网络安全
Search documents
AI浏览器被曝重大安全漏洞,2分30秒内完成盗号
21世纪经济报道· 2025-08-26 12:54
Core Viewpoint - The article highlights significant security vulnerabilities in the AI browser Comet developed by Perplexity, which can lead to the unauthorized access of sensitive user information through hidden malicious commands [1][2]. Group 1: Security Vulnerabilities - Comet, an AI-native browser, was found to have a critical security flaw that allows attackers to extract sensitive information such as email addresses and one-time passwords (OTP) by leaving malicious commands in forum comments [1]. - The vulnerability was first discovered by the Brave browser's security team, who demonstrated that the AI agent could execute hidden commands simply by summarizing a webpage [1][2]. - Despite Perplexity's claims of having fixed the issue, subsequent tests by Brave indicated that the problem was not fully resolved, raising concerns about user data security [2]. Group 2: Industry Response and Challenges - The article discusses the broader implications of AI browser security, noting that as users become accustomed to AI browsers, the risks associated with sensitive data sharing will increase significantly [2][3]. - It mentions that traditional cybersecurity measures are becoming inadequate, necessitating new security frameworks to protect against emerging threats [2][3]. - The industry is exploring various security architectures, with Brave proposing a four-layer defense strategy for AI browsers to mitigate risks associated with hidden commands and unauthorized actions [4]. Group 3: Competitive Landscape - The competition in the AI agent space is intensifying, with major players like Apple, Anthropic, Google, and OpenAI, as well as domestic companies such as Baidu, ByteDance, Tencent, and Alibaba, heavily investing in AI technologies [3]. - The article notes that some companies are shifting their approach by avoiding features similar to Comet and instead focusing on virtual machine and cloud-based browser models to enhance security [4].
数码视讯涨0.31%,成交额4.91亿元,今日主力净流入-3329.23万
Xin Lang Cai Jing· 2025-08-26 08:43
Core Viewpoint - The company is actively leveraging blockchain technology and digital currency applications to enhance its business model and expand into new markets, particularly in digital rights management and internet finance. Group 1: Business Developments - The subsidiary Kuai Shiting is focused on utilizing blockchain technology to empower the industry and expand applications in the metaverse, issuing digital collectibles to provide new rights and copyright proof for digital content [2] - The company has initiated research on blockchain-based digital copyright management technology, which enhances copyright control for authors and ensures timely rights confirmation [2][3] - The company is developing digital currency application products and is actively pursuing market collaborations through its subsidiary Fengfu Payment [3] Group 2: Financial Performance - For the first half of 2025, the company achieved operating revenue of 265 million yuan, representing a year-on-year growth of 24.66%, and a net profit attributable to shareholders of 16.7 million yuan, a significant increase of 2747.64% [8] - The company has distributed a total of 370 million yuan in dividends since its A-share listing, with 42.83 million yuan distributed in the last three years [9] Group 3: Market Position and Trends - The company holds the most provincial network operator cases and the highest national secret certification level in traditional DVB network security, indicating a strong market position [3] - The internet finance sector is a key focus for the company, with rapid growth in P2P cooperation business, currently collaborating with nearly 400 partners and achieving a monthly capital flow of 1.5 billion yuan [3]
卫星互联网牌照+阅兵倒计时,国防ETF(512670)交投活跃
Xin Lang Cai Jing· 2025-08-26 07:22
Group 1 - The core viewpoint of the news is that the issuance of satellite internet licenses to major telecom companies marks a significant step towards commercial operations in China's satellite internet sector, which is expected to stimulate the military industry sector [1] - The recent countdown to the 93rd National Day military parade is anticipated to further catalyze the performance of the military industry sector [1] - Advanced equipment showcased in the upcoming military parade is expected to become a focus of the "14th Five-Year Plan," with increased investment anticipated in the future [1] Group 2 - The China Defense ETF closely tracks the China Defense Index, which includes listed companies under the ten major military groups and those providing weaponry to the armed forces [2] - The management and custody fees for the Defense ETF are the lowest among its peers at 0.40%, making it unique in its category [2] - As of July 31, 2025, the top ten weighted stocks in the China Defense Index account for 43.88% of the index, with key companies including AVIC Shenyang Aircraft Corporation and AVIC Aviation Power [2]
