Workflow
网络安全
icon
Search documents
金十数据全球财经早餐 | 2025年11月17日
Jin Shi Shu Ju· 2025-11-16 23:05
Core Viewpoint - The financial markets are experiencing volatility due to mixed signals from the Federal Reserve regarding interest rate policies, geopolitical tensions, and sector-specific performance in both U.S. and international markets [3][4][11]. Market Performance - U.S. stock indices showed mixed results with the Dow Jones down 0.65%, S&P 500 down 0.05%, and Nasdaq up 0.13% [4][8]. - European indices faced declines, with Germany's DAX30 down 0.69%, UK's FTSE 100 down 1.11%, and the Euro Stoxx 50 down 0.85% [4][8]. - Hong Kong's Hang Seng Index fell 1.85%, closing at 26,572.46 points, with significant declines in technology stocks [5][8]. - A-shares also declined, with the Shanghai Composite Index down 0.97%, closing below 4,000 points [6][9]. Commodity Prices - WTI crude oil prices rose by 2.13%, closing at $59.82 per barrel, while Brent crude increased by 0.22% to $63.95 per barrel [4][8]. - Gold prices fell by 2.2%, ending at $4,079.58 per ounce, and silver dropped by 3.4% to $50.56 per ounce [8][9]. Federal Reserve Signals - Federal Reserve officials, including Logan and Schmidt, issued strong hawkish signals, indicating that further rate cuts may not be appropriate at this time [11]. - The market is reacting to these signals, with expectations of interest rate stability impacting various asset classes [11]. Corporate Developments - Berkshire Hathaway disclosed a rare technology stock position, having built a stake in Alphabet, Google's parent company, during Q3 [11]. - Huawei is expected to announce breakthrough technologies in the AI sector, which could enhance computational resource efficiency [17].
“太子集团”天价比特币,被美国“黑吃黑”?
Sou Hu Cai Jing· 2025-11-16 03:29
Core Insights - A significant development has emerged regarding the theft of approximately 127,000 bitcoins, valued at around $15 billion, which occurred four years ago. The recent report from the National Computer Virus Emergency Response Center indicates that the stolen bitcoins have remained dormant, suggesting the involvement of a state-level hacking organization rather than typical criminal behavior [1][4]. Group 1: Incident Overview - The bitcoins were originally owned by Chen Zhi, chairman of the Cambodian Prince Group, who is currently facing charges from the U.S. Department of Justice for telecom fraud and money laundering. The DOJ has announced the seizure of the 127,000 bitcoins, which are believed to be the stolen assets from the LuBian mining pool hack in December 2020 [1][4][13]. - The LuBian mining pool, linked to the Prince Group, suffered a major attack in December 2020, resulting in the theft of over 90% of its bitcoin holdings, totaling approximately 127,272 BTC, which aligns closely with the amount mentioned in the DOJ's indictment [4][6]. Group 2: Technical Analysis - The report highlights that the stolen bitcoins were stored in non-custodial wallets, which are considered secure as they are not subject to freezing by legal orders. The private keys for these wallets were compromised due to a "pseudo-random number vulnerability," allowing hackers to execute the theft in under two hours [4][8]. - The bitcoins remained inactive until June 2024, when they were transferred to new addresses, which have since been marked as held by the U.S. government. This indicates a successful tracing of the stolen assets through blockchain analysis [6][8]. Group 3: Legal and Regulatory Implications - The DOJ's actions against Chen Zhi and the Prince Group have raised questions about the legality of the seizure process, as bitcoin is recognized as a legal asset in many jurisdictions. The legitimacy of the seizure's judicial support is under scrutiny [1][4]. - The case underscores the increasing scrutiny and regulatory measures surrounding cryptocurrencies, as the U.S. government is progressively incorporating digital currencies into its regulatory framework, which may limit the operational space for cryptocurrencies outside of regulation [16].
【省教育厅】2025年陕西省高校教职工网络安全技能大赛举办
Shan Xi Ri Bao· 2025-11-16 00:05
省教育厅教育信息化处负责人介绍,随着信息技术的飞速进步、人工智能的广泛应用,教育系统面 临的网络安全挑战愈发严峻,遭遇的问题也日益复杂。此次比赛通过选拔一批优秀的网络安全人才,推 动网络安全技能及应对策略在全省高校范围内普及与应用。 为深入提高竞赛质量、探索网络安全人才培育之道,当日还举办了2025年陕西高校网络安全人才培 养交流培训会,邀请国家级及省级网络安全学院的分管教学负责人与教师代表,以及其他开设网络安全 相关专业的高等院校院系负责人及教师代表参加。培训课程由西安电子科技大学、西安邮电大学的资深 专家担任主讲。(记者:郭妍) 11月14日,2025年陕西省高等学校教职工网络安全技能大赛在西北大学长安校区举办。大赛旨在深 入普及《中华人民共和国网络安全法》《中华人民共和国数据安全法》等法律法规,进一步加强网络安 全人才队伍建设。 比赛由省教育厅主办,西北大学(陕西省教育信息化发展研究中心)承办,通过实战化、场景化的 竞赛形式,提升高校教职工的网络安全知识与技能水平。竞赛内容包含网络安全理论、安全攻防、安全 运维等方面,重点考查参赛选手发现和解决问题的实际应用能力、综合运维能力、新知识的获取与创新 能力。 ...
