网络安全
Search documents
捷豹路虎3.3万名员工被告知“停工停产”
Di Yi Cai Jing· 2025-09-19 02:01
Core Insights - Jaguar Land Rover has been affected by a cyber attack, which was discovered in early September, leading to production disruptions and an extended pause until September 24, 2025 [2] - The company's IT team is working with third-party experts to gradually restart global systems, including the production supply chain, while assessing potential risks [2] - The cyber attack has impacted the global system, including the local production supply chain in the UK, which may affect the production schedule of imported vehicles [2] Company Response - Jaguar Land Rover has informed its 33,000 global employees about the ongoing impact on production lines [2] - The company has communicated with retail partners in China, stating that operations remain normal, and is investigating the extent of data affected by the cyber incident [2] - A commitment has been made to report any affected user data to relevant regulatory authorities and to contact affected parties promptly if necessary [2]
CrowdStrike预期至2027年新增ARR至少增长20%,优于预期
Ge Long Hui A P P· 2025-09-19 01:26
格隆汇9月19日|CrowdStrike在投资者日公布长期业绩目标,预期至2027年新增年度经常性收入(ARR) 将录得最少20%的增长,高于分析师预期,并计划于2031年达到100亿美元,再于2036年倍增至200亿美 元。 ...
全球3.3万名员工被告知“停工停产”!捷豹路虎回应一财
Di Yi Cai Jing· 2025-09-19 01:23
Core Viewpoint - Jaguar Land Rover has faced a significant cyber attack in the UK, impacting its global operations and production schedules [2]. Group 1: Incident Overview - The cyber attack was discovered by Jaguar Land Rover in early September, leading to ongoing updates regarding the situation [2]. - The company has informed its 33,000 global employees that production lines are still affected, extending the production halt until September 24, 2025 [2]. Group 2: Response and Impact - Following the attack, the IT team at headquarters collaborated with third-party experts to gradually restart global systems, including the production supply chain [2]. - The company is actively assessing potential risks across various segments, although there has been no impact on deliveries to the Chinese market as of now [2]. Group 3: Data Security and Communication - Jaguar Land Rover's Chinese website has issued a statement regarding the cyber security incident, confirming that retail partners are still operating normally [2]. - The company acknowledged that some data has been affected and is in the process of reporting to relevant regulatory authorities, with ongoing investigations to determine the extent of the data impact [2].
2025年国家网络安全宣传周 法治日主会场活动举行
Ren Min Wang· 2025-09-19 01:00
Core Viewpoint - The event held on September 18 in Kunming, Yunnan, aims to showcase the achievements in the cybersecurity field during the 14th Five-Year Plan period and enhance public awareness of cybersecurity [1] Group 1: Event Overview - The main event for the National Cybersecurity Publicity Week focused on the theme "Digital Intelligence Interconnection, Co-Governance and Shared Benefits" [1] - The event included discussions on topics such as security management of new technologies and applications, combating cybercrime, national identity authentication public services, and protection of critical information infrastructure [1] - Experts from various institutions, including Renmin University of China and the Chinese Academy of Social Sciences, provided insights on new challenges in cybersecurity and offered recommendations for strengthening cybersecurity efforts [1] Group 2: Public Engagement - The main venue utilized a hybrid format combining online and offline participation to promote legal knowledge about cybersecurity and introduce the "Clean Network 2025" and "Protect Network 2025" initiatives [1] - The event aimed to enhance public defense capabilities by explaining protective skills through typical case studies [1] Group 3: Law Enforcement Commitment - The Cybersecurity Bureau of the Ministry of Public Security emphasized its commitment to maintaining security in cyberspace and contributing to the construction of a strong cyber nation [2]
江苏有线筑牢2025数字时代网络安全防线
Xin Hua Ri Bao· 2025-09-18 22:32
Core Viewpoint - Cybersecurity is a crucial foundation for national security and a prerequisite for the high-quality development of the digital economy, with Jiangsu Cable (600959) implementing a comprehensive cybersecurity strategy to support the construction of a digital Jiangsu and the network power strategy [1] Group 1: Cybersecurity Training - Jiangsu Cable emphasizes the importance of cybersecurity as a national security cornerstone and has established a multi-layered defense system combining technical, human, and institutional measures [1] - The company focuses on practical training and exercises to enhance capabilities and build a robust cybersecurity framework [1] Group 2: Practical Drills - From May to August 2025, Jiangsu Cable conducted extensive cybersecurity drills, identifying and rectifying over 370 risk vulnerabilities, significantly reducing exposure to potential attacks [2] - The company successfully identified and blocked over 22,000 malicious IP addresses and handled more than 12,000 abnormal access requests during the drills, enhancing its cybersecurity response capabilities [2] Group 3: Security Assurance - During critical events from August to September 2025, Jiangsu Cable prioritized cybersecurity, implementing a comprehensive monitoring and response plan to ensure zero incidents [3] - The company managed to block 136 malicious IP addresses and 7 malicious domains, ensuring uninterrupted transmission and data security [3] Group 4: Foundation Strengthening - In 2025, Jiangsu Cable focused on enhancing its cybersecurity infrastructure, identifying and rectifying over 1,800 high-risk vulnerabilities and weak passwords through a combination of automated scanning and manual penetration testing [4][5] - The company implemented strict data security measures, including encryption and access control, to protect sensitive information and ensure data recoverability [5] Group 5: Collaborative Governance - Jiangsu Cable promotes a collaborative cybersecurity governance model, revising key policies and ensuring comprehensive coverage across all levels of management [6] - The company actively participates in provincial cybersecurity initiatives and public awareness campaigns to enhance user safety and fraud prevention [6] Group 6: Future Commitment - Jiangsu Cable is committed to continuous innovation in cybersecurity technology and improving its protective measures to support the high-quality development of the digital economy [7]