天融信申请网络设备策略同步方法相关专利,实现基于设备上线事件触发的策略实时同步
Sou Hu Cai Jing· 2025-08-26 05:05
Core Viewpoint - Beijing Tianrongxin Network Security Technology Co., Ltd. and its affiliated companies have applied for a patent related to dynamic policy synchronization methods for network devices, indicating a focus on enhancing cybersecurity solutions [1][2]. Company Overview - Beijing Tianrongxin Network Security Technology Co., Ltd. was established in 1995, located in Beijing, with a registered capital of 350 million RMB. The company has invested in 46 enterprises and participated in 5,000 bidding projects, holding 223 trademark records and 2,776 patent records [1]. - Beijing Tianrongxin Technology Co., Ltd. was founded in 2003, also in Beijing, with a registered capital of approximately 75.76 million RMB. The company has invested in 11 enterprises and participated in 492 bidding projects, holding 2 trademark records and 2,701 patent records [2]. - Beijing Tianrongxin Software Co., Ltd. was established in 2012, located in Beijing, with a registered capital of 50 million RMB. The company has invested in 1 enterprise and participated in 6 bidding projects, holding 2,677 patent records [2]. Patent Application Details - The patent application titled "Network Device Policy Synchronization Method, Electronic Device, Readable Medium, Program Product" was filed on June 2025, with publication number CN120547183A. The method involves synchronizing policy updates for network devices based on their current policy version and the latest version in the network [1].
人工智能下半场 智能体技术重构安全生态
Zhong Guo Chan Ye Jing Ji Xin Xi Wang· 2025-08-26 03:23
Core Insights - Artificial intelligence (AI) is recognized as a strategic force driving a new wave of technological revolution and industrial transformation, marking a new phase in its development characterized by "technical breakthroughs, scenario implementation, and safety assurance" [1] - The integration of AI with the real economy is becoming increasingly evident, with significant innovations and advancements in AI technology [2] - The rise of intelligent agents (AI agents) is transforming industries and enhancing productivity, leading to a fundamental change in human-computer interaction [2][7] Group 1: AI Development and Integration - AI technology is rapidly evolving, with collective breakthroughs in the field and deeper integration with the real economy [2] - The combination of AI and security is becoming tighter, enhancing network security through proactive and adaptive technological tools [2] - The development of large models is ushering in an era of intelligence, driving high-quality development across various sectors [2] Group 2: Security Risks and Challenges - The rapid advancement of AI technology is accompanied by increasing cybersecurity risks, with hackers leveraging AI to enhance their capabilities [4] - There is a growing complexity in governance and security challenges, necessitating a focus on innovation and the integration of AI with security measures [3][4] - The emergence of new security threats requires a proactive approach to enhance response capabilities and safeguard digital infrastructure [4][5] Group 3: Recommendations for Industry Players - Private enterprises are encouraged to align with national strategies, promote open innovation, and build a governance system that fosters responsible AI development [3] - Collaboration among various stakeholders, including government, industry, academia, and research, is essential to create a robust AI and security ecosystem [10][12] - Emphasis on building a reliable and efficient AI infrastructure is crucial for supporting the development of AI applications with business value [9][11] Group 4: Future Directions and Innovations - The evolution of AI agents is seen as a key to overcoming existing limitations in AI applications, transitioning from mere thinking capabilities to actionable tasks [7][8] - There is a need for continuous innovation in AI technology and architecture to enhance efficiency and accessibility while ensuring sustainable development [11] - International collaboration is vital to address global challenges in AI and digital security, focusing on ethical guidelines and data sharing [12]
美国内华达州政府办公室关闭
Xin Jing Bao· 2025-08-26 02:34
值班编辑康嘻嘻 经常有读者朋友错过推送 来源央视新闻 据央视新闻消息,当地时间8月25日,美国内华达州因一起"网络安全事件"关闭州政府办公室,多个网 站和电话线路受影响。 美国网络安全和基础设施安全局表示正在协助应对,事件或与黑客攻击有关。 ...
