网络安全
Search documents
捷豹路虎3.3万名员工被告知“停工停产”
Di Yi Cai Jing· 2025-09-19 02:01
9月19日早间,捷豹路虎对第一财经回应称,自遭受网络攻击事件后,总部IT团队第一时间联合第三方专家,以可控、安全的方式逐步重启全球系 统,包括生产供应体系。据悉,目前公司正针对各环节潜在影响,实时评估排查风险,尚未对中国市场的交付产生影响。 近日,全球豪华汽车品牌捷豹路虎在英国受到网络攻击的事件受到广泛关注。 捷豹路虎方面于9月初发现了这一网络攻击事件,并不断更新公司进展。本周,捷豹路虎的全球33000名员工被告知生产线仍然受到影响。在全球官网 最新的动态更新中,公司称已通知同事、供应商和合作伙伴,将目前的生产暂停时间延长至2025年9月24日星期三。 有知情人士称,英国网络攻击影响到了全球系统,包括在英国当地的生产供应链等,因此在未来一段时间内,会对所有进口车的排期生产造成冲击, 但具体的影响目前尚且难以准确估算。 目前,在捷豹路虎的中国网站上也对此网络安全事件进行了声明,称"零售合作伙伴仍在正常营业。根据持续调查结果,我们现确认部分数据已受到 影响,并正在向相关监管机构报备。取证调查正在全力推进,若发现任何用户数据受影响,我们将第一时间主动联系相关方。" ...
CrowdStrike预期至2027年新增ARR至少增长20%,优于预期
Ge Long Hui A P P· 2025-09-19 01:26
格隆汇9月19日|CrowdStrike在投资者日公布长期业绩目标,预期至2027年新增年度经常性收入(ARR) 将录得最少20%的增长,高于分析师预期,并计划于2031年达到100亿美元,再于2036年倍增至200亿美 元。 ...
全球3.3万名员工被告知“停工停产”!捷豹路虎回应一财
Di Yi Cai Jing· 2025-09-19 01:23
捷豹路虎在英国遭遇网络攻击。 近日,全球豪华汽车品牌捷豹路虎在英国受到网络攻击的事件受到广泛关注。 9月19日早间,捷豹路虎对第一财经回应称,自遭受网络攻击事件后,总部IT团队第一时间联合第三方 专家,以可控、安全的方式逐步重启全球系统,包括生产供应体系。据悉,目前公司正针对各环节潜在 影响,实时评估排查风险,尚未对中国市场的交付产生影响。 捷豹路虎方面于9月初发现了这一网络攻击事件,并不断更新公司进展。本周,捷豹路虎的全球33000名 员工被告知生产线仍然受到影响。在全球官网最新的动态更新中,公司称已通知同事、供应商和合作伙 伴,将目前的生产暂停时间延长至2025年9月24日星期三。 目前,在捷豹路虎的中国网站上也对此网络安全事件进行了声明,称"零售合作伙伴仍在正常营业。根 据持续调查结果,我们现确认部分数据已受到影响,并正在向相关监管机构报备。取证调查正在全力推 进,若发现任何用户数据受影响,我们将第一时间主动联系相关方。" 有知情人士称,英国网络攻击影响到了全球系统,包括在英国当地的生产供应链等,因此在未来一段时 间内,会对所有进口车的排期生产造成冲击,但具体的影响目前尚且难以准确估算。 ...
2025年国家网络安全宣传周 法治日主会场活动举行
Ren Min Wang· 2025-09-19 01:00
本报北京9月18日电 记者张诗淇报道:为积极展现"十四五"期间网络安全领域的发展成就和重要成 果,着力增强全民网络安全意识,营造安全清朗的网络环境,9月18日,2025年国家网络安全宣传周法 治日主会场活动在云南昆明举行。 公安部网安局有关负责人表示,公安机关将继续坚持以人民为中心的发展思想,充分发挥维护网络 空间安全主力军作用,履职尽责、担当作为,为网络强国建设贡献公安网安力量。 来源:人民公安报 本次法治日主会场活动由公安部牵头,以"数智互联、共治共享"为主题,围绕网络新技术新应用安 全管理、网络违法犯罪打击、国家网络身份认证公共服务、关键信息基础设施安全保护等主题,以论坛 形式进行研讨交流。来自中国人民大学、中国社会科学院、中国刑事警察学院等单位的学者和最高人民 法院、公安部等有关部门的专家,分别围绕人工智能治理、网络违法犯罪打击、国家网络身份认证公共 服务等内容作了主题发言,深入分析网络安全面临的新形势新挑战,并对加强网络安全工作建言献策。 主会场采取线上和线下相结合的方式,围绕网络安全、数据安全、个人信息保护等热点,向公众宣 传普及网络安全法律知识,介绍"净网—2025""护网—2025"专项工作阶 ...