网络安全公司Netskope(NTSK.US)登陆美股市场 开盘报23美元
Zhi Tong Cai Jing· 2025-09-18 16:26
周四,网络安全公司Netskope(NTSK.US)美国IPO首日开盘报23美元,现涨超27%,报24.27美元,总市 值近93亿美元。IPO价格为19美元。Netskope是一家基于云的网络安全公司,成立于2012年,开发有助 于企业保护应用程序、网站和数据的软件。 ...
网络安全宣传周 | 网络安全知识科普,建议学习+收藏!
Sou Hu Cai Jing· 2025-09-18 14:13
Core Points - The 2025 National Cybersecurity Awareness Week will take place from September 15 to 21, focusing on the theme "Cybersecurity for the People, Cybersecurity Relies on the People" to ensure high-level security for high-quality development [1] - The event aims to promote the implementation of various cybersecurity laws and regulations, including the Cybersecurity Law, Data Security Law, and Personal Information Protection Law, while showcasing achievements in the cybersecurity field since the 18th National Congress of the Communist Party of China [1] Group 1: Cybersecurity Laws and Regulations - The Cybersecurity Law, enacted on June 1, 2017, is China's first comprehensive law regulating cybersecurity management, marking a significant milestone in the country's legal framework for cyberspace [3] - The Data Security Law, effective from September 1, 2021, serves as a foundational law in the data sector and is crucial for national security [6][7] - The Personal Information Protection Law, effective from November 1, 2021, aims to protect personal information rights and regulate personal information processing activities [9] Group 2: Key Initiatives and Frameworks - The Critical Information Infrastructure Security Protection Regulations, effective from September 1, 2021, are the first administrative regulations specifically targeting the security of critical information infrastructure [4][5] - The Generative Artificial Intelligence Service Management Interim Measures, effective from August 15, 2023, are the first normative policies in China aimed at regulating generative AI services [11] - The establishment of a comprehensive cybersecurity legal framework indicates that cyberspace is not a lawless area, emphasizing the importance of legal compliance in cybersecurity [12] Group 3: Cybersecurity Awareness and Education - The event will focus on educating the public about cybersecurity risks, including telecom fraud, information leakage, and malicious software, while promoting cybersecurity knowledge and skills [1] - The initiative aims to raise awareness about the potential dangers of the internet while highlighting the importance of cybersecurity in daily life [1]
微软Windows再次被指暗藏后门,区别对待中国用户
Guan Cha Zhe Wang· 2025-09-18 12:45
Core Viewpoint - The article discusses allegations against Microsoft regarding its Windows system's differential treatment of users in Europe and Asia, particularly China, raising concerns about privacy violations and national data security [2][3]. Group 1: Allegations Against Microsoft - A network security technician named "Xuandao" claims that Microsoft uses its monopoly position to hide encrypted data and dynamically release unknown programs to collect user data through the UCPD.sys driver [2][3]. - UCPD.sys is alleged to contain mechanisms that specifically target Chinese software vendors, employing blacklists to restrict competition and maintain Microsoft's market dominance [2][4]. - Legal experts suggest that if these allegations are true, Microsoft may be violating personal privacy laws and engaging in unfair competition practices [2][3][15]. Group 2: Technical Analysis of UCPD.sys - UCPD.sys, which is designed to protect user default application settings, has been found to operate in a way that undermines user control, automatically reverting settings to Microsoft applications after user attempts to change them [3][6]. - The driver is reported to have a "remote loading and execution" capability, allowing it to monitor and modify system settings without user awareness, which experts have labeled as an "invisible backdoor" [3][7]. - The driver includes a blacklist of numerous Chinese software products, indicating a systematic effort to limit their functionality and market presence [4][6]. Group 3: Regional Disparities in User Experience - UCPD.sys reportedly has built-in regional detection logic, leading to significant differences in user experience between Chinese and European users, with the latter enjoying more freedom to modify default applications [8][10]. - In Europe, users can easily switch default applications without interference from the system, while in China, the system enforces data collection and restricts user choices [10][11]. Group 4: Implications for User Security and Market Competition - The restrictions imposed by UCPD.sys on Chinese security software weaken user defenses, exposing them to higher security risks as these applications are unable to function effectively [7][15]. - The article highlights a broader concern that such practices may facilitate foreign attacks on critical information infrastructure in China, posing risks to personal privacy and corporate secrets [15][16].