捷豹路虎英国工厂全面恢复生产
Zhong Guo Xin Wen Wang· 2025-11-15 00:15
捷豹路虎英国工厂全面恢复生产 来源:中国新闻网 编辑:付健青 广告等商务合作,请点击这里 本文为转载内容,授权事宜请联系原著作权人 中新经纬版权所有,未经书面授权,任何单位及个人不得转载、摘编或以其它方式使用。 关注中新经纬微信公众号(微信搜索"中新经纬"或"jwview"),看更多精彩财经资讯。 中新社伦敦11月14日电 (欧阳开宇 刘施岑)捷豹路虎14日宣布,其英国三家工厂在遭遇网络攻击导致停 产后,生产运营已全面恢复正常。此次事件不仅给企业造成巨额损失,还对英国第三季度经济增长产生 显著拖累。 捷豹路虎英国工厂此次停产始于8月底,黑客组织利用第三方软件安全漏洞侵入系统,迫使捷豹路虎紧 急关闭全球IT基础设施以遏制风险。受此影响,位于索利哈尔、哈利伍德和沃尔弗汉普顿的三家工厂全 面停摆,涉及3.3万名员工休假,日均约1000辆的产能完全中断。 此次捷豹路虎停产引发连锁反应。数据显示,9月英国汽车产量暴跌28.6%,创下2020年4月以来最大单 月跌幅。受此冲击,英国2025年第三季度GDP环比仅增长0.1%,较上一季度明显放缓,9月单月经济更 是出现萎缩。 对捷豹路虎自身而言,停产期间,约5万辆汽车的生产 ...
聚力协同创新,2025年普陀区网络安全产业生态大会召开
Guo Ji Jin Rong Bao· 2025-11-14 08:26
11月13日,2025年普陀区网络安全产业生态大会正式召开。 中共上海市普陀区委常委、统战部部长魏静,以及上海市通信管理局、上海市公安局网络安全保卫总队、中共上海市委网络安全和信息化委员会办公室 等市级相关部门领导出席大会,为产业发展凝聚共识、擘画"十五五"发展方向。 上海市经济和信息化委员会总工程师裘薇在致辞中指出,普陀区作为上海市网络安全产业核心承载区,在区域产业布局与创新发展中发挥关键作用,其 产业集聚效应与示范价值已得到行业广泛认可。 她强调,上海市将进一步整合资源要素,打造更高能级的网络安全产业创业发展环境,通过持续开放应用场景、优化产业生态体系、强化跨领域协同联 动,推动全市网络安全产业形成"融合发展、优势互补"的新格局,为国家网络安全事业贡献上海力量。 "揭榜挂帅"机制作为破解产业发展痛点、链接市场需求与技术供给的核心抓手,在本次大会中深度推进。2025年,普陀区联合中国建材集团、红星美凯 龙家居集团、上海市园林设计研究院等行业龙头企业,面向社会发布十大网络安全应用场景需求,为网络安全企业拓展市场空间、实现技术落地提供全新赛 道。现场,两项"揭榜挂帅"合作项目完成签约,标志着需求与技术的精准匹配 ...
2025年信息技术国际标准化交流研讨会将于11月15日在成都开幕
据介绍,本次研讨会的举办旨在深化信息技术领域国际标准化协作,探讨前沿技术方向与标准协调路 径,将聚焦计算机、人工智能、云计算、物联网、网络安全等新一代信息技术领域,邀请相关行业标准 组织负责人、企业及科研机构参会,围绕产业发展、标准制修订及产业合作路径等议题开展交流研讨。 会上还将发布人工智能测评基准体系相关成果,旨在为人工智能技术的规范化、高质量发展及在各行各 业的安全可靠应用提供支撑;同时聚焦"新时代如何加强各国家/地区在信息技术标准化国际合作"核心 议题开展圆桌讨论,凝聚行业智慧、共商发展良策。 人民财讯11月13日电,由全国信息技术标准化技术委员会主办的"2025年信息技术国际标准化交流研讨 会"将于11月15日在四川省成都市开幕。 ...
