Workflow
网络安全
icon
Search documents
拒绝数据泄露!揭秘贝锐蒲公英异地组网独家安全优势
Jin Tou Wang· 2025-06-06 08:41
Core Viewpoint - Beirui's Dandelion remote networking establishes a private network that ensures user local area network services and devices are not directly exposed to the public internet, requiring identity verification for remote access [1] Group 1: Access Control and Security Features - Beirui Dandelion offers fine-grained access control based on user identity, device information, and access time, allowing specific access configurations for remote work scenarios [3] - The system employs end-to-end encryption for data transmission, automatic isolation of risky terminals, and comprehensive logging of access behavior, ensuring robust data security [3] - Beirui Dandelion has passed the national information system security level protection certification and supports national encryption algorithms, safeguarding enterprise data assets [3] Group 2: Data Transmission Security - The technology utilizes multiple encryption mechanisms to ensure the confidentiality and integrity of data during transmission, employing asymmetric AES encryption and TLS protocols [4] - During P2P direct connections, identity verification is conducted through a session server to ensure trusted communication between parties [7] - A shared AES communication key is generated for encrypted data transmission, with TLS encryption activated during data forwarding through Beirui's relay servers [9] Group 3: Identity Verification and Hardware Security - Beirui Dandelion ensures trusted communication through strict terminal identity verification using encrypted HTTPS protocols [10] - The hardware is protected against malicious command injection risks through self-developed anti-injection technology [10][12] - The company adheres to security design principles, including the principle of least privilege and defense in depth, to enhance overall security [12] Group 4: Security Testing and Response - Beirui conducts regular security testing, including fuzz testing and penetration testing, to ensure compliance with the latest OWASP testing standards [12] - The company has established a Security Response Center (SRC) to create a standardized long-term security system, integrating public network security capabilities for early problem detection [12] - Collaborations with renowned security institutions for penetration testing and vulnerability scanning are conducted to assess product security and identify potential threats [14]
专家热议AI时代网络安全:重塑内生安全体系是“突围之钥”
Huan Qiu Wang· 2025-06-06 08:22
Core Insights - The 2025 Global Digital Economy Conference highlighted the theme "Breaking Through Security: Reshaping the Endogenous Security System," focusing on the challenges in cybersecurity during the AI era [1][3] Group 1: AI and Cybersecurity Challenges - AI presents both opportunities and systemic challenges for the cybersecurity industry, necessitating a breakthrough in current security frameworks [3] - The complexity of the international situation and the rapid proliferation of AI applications have rendered traditional security measures ineffective [3] - The Chinese government has initiated regulatory measures, including the "Interim Measures for the Management of Generative AI Services," with over 400 large models registered as of now [3][4] Group 2: Systemic Solutions and Recommendations - Experts emphasize the need for a systematic approach to address the multifaceted risks posed by AI in cybersecurity [4] - Recommendations include accelerating the construction of AI-enabled security systems, promoting innovation in AI security products, and enhancing protective measures through practical applications [4][5] - Key obstacles to building an endogenous security system include data silos, insufficient resource investment, and compatibility issues between old and new systems [5] Group 3: International Expansion and Collaboration - Companies like Qi Anxin are focusing on international business growth, aiming for a significant proportion of their operations to be overseas in the next decade [5][6] - The Chinese cybersecurity industry is positioned to compete globally, with innovations and product quality comparable to developed countries [6] - The collaborative ecosystem is deemed essential for overcoming challenges in core technology development and industry cooperation [6]
上海谋乐网络科技有限公司研发部荣获“上海市模范集体”称号
上海谋乐网络科技有限公司(BUGBANK)将牢记"创造未知,惠及世界"的初心,以"上海市模范集体"荣 誉为奋进动力,怀爱国之心、立报国之志、增强国之能,保持锐意进取、敢为人先的拼搏本色,以科技 创新与自主研发为核心动能,以匠心淬炼能力,以高质量的劳动创造推动高质量发展,护航传统产业 向"新质化"焕新蝶变,为构建更加安全、可信、智能的网络空间注入"工匠力量"。 公司简介 上海谋乐网络科技有限公司(BUGBANK)是上海市信息安全行业协会副会长单位、上海网络与信息安全 监测预警共建单位、网络安全等级保护专业委员会成员单位、SHCERT网络安全应急服务支撑单位、 CNNVD技术支撑单位,并荣获全国智慧警务十大解决方案提供商。先后为上合组织峰会、国际进口博 览会等国家重大活动进行网络安全保障工作。此外,公司与上海市网络与信息安全应急管理事务中心及 上海市政府达成战略合作,成为首家为国家提供城域漏洞安全的网络科技企业。 上海谋乐网络科技有限公司(BUGBANK)近年获评亚洲红鲱鱼(Red Herring)Top100、科技小巨人企业、 中国安全百强榜企业、德勤50强成长企业、福布斯上市潜力榜企业、快公司中国创新50强、 ...