江苏有线筑牢2025数字时代网络安全防线
Xin Hua Ri Bao· 2025-09-18 22:32
Core Viewpoint - Cybersecurity is a crucial foundation for national security and a prerequisite for the high-quality development of the digital economy, with Jiangsu Cable (600959) implementing a comprehensive cybersecurity strategy to support the construction of a digital Jiangsu and the network power strategy [1] Group 1: Cybersecurity Training - Jiangsu Cable emphasizes the importance of cybersecurity as a national security cornerstone and has established a multi-layered defense system combining technical, human, and institutional measures [1] - The company focuses on practical training and exercises to enhance capabilities and build a robust cybersecurity framework [1] Group 2: Practical Drills - From May to August 2025, Jiangsu Cable conducted extensive cybersecurity drills, identifying and rectifying over 370 risk vulnerabilities, significantly reducing exposure to potential attacks [2] - The company successfully identified and blocked over 22,000 malicious IP addresses and handled more than 12,000 abnormal access requests during the drills, enhancing its cybersecurity response capabilities [2] Group 3: Security Assurance - During critical events from August to September 2025, Jiangsu Cable prioritized cybersecurity, implementing a comprehensive monitoring and response plan to ensure zero incidents [3] - The company managed to block 136 malicious IP addresses and 7 malicious domains, ensuring uninterrupted transmission and data security [3] Group 4: Foundation Strengthening - In 2025, Jiangsu Cable focused on enhancing its cybersecurity infrastructure, identifying and rectifying over 1,800 high-risk vulnerabilities and weak passwords through a combination of automated scanning and manual penetration testing [4][5] - The company implemented strict data security measures, including encryption and access control, to protect sensitive information and ensure data recoverability [5] Group 5: Collaborative Governance - Jiangsu Cable promotes a collaborative cybersecurity governance model, revising key policies and ensuring comprehensive coverage across all levels of management [6] - The company actively participates in provincial cybersecurity initiatives and public awareness campaigns to enhance user safety and fraud prevention [6] Group 6: Future Commitment - Jiangsu Cable is committed to continuous innovation in cybersecurity technology and improving its protective measures to support the high-quality development of the digital economy [7]
网络安全公司Netskope(NTSK.US)登陆美股市场 开盘报23美元
Zhi Tong Cai Jing· 2025-09-18 16:26
周四,网络安全公司Netskope(NTSK.US)美国IPO首日开盘报23美元,现涨超27%,报24.27美元,总市 值近93亿美元。IPO价格为19美元。Netskope是一家基于云的网络安全公司,成立于2012年,开发有助 于企业保护应用程序、网站和数据的软件。 ...
网络安全宣传周 | 网络安全知识科普,建议学习+收藏!
Sou Hu Cai Jing· 2025-09-18 14:13
2025年9月15日至21日 是国家网络安全宣传周,今年活动主题为 "网络安全为人民、网络安全靠人民" ——以高水平安全守护高质量发展 2025网络安全宣传周 9月8日,2025年国家网络安全宣传周新闻发布会在京举行。今年网安周将深入学习宣传贯彻习近平总书记关于网络强国的重要思想,认真落实习近平总书 记对网络安全工作"四个坚持"的重要指示精神,积极做好《网络安全法》《数据安全法》《个人信息保护法》《关键信息基础设施安全保护条例》《网络 数据安全管理条例》《互联网政务应用安全管理规定》等法律法规和政策文件宣贯工作,积极展现党的十八大以来网络安全领域的发展成就和重要成果, 向全社会普及网络安全知识和技能。 大家在享受如今互联网 带来便利的同时 也要时刻注意 互联网背后存在的 巨大隐患 电信诈骗、信息泄露、 网络谣言、恶意软件...... 今天,一起来学习 网络安全知识 ↓↓↓ 2021年6月10日,第十三届全国人民代表大会常务委员会第二十 九次会议通过,自2021年9月1日起施行。 是我国数据领域的基础性法律,也是国家安全领域的一部重要法律。 《汽车数据安全管理若干规定(试行)》 网络安全知识宣传手册 SSESS ...
