Workflow
网络安全
icon
Search documents
映翰通跌2.02%,成交额5186.26万元,主力资金净流出194.67万元
Xin Lang Cai Jing· 2025-11-12 05:30
Core Viewpoint - The stock price of Yinghantong has experienced fluctuations, with a year-to-date increase of 51.59% but a recent decline in the last five and twenty trading days [2]. Group 1: Stock Performance - As of November 12, Yinghantong's stock price decreased by 2.02%, trading at 49.60 CNY per share, with a total market capitalization of 3.653 billion CNY [1]. - Year-to-date, the stock has risen by 51.59%, while it has dropped by 1.43% in the last five trading days and 4.10% in the last twenty trading days [2]. - The stock has been on the "龙虎榜" (a list of stocks with significant trading activity) once this year, with the last appearance on February 10 [2]. Group 2: Company Overview - Yinghantong, established on May 29, 2001, and listed on February 12, 2020, is based in Beijing and specializes in the research and application of industrial IoT technology [2]. - The company's main revenue sources include industrial IoT products (52.00%), smart vending control systems (16.17%), digital power distribution products (15.15%), enterprise network products (13.96%), and technical services (2.72%) [2]. - Yinghantong belongs to the communication equipment sector and is associated with concepts such as DeepSeek, artificial intelligence, edge computing, network security, and robotics [2]. Group 3: Financial Performance - For the period from January to September 2025, Yinghantong reported a revenue of 550 million CNY, reflecting a year-on-year growth of 34.61%, and a net profit attributable to shareholders of 103 million CNY, up by 23.00% [2]. - The company has distributed a total of 60.8295 million CNY in dividends since its A-share listing, with 34.6151 million CNY distributed over the past three years [3]. - As of September 30, 2025, the number of shareholders increased by 44.72% to 9,819, while the average circulating shares per person decreased by 31.08% to 7,501 shares [2].
某单位用办公室电话当密码,驻军分布等近2000份文件被窃取
Xin Lang Cai Jing· 2025-11-12 01:24
Core Points - A significant theft occurred at the Louvre Museum, where 9 pieces of Napoleon-era royal jewelry were stolen in just 7 minutes, resulting in an estimated economic loss of €88 million [1][3] - The security vulnerabilities of the Louvre have come under scrutiny, with reports indicating that the museum's systems had weak passwords and outdated software, including Windows 2000 and Windows Server 2003 [3] - French President Macron announced plans to completely restructure the Louvre's security system in response to the incident [3] Security Vulnerabilities - The thieves disguised themselves as workers and used a ladder to access the museum, highlighting a severe lapse in security measures [3] - An audit by the French National Cybersecurity Agency (ANSSI) revealed that simple passwords could grant full control over the Louvre's main server and core monitoring systems [3] - Despite warnings from cybersecurity officials, the Louvre failed to address these vulnerabilities in subsequent audits conducted in 2015 and 2017 [3] Broader Implications - The incident raises concerns about weak password practices not only in high-profile institutions like the Louvre but also in everyday life, where individuals often use easily guessable passwords [4][5] - The importance of strong password creation and management is emphasized, suggesting methods such as using memorable phrases and ensuring distinct passwords for different accounts [7][9] - The need for enhanced security measures, including antivirus software and regular system updates, is highlighted to prevent unauthorized access [8]
警惕“过保”网络设备成境外间谍“帮凶” 国家安全机关提示
Yang Shi Xin Wen· 2025-11-11 22:58
Core Insights - The article highlights the security risks associated with outdated electronic devices that have surpassed their manufacturer's support period, leading to unpatched vulnerabilities and increased exposure to cyber threats [1][2]. Group 1: Security Risks of Outdated Devices - Devices that are no longer supported by manufacturers become vulnerable due to unaddressed security flaws, making them easy targets for hackers [2]. - Once compromised, these devices can be used as tools for further attacks, allowing intruders to conduct operations undetected and access sensitive information [4]. Group 2: Escalation of Threats - A single vulnerability can lead to exponential threats as attackers exploit it to access sensitive data and network permissions, potentially affecting interconnected systems and critical infrastructure [6]. - The initial isolated technical flaw can escalate into complex security incidents, resulting in data breaches, service disruptions, and systemic risks [6]. Group 3: Recommendations for Mitigation - Users are advised to regularly check the lifecycle of their devices and replace those that are outdated to eliminate potential security risks [8]. - Implementing strict access controls and minimizing network exposure can help prevent compromised devices from being used as attack vectors [8]. - Continuous monitoring for firmware updates and security patches is essential to protect devices that are still within their support lifecycle [8].
