Workflow
网络安全
icon
Search documents
数码视讯跌2.34%,成交额1.51亿元,近5日主力净流入-4820.91万
Xin Lang Cai Jing· 2025-12-09 07:18
Core Viewpoint - The company, Digital Video Technology Co., Ltd., is focusing on leveraging blockchain technology and cloud computing to enhance its services and expand into new markets, particularly in digital content rights management and internet finance. Group 1: Company Overview - Digital Video Technology Co., Ltd. is located in Haidian District, Beijing, and was established on March 14, 2000. It was listed on April 30, 2010. The company specializes in the research, development, production, and technical services of digital television hardware and software products [7]. - The company's main business revenue composition includes: video technology products and services (34.01%), information service terminals (21.46%), others (17.93%), public safety products (8.25%), network transmission systems (7.34%), financial technology products (6.70%), and software technology services (4.30%) [8]. Group 2: Financial Performance - For the period from January to September 2025, the company achieved operating revenue of 465 million yuan, representing a year-on-year growth of 24.58%. The net profit attributable to the parent company was 24.62 million yuan, an increase of 10.34% year-on-year [8]. - The company has distributed a total of 370 million yuan in dividends since its A-share listing, with cumulative distributions of 42.83 million yuan over the past three years [9]. Group 3: Business Developments - The subsidiary, Kuaishiting, is dedicated to utilizing blockchain technology to empower the industry and expand the company's related technologies in the metaverse. The platform, Dongyi Yuandian, issues digital collectibles to provide new rights confirmation and copyright proof for digital content [2]. - The company has made significant advancements in copyright protection by integrating new technologies, including blockchain for digital copyright management, which enhances the control authors have over their copyrights [2]. - The company offers a cloud video platform solution that integrates AI technologies for various media applications, ensuring comprehensive access and management of resources [3]. Group 4: Market Activity - On December 9, the company's stock fell by 2.34%, with a trading volume of 151 million yuan and a turnover rate of 2.15%. The total market capitalization is 7.743 billion yuan [1]. - The main capital inflow for the day was negative at 33.75 million yuan, indicating a reduction in main capital over three consecutive days, with the industry ranking at 110 out of 132 [4][5].
阿根廷公布国家情报政策 重申对马岛等地主权
Xin Hua She· 2025-12-09 07:07
Core Viewpoint - The Argentine government has announced a national intelligence policy focusing on cybersecurity and counter-terrorism, reaffirming sovereignty over the Malvinas Islands and surrounding maritime areas [1] Group 1: National Security Goals - The national intelligence policy outlines five key security objectives: maintaining national sovereignty and autonomy, protecting territorial integrity, safeguarding citizens' lives, freedoms, and property, upholding democratic institutions, and ensuring the security of strategic resources [1] - The policy also includes ten guiding principles for national intelligence, addressing the impact of great power geopolitical competition on Latin America, and combating terrorism and organized crime [1] Group 2: Intelligence and Security Reforms - This is the first national intelligence policy published by the Argentine government in over 20 years, aimed at enhancing the intelligence community's ability to identify risks, threats, and opportunities [1] - In 2023, the Argentine government has made several adjustments to federal police, intelligence, and national security agencies, including the establishment of the Federal Investigation Department, National Counter-Terrorism Center, and National Immigration Bureau [1]
从杭州刑警到阿里资深合伙人,邵晓锋如何成为马云最信任的“左膀右臂”?