微软Windows再次被指暗藏后门,区别对待中国用户
Guan Cha Zhe Wang· 2025-09-18 12:45
Core Viewpoint - The article discusses allegations against Microsoft regarding its Windows system's differential treatment of users in Europe and Asia, particularly China, raising concerns about privacy violations and national data security [2][3]. Group 1: Allegations Against Microsoft - A network security technician named "Xuandao" claims that Microsoft uses its monopoly position to hide encrypted data and dynamically release unknown programs to collect user data through the UCPD.sys driver [2][3]. - UCPD.sys is alleged to contain mechanisms that specifically target Chinese software vendors, employing blacklists to restrict competition and maintain Microsoft's market dominance [2][4]. - Legal experts suggest that if these allegations are true, Microsoft may be violating personal privacy laws and engaging in unfair competition practices [2][3][15]. Group 2: Technical Analysis of UCPD.sys - UCPD.sys, which is designed to protect user default application settings, has been found to operate in a way that undermines user control, automatically reverting settings to Microsoft applications after user attempts to change them [3][6]. - The driver is reported to have a "remote loading and execution" capability, allowing it to monitor and modify system settings without user awareness, which experts have labeled as an "invisible backdoor" [3][7]. - The driver includes a blacklist of numerous Chinese software products, indicating a systematic effort to limit their functionality and market presence [4][6]. Group 3: Regional Disparities in User Experience - UCPD.sys reportedly has built-in regional detection logic, leading to significant differences in user experience between Chinese and European users, with the latter enjoying more freedom to modify default applications [8][10]. - In Europe, users can easily switch default applications without interference from the system, while in China, the system enforces data collection and restricts user choices [10][11]. Group 4: Implications for User Security and Market Competition - The restrictions imposed by UCPD.sys on Chinese security software weaken user defenses, exposing them to higher security risks as these applications are unable to function effectively [7][15]. - The article highlights a broader concern that such practices may facilitate foreign attacks on critical information infrastructure in China, posing risks to personal privacy and corporate secrets [15][16].
网络安全周 | 当网络陷阱出现时,我们该如何保护自己?
中泰证券资管· 2025-09-18 11:33
Core Viewpoint - The article emphasizes the importance of cybersecurity in the digital age, highlighting the various risks associated with online activities and the need for robust protective measures to safeguard personal information and assets [3][11]. Group 1: Ubiquitous Network Threats - The article outlines common network threats such as malware, which can infiltrate devices to steal personal information or damage system files [5]. - Account hijacking is increasingly prevalent, especially when users employ the same credentials across multiple platforms, leading to potential fraud and reputational damage [5]. - Various forms of online scams are discussed, including traditional lottery scams and emerging online lending frauds, which exploit personal data for malicious purposes [6]. Group 2: Building a Cybersecurity Defense Network - Establishing device security is fundamental, including installing reliable security software and regularly updating operating systems and applications to patch vulnerabilities [8]. - Password management is crucial; using strong, unique passwords for different accounts can significantly reduce the risk of unauthorized access [8]. - Developing safe online habits is essential, such as being cautious with public Wi-Fi and scrutinizing links or files from unknown sources [8]. Group 3: Practical Strategies for Information Protection - Personal information should be meticulously protected, including shredding sensitive documents and being cautious about sharing location data on social media [10]. - Managing app permissions is vital; users should only grant necessary permissions and regularly review existing app settings [10]. - In case of a security breach, immediate actions should include checking financial statements for anomalies, ceasing contact with suspicious parties, and reporting incidents to authorities [10].
聚焦2025国家网络安全周:鸿蒙隐私安全多重守护为用户数字生活护航
Huan Qiu Wang· 2025-09-18 08:06
Core Viewpoint - The National Cybersecurity Awareness Week, themed "Cybersecurity for the People, Cybersecurity by the People," was officially opened in Kunming, showcasing Huawei's advanced cybersecurity solutions and products, particularly the HarmonyOS privacy security solutions [1] Group 1: Huawei's Cybersecurity Initiatives - Huawei's HarmonyOS 5 has seen over 14 million devices equipped, indicating strong market and user recognition of its new security concepts and practices [1] - The new self-developed Star Shield security architecture in HarmonyOS 5.0 has restructured the security system, reducing malicious app installations by 16 million monthly and intercepting over 8.6 billion unreasonable permission requests [1] - The HarmonyOS 6 developer Beta version upgrades the Star Shield security architecture, incorporating AI capabilities for intelligent recognition and proactive protection against scenarios like peeping and fraud [1] Group 2: Huawei's Product Innovations - Huawei introduced the first commercial HarmonyOS laptop, the Qingtian HM940, which features an AI assistant and enterprise-level security solutions, marking a new era in commercial productivity [3] - The HarmonyOS computer series emphasizes comprehensive privacy and security protection, including chip-level full-disk encryption and a super privacy mode for user control [4] - The Huawei Qingtian brand encompasses a range of commercial products and solutions, focusing on reliable quality, independent innovation, and user-centric design [5] Group 3: Industry Collaboration and Future Outlook - Huawei's Qingtian brand collaborates with partners to create industry solutions across sectors like government, finance, education, and energy, enhancing the integration of hardware and software [5] - The theme of cybersecurity emphasizes the role of the public as both the object of protection and a participant in safeguarding digital security, reflecting Huawei's commitment to a secure and intelligent digital future [5]