如何应对AI时代网络安全挑战,业内专家给出建议
Di Yi Cai Jing· 2025-06-06 02:13
赵志国表示,人工智能为网络安全产业带来了前所未有的机遇与挑战,并呈现出三大特征:智能化安全威胁不断涌现,智能化安全产品快速发 展,智能化安全技术仍存差距。 网络安全是一项系统工程,系统的运营者、服务商和相关部门都是环环相扣的,要坚持体系作战的思维方式,打造一个国家网络安全的联合防 御体系。 随着人工智能赋能千行百业,网络安全成为日益关注的话题。 2025全球数字经济大会数字安全主论坛暨第七届北京网络安全大会(BCS)开幕峰会6月5日在北京举行。 中国互联网协会专家咨询委员会常务副主任、工业和信息化部原总工程师赵志国表示,随着智能化浪潮深入推进,网络空间成为全球竞争与协 作的重要舞台,网络安全成为护航数字中国建设的战略基石。必须以系统性思维应对复合型风险,构建更加灵活、智能、协同的安全体系,推 动网络安全向智能化变革,才能在新时代的网络安全征程中行稳致远。 在赵志国看来,攻击者利用人工智能放大攻击效果,使网络威胁更具规模性、针对性、杀伤性,进一步加剧网络攻防不对称性。生成式人工智 能不断在理解、认知、推理等方面实现进化,人工智能安全产品在提升安全运营效率方面初具成效。我国人工智能安全算法原创性、模型开放 性、数 ...
从“被动响应”向“主动防控” 专家吁构网络内生安全体系
Huan Qiu Wang Zi Xun· 2025-06-05 13:16
一是坚持系统布局,着力加快AI赋能网络安全的体系建设。构建具备内生安全的AI安全底座,提升数 据集的安全性、模型的可信性、输出的可靠性。构建针对AI赋能网络安全的技术标准体系,促进安全 大模型产品和服务的协同互通,开展对AI赋能网络安全的模型评估。 来源:中国新闻网 二是坚持场景牵引,着力推动AI安全技术产品创新发展。充分发挥龙头企业的引领作用,加大研发投 入,加快开展AI赋能高级别安全场景的技术攻关,形成自主化的模型算法创新。通过技能竞赛、专业 认证等方式加快AI和网络安全复合型人才的培养。 中新网北京6月5日电 (记者 吕少威)当前,随着人工智能(AI)等技术的快速发展,网络安全格局正在被重 塑,攻击方利用AI可进行更精准和自动化的攻击,易攻难守。该如何破局?专家建言应由"被动响 应"向"主动防控"转变,重塑内生安全体系,实现安全突围。 三是坚持实战导向,着力提升"AI+"网络安全防护水平。强化AI在漏洞分析和安全态势感知等方面的实 战化应用,构建智能化的安全防护体系,实现对网络威胁的精确识别和高效防御,提升整体的防护效 能。 5日,2025全球数字经济大会数字安全主论坛暨第七届北京网络安全大会(BCS) ...