国安部:你的设备还在“保质期”吗?
Guan Cha Zhe Wang· 2025-11-11 22:54
Core Viewpoint - The article highlights the security risks associated with outdated electronic devices that have surpassed their manufacturer's support period, leading to unpatched vulnerabilities and potential exploitation by hackers [1][2]. Group 1: Security Risks of Outdated Devices - Devices that are no longer supported by manufacturers become vulnerable due to unpatched security flaws, making them easy targets for hackers [2]. - Once compromised, these devices can be used as tools for further attacks, allowing intruders to access sensitive information and launch additional cyber operations [3]. Group 2: Escalation of Threats - A single vulnerability can lead to exponential threats as attackers exploit it to access sensitive data and expand their reach within the network, potentially affecting interconnected systems and critical infrastructure [4]. - The initial isolated technical flaw can evolve into complex security incidents, resulting in data breaches, service disruptions, and systemic risks [4]. Group 3: Recommendations from National Security Authorities - Users are advised to regularly check the lifecycle of their devices and replace outdated equipment to eliminate potential security threats [5]. - Implementing strict access controls and minimizing network exposure can help prevent compromised devices from being used as attack vectors [5]. - Continuous monitoring for firmware updates and security patches is essential to protect devices still within their support lifecycle [5].
双11下单忙,警惕藏在购物车后的诈骗方
第一财经· 2025-11-11 15:48
Core Viewpoint - The article highlights the increasing prevalence of online shopping fraud during the Double 11 shopping festival, emphasizing the need for consumer vigilance against various scams targeting online shoppers [3][10]. Group 1: Types of Scams - The article outlines several types of scams prevalent during the Double 11 shopping festival, including refund and compensation scams, where fraudsters lure victims into transferring money under the guise of refunds or compensation for faulty products [5][10]. - Another common scam involves impersonating customer service representatives, claiming issues with purchased items and prompting victims to share personal information or download malicious apps [10][11]. - The article also mentions phishing scams that exploit promotional messages to direct consumers to fake websites, leading to potential theft of personal information and funds [10]. Group 2: Fraud Prevention Measures - Authorities recommend that consumers adhere to the "four no principles" to protect themselves: do not engage in private communication outside official platforms, do not trust high compensation promises, avoid downloading unknown software, and do not transfer money to unfamiliar accounts [6][10]. - The article emphasizes the importance of consumer awareness and vigilance, urging individuals not to download any software based on unsolicited prompts and to safeguard their personal information [11][12]. - The article notes that the fraud industry has become increasingly sophisticated, operating in a "puzzle-like" manner where different teams handle various aspects of the scam, making it challenging to combat [10].
