent Laboratory, focusing on IoT, AI, and cybersecurity as key areas of joint research and development [2] - The partnership is set for a duration of ten years, with Yuanwanggu leveraging its strengths in algorithms, computing power, and talent through deep cooperation with the university to maintain its technological leadership in these fields [2] - The collaboration aims to align Yuanwanggu's business scenarios with the university's research capabilities, facilitating the development of large model applications in the AI domain, which is crucial for technological breakthroughs and practical applications [2] Strategic Implications - By engaging in this "two-way approach" with the university, Yuanwanggu can accelerate AI technology research and innovation, reinforcing its technological barriers and providing robust support for long-term development in a competitive market [2]
INE Security Alert: Critical Cisco ISE Vulnerabilities Demand Immediate Attention
GlobeNewswire News Room· 2025-07-18 14:51
Core Insights - INE has responded to Cisco's urgent security advisory regarding three critical vulnerabilities in Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that pose an extreme threat to enterprise network security [1][6] Vulnerabilities Overview - The vulnerabilities are tracked as CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337, each assigned a maximum CVSS score of 10.0, indicating the highest severity [2] - These flaws allow unauthenticated remote attackers to execute arbitrary commands with root privileges on affected systems [2][5] Expert Analysis - The vulnerabilities represent a cybersecurity nightmare scenario, with maximum exploitability and zero authentication requirements, effectively acting as a master key for attackers [3] - Compromising ISE could allow attackers to control access throughout the entire network, highlighting the importance of comprehensive network security training [3][9] Technical Details and Impact - CVE-2025-20281 and CVE-2025-20337 affect ISE and ISE-PIC releases 3.3 and 3.4, while CVE-2025-20282 affects only ISE and ISE-PIC release 3.4 [5] - Successful exploitation grants attackers complete root-level access, the ability to execute arbitrary commands, and access to sensitive identity and authentication data [5] Industry Impact and Response - The vulnerabilities were discovered through responsible disclosure by security researchers, and Cisco's PSIRT reports no evidence of active exploitation at this time [6][7] - Security experts anticipate these flaws will become high-priority targets for threat actors due to the critical nature of ISE in enterprise security [7] INE's Commitment to Cybersecurity Education - INE emphasizes the importance of comprehensive IT training and incident response preparedness for cybersecurity teams in light of these vulnerabilities [8][9] - Continuous education in vulnerability management and incident response is deemed business-critical for organizations [9] Recommendations for Organizations - Organizations are advised to inventory all Cisco ISE and ISE-PIC installations, prioritize patching, monitor networks for unusual activity, review access controls, and ensure incident response teams are prepared [11]
网宿安全发布《2024年度网络安全态势报告》
Yang Guang Wang· 2025-07-18 07:37
Core Insights - The report emphasizes the urgent need for enterprises to adopt an "AI-driven systematic proactive security" approach to address the increasing risks associated with digital transformation and asset exposure [1][6] Group 1: Cybersecurity Landscape - In 2024, the risk of asset exposure has surged dramatically, with global CVE vulnerabilities exceeding 40,000 for the first time, and high-risk vulnerabilities accounting for 67.98% [3] - The report highlights a significant increase in attacks targeting domestic software vulnerabilities, particularly in collaborative office, content management, and enterprise resource planning systems [3] - The number of T-level DDoS attacks reached 219, marking a tenfold increase year-on-year, with 60% of web attacks focusing on API interfaces [4] Group 2: AI-Driven Threats - The report identifies that AI applications have seen a 36% year-on-year increase in CVE vulnerabilities, with 250 new vulnerabilities reported in 2024 [3][6] - Prompt injection attacks have evolved from leaking sensitive information to high-risk behaviors that exploit system permissions, underscoring the need for robust defense mechanisms for large models [3] Group 3: Defensive Strategies - The report advocates for a three-pronged dynamic defense architecture comprising exposure surface convergence, depth defense, and intelligent operations [6] - It suggests utilizing Managed Security Services (MSS) for dynamic risk governance and employing cutting-edge frameworks like WAAP and SASE for comprehensive threat detection and defense [6] - The report proposes a partitioned defense strategy for large model applications, emphasizing cloud-native security technologies and zero-trust mechanisms for dynamic control [6] Group 4: Case Studies and Implementation - Successful case studies were presented, demonstrating the effectiveness of the proposed security framework, such as intercepting 99% of abnormal order traffic for a toy mall and reducing incident response time for state-owned enterprises from 8 hours to 10 minutes [7] - The company aims to continuously iterate on its proactive security capabilities to support the stable development of the digital ecosystem [9]