因网络安全事件,美国内华达州政府办公室关闭
Xin Lang Cai Jing· 2025-08-26 02:10
美国网络安全和基础设施安全局表示正在协助应对,事件或与黑客攻击有关。(央视新闻) 当地时间8月25日,美国内华达州因一起"网络安全事件"关闭州政府办公室,多个网站和电话线路受影 响。 ...
因网络安全事件 美国内华达州政府办公室关闭
Yang Shi Xin Wen· 2025-08-26 02:06
当地时间8月25日,美国内华达州因一起"网络安全事件"关闭州政府办公室,多个网站和电话线路受影响。 美国网络安全和基础设施安全局表示正在协助应对,事件或与黑客攻击有关。(央视记者 刘旭) ...
安博通:实际控制人钟竹拟协议转让约430万股公司股份
Mei Ri Jing Ji Xin Wen· 2025-08-25 11:28
每经AI快讯,安博通(SH 688168,收盘价:88.4元)8月25日晚间发布公告称,公司收到控股股东、实 际控制人钟竹先生的通知,钟竹先生于2025年8月25日与南京一三一私募基金管理有限公司签署了《股 份转让协议》,钟竹先生拟将其持有的约430万股公司股份以72元/股的价格转让给一三一白龙马3号私 募证券投资基金,占公司总股本的5.6%。本次转让完成后,公司控股股东、实际控制人未发生变化。 本次股权转让后部分资金出借给公司用于公司发展。 截至发稿,安博通市值为68亿元。 每经头条(nbdtoutiao)——A股成交连续8天破2万亿元,券商招聘也来了!行业巨头秋招"求才",25个 岗位都有什么特点? (记者 王晓波) 2024年1至12月份,安博通的营业收入构成为:网络安全占比99.88%,其他业务占比0.12%。 ...
护网—2025|警惕“定时炸弹”——0day漏洞
Xin Lang Cai Jing· 2025-08-25 11:28
Core Viewpoint - The article emphasizes the critical importance of zero-day vulnerabilities in cybersecurity, highlighting their potential to cause significant harm to individuals, businesses, and national infrastructure. Group 1: Definition and Impact of Zero-Day Vulnerabilities - Zero-day vulnerabilities are security flaws in software that manufacturers have not yet discovered or patched, making users and companies vulnerable to immediate exploitation by hackers [2]. - Attacks on critical infrastructure can threaten national stability, as demonstrated by scenarios where hackers exploit multiple zero-day vulnerabilities to control and destroy essential services like power plants [2]. - Economic losses can be substantial when businesses fall victim to zero-day attacks, such as ransomware incidents that encrypt core technical data and customer databases [4]. Group 2: Broader Implications of Zero-Day Vulnerabilities - Personal information can be commodified, leading to severe privacy breaches, as seen when social media platforms experience data theft due to zero-day vulnerabilities [6]. - E-commerce platforms can also be targeted, resulting in the exploitation of user shopping habits for illicit profit [6]. Group 3: Challenges in Mitigating Zero-Day Vulnerabilities - The underground market for zero-day vulnerabilities consists of a well-defined supply chain involving vulnerability discoverers, intermediaries, and attackers, complicating prevention efforts [8]. - Vulnerability discoverers actively seek system weaknesses, while intermediaries package and sell this information to criminals [8]. Group 4: Recommendations for Individuals and Businesses - Regularly updating system software is crucial, as manufacturers provide patches for zero-day vulnerabilities as soon as they are identified [9]. - Installing professional antivirus software and deploying firewalls and intrusion detection systems (IDS) are essential for real-time monitoring and protection against potential threats [9]. - Adopting good security practices, such as avoiding unknown software downloads and being cautious with public Wi-Fi, can significantly reduce the risk of zero-day attacks [9]. - Immediate action should be taken if unusual device behavior is detected, including disconnecting from the internet and contacting customer support to mitigate potential damage [9].