Sou Hu Cai Jing· 2025-12-09 02:11
Core Insights - Jack Ma, despite retiring, remains a significant figure in the Chinese e-commerce landscape, with his actions closely monitored by the public [2] - Shao Xiaofeng, a long-time partner of Ma, has played a crucial role in Alibaba's development, transitioning from a police career to a key executive position [2][3] Background of Shao Xiaofeng - Shao Xiaofeng and Jack Ma met in 1984 while preparing for college entrance exams, forming a lasting friendship [3] - Shao had a successful career in law enforcement, earning multiple commendations, including one first-class merit and three third-class merits [4][12] Transition to Alibaba - In 2005, Shao Xiaofeng joined Alibaba as the head of the network security department, recognizing the importance of cybersecurity in e-commerce [15] - His work significantly improved the security of online transactions, contributing to the growth of Taobao and its competition against eBay's eBay China [15] Role in Alibaba's Management - Shao served in various capacities, including CEO assistant, vice president of Taobao, and president of Alipay, eventually becoming Alibaba's first Secretary-General [17][18] - He established a risk assessment and response mechanism within Alibaba, addressing various operational risks [18] Contributions and Achievements - Shao played a pivotal role in improving Alibaba's reputation, successfully removing Taobao from a negative list of markets [19] - He was instrumental in the development of Alibaba's internal culture and employee engagement, leading to a high percentage of outstanding employees among party members [19] Legacy and Recognition - Shao Xiaofeng's career has been marked by a commitment to Alibaba's mission, earning him a place among the top successful managers in China, with a net worth of 13.5 billion yuan [26] - His approach emphasizes the importance of achieving a sense of accomplishment through work, aligning personal values with the company's vision [26]
警惕!这种Wi-Fi不能连!你的手机可能会被远程操控
Huan Qiu Wang Zi Xun· 2025-12-09 00:35
Core Viewpoint - The article emphasizes the risks associated with connecting to public Wi-Fi networks, highlighting potential data theft and network attacks, and provides safety tips to mitigate these risks [1][2][3]. Group 1: Risks of Public Wi-Fi - Public Wi-Fi networks can be exploited by malicious actors, including foreign intelligence agencies, to monitor sensitive information from connected devices [1]. - Users connecting to insecure public Wi-Fi may unknowingly have malware installed on their devices, leading to remote control and threats to personal and public safety [2]. - Personal data such as browsing history and location information can be collected and analyzed by malicious entities, potentially undermining social stability and mainstream values [3]. Group 2: Prevention Measures - Users are advised to disable the "auto-connect" feature on their devices to prevent automatic connections to malicious networks [5]. - It is recommended to avoid sensitive operations, such as logging into private accounts or conducting financial transactions, while connected to public Wi-Fi [6]. - Installing and regularly updating protective software can help prevent malware attacks, and using virtual private networks (VPNs) can encrypt data transmission [7]. Group 3: Personal Information Safety - Users should be cautious about sharing personal information on social media, as seemingly innocuous posts can reveal sensitive details [8][9][10][11][12][13][14][15]. - Users should be wary of scams that offer "free benefits" through links or QR codes, as these can lead to malicious app installations that compromise personal data [17][18]. - It is important to manage app permissions to prevent unauthorized access to personal data, such as microphone and contact information [19][20][21]. Group 4: Response to Data Breaches - In the event of a suspected data breach, users should immediately disconnect from the compromised device and freeze affected accounts [22]. - Changing passwords for all related accounts and retaining evidence of the breach are crucial steps in addressing the situation [22]. - Users are encouraged to report violations to relevant platforms and authorities, and to consider legal action if financial loss occurs due to the breach [22].
传华硕1TB资料被盗 官方回应称供应商系统受到影响
Xi Niu Cai Jing· 2025-12-08 07:55
事件曝光后,华硕发布声明称,此次数据泄露并非华硕内部系统被攻破,根源在于一家外部供应商的系统遭受网络入侵。泄露数据仅涉及部分用于华硕智能 手机的相机相关源代码,但未波及华硕核心产品体系、内部运营系统及用户个人数据,终端产品安全运行不受直接影响。 针对此事,华硕表示已启动应急响应机制,正协同第三方专业安全团队开展深入调查,并全面推进风险评估与防护机制升级。此外,华硕还承诺将强化供应 链安全,并继续遵守网络安全标准。 公开资料显示,Everest惯常采用"先窃取后谈判"的攻击策略,通过盗取企业核心技术知识产权和开发档案作为勒索筹码,即便目标企业具备数据备份能力, 仍可能因知识产权外泄陷入被动。 据多家媒体报道,国际勒索软件组织Everest于暗网公布消息,声称已入侵相关系统并窃取华硕超过1TB容量的资料。 ...