双11下单忙,警惕藏在购物车后的诈骗方
Di Yi Cai Jing· 2025-11-11 12:39
Core Viewpoint - The article emphasizes the increasing prevalence of online shopping fraud during the Double 11 shopping festival, highlighting the need for consumers to remain vigilant against scams that impersonate e-commerce platforms and lure individuals into downloading fraudulent applications or sharing personal information [1][6]. Group 1: Fraud Types and Tactics - Various types of scams have been identified, including refund and compensation fraud, where scammers set up fake online stores, send defective products, and then manipulate consumers into transferring money under the guise of compensation [4][6]. - Scammers are increasingly using tactics such as screen sharing and remote control of victims' devices to access sensitive banking information, leading to significant financial losses [5][6]. - The fraud schemes have evolved into a "puzzle-like" operational model, with different teams handling various aspects of the scam, making it difficult to dismantle the entire operation [6][7]. Group 2: Consumer Warnings and Recommendations - Authorities have issued warnings advising consumers to avoid private communications outside official platforms, refrain from adding unknown contacts on social media, and not to download unofficial software [1][4]. - The "Four No Principles" for consumer protection include not engaging in private conversations outside official platforms, not trusting high compensation promises, avoiding unknown software downloads, and not transferring money to unfamiliar accounts [4][6]. - The National Anti-Fraud Center has compiled a "Fraud Prevention Handbook" for Double 11, detailing common scams such as pre-sale fraud, impersonation of customer service, and fake prize notifications [6][7].
刷脸认证还安全吗?新型AI换脸盗号案细节曝光
Huan Qiu Wang Zi Xun· 2025-11-11 10:40
Core Viewpoint - The article highlights the alarming rise of AI face-swapping technology being exploited for identity theft and unauthorized access to e-commerce accounts, posing significant risks to personal information security [1][3][9]. Group 1: Incident Overview - In June 2024, police in Hangzhou discovered a suspicious advertisement promoting AI face-swapping technology that could bypass platform verification using just a user's facial photo [1]. - The technology allows criminals to gain unauthorized access to user accounts, potentially compromising sensitive information such as chat records [1][3]. - Two victims, Mr. Liu and Ms. Zhang, experienced unauthorized transfers of their e-commerce accounts, with Ms. Zhang losing her account shortly after purchasing it [5][9]. Group 2: Criminal Network and Arrests - Police identified a network of 150 abnormal e-commerce accounts linked to a criminal group utilizing AI face-swapping technology [10]. - The investigation led to the arrest of Zhang, who was found to be advertising the technology on foreign platforms, and subsequently, two accomplices, Wu and Wang, were also apprehended [12][14]. - The trio established a cooperative scheme where they charged fees for accessing personal information and facilitating account transfers, with profits exceeding 100,000 yuan [14]. Group 3: Legal Consequences - The court sentenced Zhang to three years and two months in prison, while Wu and Wang received three years and a suspended sentence of four years, respectively, for illegally obtaining computer information [14].
HTTP强制弹窗警告,谷歌为上网冲浪操碎了心
3 6 Ke· 2025-11-10 23:24
"能力越大、责任越大"是《蜘蛛侠》中的经典台词,这个道理放在现实世界中也一样。如今作为浏览器 领域无可争议的霸主,谷歌的Chrome又双叒叕开始为用户上网冲浪的安全操心了。日前谷歌方面宣 布,从2026年10月发布的Chrome 154版本开始默认启用"始终使用安全连接策略",让用户不会在不知情 的情况下访问HTTP网站。 从Chrome 154版本开始,一旦用户尝试访问HTTP网站,Chrome就会立刻进行弹窗警告。除非选择"无 视风险,坚持访问",否则Chrome将拒绝加载。需要注意的是,一旦用户对某个HTTP网站放行,下次 访问时Chrome就会默认执行,只有用户在清除浏览器数据后才需要重新进行确认,从而避免误伤。 用弹窗的方式来提示用户效果确实显著,可代价着实也不小。毕竟对于用户而言,弹窗提醒和弹窗广告 其实并无本质的区别,都会在客观上中断上网冲浪的体验。久而久之,为了不被弹窗干扰,用户反而会 无脑选择同意,进而对隐私和安全提示脱敏。这也是为什么过去数年频频打出隐私牌的欧盟,最近却开 始着手降低"cookie弹窗确认"出现的频率。 既然如此,谷歌为何还要用弹窗来警告用户不要访问HTTP网站呢?是因为在 ...