网络安全周 | 当网络陷阱出现时,我们该如何保护自己?
中泰证券资管· 2025-09-18 11:33
Core Viewpoint - The article emphasizes the importance of cybersecurity in the digital age, highlighting the various risks associated with online activities and the need for robust protective measures to safeguard personal information and assets [3][11]. Group 1: Ubiquitous Network Threats - The article outlines common network threats such as malware, which can infiltrate devices to steal personal information or damage system files [5]. - Account hijacking is increasingly prevalent, especially when users employ the same credentials across multiple platforms, leading to potential fraud and reputational damage [5]. - Various forms of online scams are discussed, including traditional lottery scams and emerging online lending frauds, which exploit personal data for malicious purposes [6]. Group 2: Building a Cybersecurity Defense Network - Establishing device security is fundamental, including installing reliable security software and regularly updating operating systems and applications to patch vulnerabilities [8]. - Password management is crucial; using strong, unique passwords for different accounts can significantly reduce the risk of unauthorized access [8]. - Developing safe online habits is essential, such as being cautious with public Wi-Fi and scrutinizing links or files from unknown sources [8]. Group 3: Practical Strategies for Information Protection - Personal information should be meticulously protected, including shredding sensitive documents and being cautious about sharing location data on social media [10]. - Managing app permissions is vital; users should only grant necessary permissions and regularly review existing app settings [10]. - In case of a security breach, immediate actions should include checking financial statements for anomalies, ceasing contact with suspicious parties, and reporting incidents to authorities [10].
聚焦2025国家网络安全周:鸿蒙隐私安全多重守护为用户数字生活护航
Huan Qiu Wang· 2025-09-18 08:06
Core Viewpoint - The National Cybersecurity Awareness Week, themed "Cybersecurity for the People, Cybersecurity by the People," was officially opened in Kunming, showcasing Huawei's advanced cybersecurity solutions and products, particularly the HarmonyOS privacy security solutions [1] Group 1: Huawei's Cybersecurity Initiatives - Huawei's HarmonyOS 5 has seen over 14 million devices equipped, indicating strong market and user recognition of its new security concepts and practices [1] - The new self-developed Star Shield security architecture in HarmonyOS 5.0 has restructured the security system, reducing malicious app installations by 16 million monthly and intercepting over 8.6 billion unreasonable permission requests [1] - The HarmonyOS 6 developer Beta version upgrades the Star Shield security architecture, incorporating AI capabilities for intelligent recognition and proactive protection against scenarios like peeping and fraud [1] Group 2: Huawei's Product Innovations - Huawei introduced the first commercial HarmonyOS laptop, the Qingtian HM940, which features an AI assistant and enterprise-level security solutions, marking a new era in commercial productivity [3] - The HarmonyOS computer series emphasizes comprehensive privacy and security protection, including chip-level full-disk encryption and a super privacy mode for user control [4] - The Huawei Qingtian brand encompasses a range of commercial products and solutions, focusing on reliable quality, independent innovation, and user-centric design [5] Group 3: Industry Collaboration and Future Outlook - Huawei's Qingtian brand collaborates with partners to create industry solutions across sectors like government, finance, education, and energy, enhancing the integration of hardware and software [5] - The theme of cybersecurity emphasizes the role of the public as both the object of protection and a participant in safeguarding digital security, reflecting Huawei's commitment to a secure and intelligent digital future [5]