“磐石行动”三连冠 陆控构筑数字金融安全底座
Bei Jing Shang Bao· 2025-12-08 06:06
Core Insights - The integration of "Artificial Intelligence +" is driving a paradigm shift in the information security industry, necessitating a transition from traditional decentralized defenses to systematic, intelligent, and practical security capabilities [1][10] - The "Rock Solid Action" initiative in Shanghai has become a benchmark for assessing the cybersecurity capabilities of enterprises, with the 2025 event expanding to include 58 top attack teams and 187 defense teams, totaling nearly 4,000 participants [1][3] Group 1: Industry Developments - The 2025 "Rock Solid Action" event introduced advanced attack scenarios such as AI deep forgery and supply chain penetration, attracting hundreds of cross-industry companies and nearly 4,000 technical experts [4] - The "Iron Triangle" of Shanghai's information security, consisting of Lujin Technology, Hehe Information, and Shizhi Information, has achieved three consecutive years of excellence in the "Blue Team" category, reflecting a robust defense system aligned with industry needs [4][10] Group 2: Company Performance - Lujin Technology's performance in the "Rock Solid Action" highlights its ability to adapt financial-grade defense capabilities to general security scenarios, evolving from basic vulnerability defense in 2023 to addressing AI deep forgery attacks in 2025 [4][5] - The company has also excelled in other competitions, such as the "Guan An Cup" ISG competition and the ninth CTF competition organized by Ping An Group, demonstrating its commitment to practical security training [5] Group 3: AI and Security Innovations - Lujin Technology is implementing an AI-driven dynamic defense system that transitions from passive defense to proactive warning, utilizing deep learning algorithms to identify hidden attack chains in real-time [9] - The company has developed an automated security operations platform that enhances incident response efficiency, achieving an average response time of just 2 minutes for over 5,598 attacks, significantly reducing manpower requirements [9] Group 4: Strategic Vision - The rise of the "Iron Triangle" in Shanghai's fintech security sector is attributed to long-term accumulation and precise planning, establishing a benchmark for local fintech companies and providing a replicable model for national digital economic development [10] - Lujin Technology's focus on AI technology, compliance, and practical defense experience positions it as a key player in safeguarding data security and financial stability in the evolving digital economy [10]
一道语音指令让从未接入互联网的机器人破防,于是它开始了攻击……
Di Yi Cai Jing Zi Xun· 2025-12-08 04:15
Group 1 - The core issue highlighted is the increasing vulnerability of security systems in the face of AI-driven attacks, with the average time to successfully execute an attack decreasing from 9 days in 2021 to just 25 minutes in 2023 [1] - The GEEKCON competition showcased a significant security flaw in a humanoid robot, allowing attackers to remotely control it through a voice command, which raises concerns about systemic risks in future robotic clusters [2] - There is a pressing need for security mechanisms to be integrated from the design phase, rather than relying on post-incident patches, as many companies currently focus on compliance rather than effective security measures [3] Group 2 - The current approach to security, characterized by fragmented defenses and reactive measures, is ineffective against AI-driven threats, as attackers can now simulate legitimate behavior to bypass security systems [4] - The introduction of AI