Telos(TLS) - 2025 Q3 - Earnings Call Transcript
2025-11-10 15:30
Financial Data and Key Metrics Changes - Revenue grew 116% in Q3 2025 to $51.4 million, exceeding guidance of $44-$47 million [7] - GAAP gross margin was 39.9%, and cash gross margin was 44.8%, both above guidance and previous quarter margins [7] - Adjusted EBITDA was $10.1 million, surpassing guidance of $4-$5.7 million, with an adjusted EBITDA margin of 19.6% [8][10] - Free cash flow was $6.6 million, representing a 12.8% free cash flow margin [8] Business Line Data and Key Metrics Changes - Telos ID was a significant driver of revenue growth, contributing to the overall performance [5][15] - Adjusted operating expenses were approximately $500,000 better than guidance due to cost discipline [7] Market Data and Key Metrics Changes - The company achieved a cumulative revenue growth of 44% in the first nine months of 2025 [9] - Cash gross margin expanded by 30 basis points to 43% year-over-year [9] Company Strategy and Development Direction - The company plans to continue evolving its Xacta platform with increased automation and new features [11] - The TSA PreCheck program has reached 504 enrollment locations, with plans for further evaluation and improvement [12][13] - The company forecasts existing programs will generate approximately $180 million in revenue for 2026, driven by growth in Telos ID [14] Management's Comments on Operating Environment and Future Outlook - Management noted that the government shutdown has caused delays in awards and administrative processes, but the impact on P&L has been modest [18][19] - The company maintains a robust pipeline of opportunities, with several tens of millions of revenue expected from new business in 2026 [21][41] - Management expressed confidence in continued year-over-year growth into the fourth quarter and 2026 [15][68] Other Important Information - The company has a multi-billion dollar pipeline of new business opportunities, with expectations for significant awards in the coming months [21][41] - The company has deployed $7.6 million to repurchase 2.1 million shares at a weighted average price of $3.69 per share [10] Q&A Session Summary Question: Impact of government shutdown on award decisions - Management indicated that awards are stalled and generally delayed due to the government shutdown, but the impact on P&L has been modest [18][19] Question: Initial feedback on Xacta AI product - Management reported strong initial traction with one major enterprise deployment and positive customer feedback [22][29] Question: Growth plans for TSA PreCheck program - Management stated that they will continue to evaluate and expand the network of enrollment locations to serve travelers better [36][38] Question: Revenue potential from the pipeline for 2026 - Management confirmed that the pipeline remains robust, with several tens of millions of revenue expected from new business opportunities [41][56] Question: Upsell potential for existing Xacta customers - Management noted significant excitement among existing customers for Xacta AI, with plans to target the installed base first [44][45]
Top Stocks With Earnings This Week: Plug, Oklo, Circle And More
Benzinga· 2025-11-10 13:38
Earnings Reports Overview - The earnings season is slowing down, but several retail-favorite companies are set to report this week [1] - Key companies reporting include Barrick Mining Corp., Plug Power Inc., Oklo Inc., Cisco Systems Inc., Walt Disney Co., and Applied Materials Inc. [2][3][5][10][11] Company-Specific Insights - Barrick Mining Corp. reported its third-quarter results before the market opened on November 10 [2] - Plug Power Inc. is expected to report losses of 12 cents per share and revenue of $179.54 million, having missed earnings expectations for the last 18 quarters [3] - Oklo Inc. is anticipated to report losses of 13 cents per share and revenue of $17.01 billion, with stock volatility noted ahead of the report [5] - Cisco Systems Inc. is expected to be a focal point for investors, particularly regarding management's guidance and updates on AI and cybersecurity business momentum [10] - Walt Disney Co. and JD.com Inc. will release earnings reports before the market opens on November 13 [11] - Applied Materials Inc. is set to release its Q4 results after the market closes on November 13 [11] Additional Companies Reporting - Other companies reporting this week include Workhorse Group Inc., Beyond Meat Inc., Microvision Inc., and Virgin Galactic Holdings Inc. [4][6][12]