“中国唯一不变的是变化”——专访塔塔咨询服务中国区负责人Suneet Puri
Guo Ji Jin Rong Bao· 2025-06-05 12:38
Core Insights - Tata Consultancy Services (TCS) has been actively involved in the Chinese market since 2002, establishing a strong presence and adapting its business model to local conditions [1][3] - The company has shifted its focus from supporting multinational clients to collaborating with local enterprises and establishing delivery centers, reflecting the rapid technological advancements in China [3][4] - TCS emphasizes the importance of technology in enhancing efficiency and reducing costs, with a focus on cloud computing, artificial intelligence, and cybersecurity [4][5] Business Changes - TCS initially entered China to support multinational companies, but has since evolved to partner with local leaders and establish delivery centers, such as in Dalian [3] - The company has adapted its investment focus to help clients leverage the latest technologies, moving from basic business support to advanced tech upgrades [3][4] - TCS provides training for employees to stay updated with emerging technologies, emphasizing the need for adaptability in a rapidly changing market [4] Market Confidence - Despite the ongoing global trade tensions, TCS has not been directly impacted, although its clients have experienced indirect effects [5][6] - The company believes that the size of the Chinese market will continue to attract foreign investment, even if some large projects are temporarily postponed due to uncertainty [5][6] - TCS has benefited from China's open policies and government support, which have facilitated its growth and operations in the region [6]
涉美国、德国、荷兰、法国等,一批境外恶意网址和IP曝光
证券时报· 2025-06-05 10:05
Core Viewpoint - The article highlights the discovery of a series of malicious websites and IP addresses linked to foreign hacker organizations that pose significant threats to China and other countries through various cyber attacks. Malicious Address Information - Malicious Address: enermax-com.cc Associated IP: 198.135.49.79 Location: USA/Texas/Dallas Threat Type: Backdoor Virus Family: RemCos Description: RemCos is a remote management tool capable of executing various malicious activities such as keylogging, screen capturing, and password theft [1] - Malicious Address: vpn.komaru.today Associated IP: 178.162.217.107 Location: Germany/Hesse/Frankfurt Threat Type: Botnet Virus Family: MooBot Description: A variant of the Mirai botnet that exploits IoT device vulnerabilities to launch DDoS attacks [2] - Malicious Address: ccn.fdstat.vip Associated IP: 176.65.148.180 Location: Germany Threat Type: Botnet Virus Family: Mirai Description: A Linux botnet virus that spreads through network downloads and exploits, capable of launching DDoS attacks [3][4] - Malicious Address: crazydns.bumbleshrimp.com Associated IP: 196.251.115.253 Location: Netherlands/North Holland/Amsterdam Threat Type: Backdoor Virus Family: NjRAT Description: A remote access trojan with capabilities for screen monitoring, keylogging, and file management [5] - Malicious Address: nanotism.nolanwh.cf Associated IP: 2.4.130.229 Location: France/New Aquitaine/Montmorillon Threat Type: Backdoor Virus Family: Nanocore Description: A remote access trojan used for espionage and system control, capable of