in security operations has the potential to drastically improve efficiency, with AI systems capable of processing significantly more data compared to manual methods, thus enhancing risk monitoring [6] - New security architectures are emerging, such as those proposed by companies like Palo Alto Networks and Fortinet, which aim to create adaptive and self-evolving security systems [6] Group 3 - The concept of pricing security based on effectiveness rather than compliance is gaining traction, with calls for the promotion of cybersecurity insurance to alleviate user anxiety and assess the true capabilities of security vendors [7] - Recent initiatives by the Chinese government to promote cybersecurity insurance indicate a shift towards integrating financial services with cybersecurity, aiming to enhance corporate risk management capabilities [7][8] - The future of cybersecurity may depend on the establishment of verifiable and sustainable operational mechanisms, as insurance models could incentivize companies to improve their defensive capabilities [8]
金山软件申请风险处理方法、装置、系统及计算设备专利,提升风险处理的时效性和容错性
Jin Rong Jie· 2025-12-08 03:43
北京金山软件有限公司,成立于1994年,位于北京市,是一家以从事软件和信息技术服务业为主的企 业。企业注册资本1000万人民币。通过天眼查大数据分析,北京金山软件有限公司参与招投标项目20 次,财产线索方面有商标信息63条,专利信息120条,此外企业还拥有行政许可13个。 声明:市场有风险,投资需谨慎。本文为AI基于第三方数据生成,仅供参考,不构成个人投资建议。 国家知识产权局信息显示,珠海金山软件有限公司、北京金山软件有限公司申请一项名为"风险处理方 法、风险处理装置、网络安全系统及计算设备"的专利,公开号CN121077698A,申请日期为2025年7 月。专利摘要显示,本说明书实施例提供风险处理方法、风险处理装置、网络安全系统及计算设备,其 中所述风险处理方法应用于网络安全平台,网络安全平台对接不同类型的安全设备,基于存在访问风险 的风险终端的访问信息,识别出风险终端的风险访问类型,自动向风险访问类型对应的目标安全设备下 发携带访问信息的风险处理指令,指示目标安全设备基于访问信息对风险终端进行对应的风险处理,提 升了风险处理的时效性和容错性,保证了网络系统的安全性,并且使用网络安全平台对接不同类型的安 ...
国安部披露:有境外间谍在机关周边设置恶意Wi-Fi
Xin Lang Cai Jing· 2025-12-07 01:14
Core Viewpoint - Public Wi-Fi, while convenient, poses significant risks including data theft and cyberattacks, necessitating heightened awareness and protective measures [1][3]. Group 1: Risks of Public Wi-Fi - Malicious Wi-Fi networks can be set up by foreign intelligence agencies near sensitive locations, risking exposure of confidential information if connected by officials [3]. - Unsecured public Wi-Fi serves as a critical channel for hackers, potentially allowing remote control of user devices and threatening personal and public safety [3]. - Data generated while using insecure public Wi-Fi can be illegally collected and analyzed, leading to the creation of user profiles that may be exploited for misinformation campaigns, undermining social stability [3]. Group 2: Prevention Measures - Users should disable the automatic connection feature on their devices to prevent unintended connections to malicious networks and verify the authenticity of public Wi-Fi before connecting [4]. - It is advised to avoid sensitive transactions, such as logging into private accounts or conducting online banking, while on public Wi-Fi to mitigate risks [4]. - Installing and regularly updating protective software can help prevent malware attacks, and using virtual private networks (VPNs) can encrypt data transmission, enhancing security [6].
中国驻加拿大使馆发言人就加方炒作所谓“中国网络攻击”答问
Zhong Guo Xin Wen Wang· 2025-12-06 04:41
来源:中国新闻网 编辑:董文博 广告等商务合作,请点击这里 中国驻加拿大使馆发言人就加方炒作所谓"中国网络攻击"答问 中新网12月6日电 据中国驻加拿大使馆微信公众号消息,驻加拿大使馆发言人就加方炒作所谓"中国网 络攻击"答记者问。 有记者问:日前,加拿大网络安全中心与美国网络安全与基础设施安全局和国家安全局联合发布分析报 告称,中国政府支持的网络威胁行为者使用Brickstorm恶意软件入侵政府服务机构、设施以及信息技术 行业组织系统。请问中方有何评论? 发言人称,众所周知,美国才是名副其实的"黑客帝国",是网路攻击的集大成者和全球网络安全的最大 威胁。所谓分析报告对美国肆无忌惮的网络攻击行为视而不见,却对中国进行无端栽赃抹黑,纯属贼喊 捉贼、别有用心,中方对此坚决反对。 发言人指出,中国是网络攻击的主要受害国之一,一贯坚决反对并依法打击一切形式的网络攻击行为, 坚定致力于维护网络安全。中方敦促加方立即停止随美起舞,停止把网络安全问题政治化、污名化,停 止利用网络安全问题抹黑中国。 本文为转载内容,授权事宜请联系原著作权人 中新经纬版权所有,未经书面授权,任何单位及个人不得转载、摘编或以其它方式使用。 关注 ...