recording audio and video [6] - Malicious Address: gotoaa.sytes.net Associated IP: 46.19.141.202 Location: Switzerland/Zurich/Zurich Threat Type: Backdoor Virus Family: AsyncRAT Description: A backdoor with functionalities for screen monitoring, keylogging, and file theft [7] - Malicious Address: rcdoncu1905.duckdns.org Associated IP: 181.131.216.154 Location: Colombia/Cesar/Valledupar Threat Type: Backdoor Virus Family: RemCos Description: Similar to the previous RemCos description, capable of various malicious activities [9] - Malicious Address: 1000gbps.duckdns.org Associated IP: 192.250.228.95 Location: Singapore/Singapore/Singapore Threat Type: Botnet Virus Family: Mirai Description: A Linux botnet virus that can launch DDoS attacks [10] - Malicious Address: nnbotnet.duckdns.org Associated IP: 161.248.238.54 Location: Vietnam Threat Type: Botnet Virus Family: MooBot Description: A variant of the Mirai botnet that exploits IoT vulnerabilities to form a botnet [11] - Malicious Address: traxanhc2.duckdns.org Associated IP: 160.187.246.174 Location: Vietnam/Thanh Hoa Threat Type: Botnet Virus Family: Mirai Description: A Linux botnet virus capable of launching DDoS attacks [12]
奇安信董事长:希望中国网络安全产品在海外赢得像歼-10CE一样的认可
Huan Qiu Wang· 2025-06-05 06:10
Core Viewpoint - The chairman of Qi Anxin Group, Qi Xiangdong, emphasized that Chinese cybersecurity products can match the quality of those from developed Western countries, expressing a desire for international recognition similar to that received by the J-10CE fighter jet [1][2]. Group 1: International Expansion - Qi Xiangdong stated that as a world-class cybersecurity company, Qi Anxin must expand internationally, with the proportion of international business steadily increasing [1]. - The current geopolitical climate presents a unique opportunity for Chinese cybersecurity companies to expand overseas, particularly in countries involved in the Belt and Road Initiative [2]. Group 2: Market Dynamics - Qi Xiangdong noted that many countries have traditionally relied on Western products, but changing international circumstances have led them to seek alternatives, viewing reliance on Western technology as risky [2]. - Countries are increasingly concerned about their national security in the digital age, prompting a competitive environment where they welcome Chinese cybersecurity firms to compete alongside Western companies [2].
国家网络安全通报中心通报一批恶意网址和恶意IP
news flash· 2025-06-05 06:08
金十数据6月5日讯,据国家网络安全通报中心消息,中国国家网络与信息安全信息通报中心通过支撑单 位发现一批境外恶意网址和恶意IP,境外黑客组织利用这些网址和IP持续对中国和其他国家发起网络攻 击。这些恶意网址和IP都与特定木马程序或木马程序控制端密切关联,网络攻击类型包括建立僵尸网 络、后门利用等,对中国国内联网单位和互联网用户构成重大威胁。相关恶意网址和恶意IP归属地主要 涉及:美国、德国、荷兰、法国、瑞士、哥伦比亚、新加坡、越南。 国家网络安全通报中心通报一批恶意网址和恶意IP ...
赋能数字经济发展,济南推出12条数字经济人才发展措施
Qi Lu Wan Bao Wang· 2025-06-05 05:09
此外,在能力提升方面突出"精准滴灌"。《若干措施》聚焦数字经济技术、管理能力有效提升,定制化 开展专业能力培训;实行数字经济企业家培育导师制度,创新性开展数字经济领域经营管理领军人才认 定,选聘知名企业家担任导师,为新生代企业家提供经营管理指导咨询。 "数字经济是济南的优势所在,更是潜力所在。为更好地赋能济南市数字经济产业高质量发展,增加数 字经济人才有效供给,我们研究制定了《济南市关于加强数字经济人才发展的若干措施(试行)》。"徐 磊介绍,《若干措施》围绕数字经济人才引进、能力提升、服务优化等主要环节,提出了12条具体举 措,主要有四个突出特点: 徐磊表示,一是在人才引进方面突出"高精尖缺"。《若干措施》聚焦大模型、生成式人工智能、网络安 全等紧缺产业需求,坚持高端人才引领、国内国外并举,吸引集聚高层次数字经济人才。通过编制池保 障、项目资助等多种方式,加大对数字经济高端人才、顶尖人才以及首席数据官等领军型人才引进力 度。深化"揭榜挂帅"机制,吸引国内外数字经济领域工程师、创客团队等定向攻关、来济创业。 其次,在人才培育方面突出"校企联动"。《若干措施》聚焦校地融合发展,持续支持校企共建现代产业 学院、公共 ...