意法半导体启动扩建马耳他智能工厂,创马史上最大单笔投资纪录
Shang Wu Bu Wang Zhan· 2025-11-13 03:21
Group 1 - The core point of the article is the announcement by STMicroelectronics to expand its smart factory in Malta, marking the largest single investment in Malta's history, which will enhance Malta's position in the European semiconductor supply chain [1] - The "Malta Semiconductor Capability Center" will be established with a joint funding of €8 million from the EU Chips Joint Plan, in collaboration with the University of Malta and IMEC, to provide training and advanced equipment for researchers and students [1] - Malta's Minister of Economy, Silvio Schembri, emphasized the commitment to investing in talent, research, and technology to promote sustainable development in the semiconductor sector [1] Group 2 - The conference showcased STMicroelectronics' first humanoid robot designed for semiconductor manufacturing, indicating significant advancements in automation and precision manufacturing at its Malta packaging and testing facility [1] - Malta Enterprise CEO George Gregory highlighted Malta's scale advantages, positioning it as an ideal testing ground for semiconductor technology innovation in Europe [1]
映翰通跌2.02%,成交额5186.26万元,主力资金净流出194.67万元
Xin Lang Cai Jing· 2025-11-12 05:30
Core Viewpoint - The stock price of Yinghantong has experienced fluctuations, with a year-to-date increase of 51.59% but a recent decline in the last five and twenty trading days [2]. Group 1: Stock Performance - As of November 12, Yinghantong's stock price decreased by 2.02%, trading at 49.60 CNY per share, with a total market capitalization of 3.653 billion CNY [1]. - Year-to-date, the stock has risen by 51.59%, while it has dropped by 1.43% in the last five trading days and 4.10% in the last twenty trading days [2]. - The stock has been on the "龙虎榜" (a list of stocks with significant trading activity) once this year, with the last appearance on February 10 [2]. Group 2: Company Overview - Yinghantong, established on May 29, 2001, and listed on February 12, 2020, is based in Beijing and specializes in the research and application of industrial IoT technology [2]. - The company's main revenue sources include industrial IoT products (52.00%), smart vending control systems (16.17%), digital power distribution products (15.15%), enterprise network products (13.96%), and technical services (2.72%) [2]. - Yinghantong belongs to the communication equipment sector and is associated with concepts such as DeepSeek, artificial intelligence, edge computing, network security, and robotics [2]. Group 3: Financial Performance - For the period from January to September 2025, Yinghantong reported a revenue of 550 million CNY, reflecting a year-on-year growth of 34.61%, and a net profit attributable to shareholders of 103 million CNY, up by 23.00% [2]. - The company has distributed a total of 60.8295 million CNY in dividends since its A-share listing, with 34.6151 million CNY distributed over the past three years [3]. - As of September 30, 2025, the number of shareholders increased by 44.72% to 9,819, while the average circulating shares per person decreased by 31.08% to 7,501 shares [2].
某单位用办公室电话当密码,驻军分布等近2000份文件被窃取
Xin Lang Cai Jing· 2025-11-12 01:24
Core Points - A significant theft occurred at the Louvre Museum, where 9 pieces of Napoleon-era royal jewelry were stolen in just 7 minutes, resulting in an estimated economic loss of €88 million [1][3] - The security vulnerabilities of the Louvre have come under scrutiny, with reports indicating that the museum's systems had weak passwords and outdated software, including Windows 2000 and Windows Server 2003 [3] - French President Macron announced plans to completely restructure the Louvre's security system in response to the incident [3] Security Vulnerabilities - The thieves disguised themselves as workers and used a ladder to access the museum, highlighting a severe lapse in security measures [3] - An audit by the French National Cybersecurity Agency (ANSSI) revealed that simple passwords could grant full control over the Louvre's main server and core monitoring systems [3] - Despite warnings from cybersecurity officials, the Louvre failed to address these vulnerabilities in subsequent audits conducted in 2015 and 2017 [3] Broader Implications - The incident raises concerns about weak password practices not only in high-profile institutions like the Louvre but also in everyday life, where individuals often use easily guessable passwords [4][5] - The importance of strong password creation and management is emphasized, suggesting methods such as using memorable phrases and ensuring distinct passwords for different accounts [7][9] - The need for enhanced security measures, including antivirus software and regular system updates, is highlighted to prevent unauthorized access [8]
警惕“过保”网络设备成境外间谍“帮凶” 国家安全机关提示
Yang Shi Xin Wen· 2025-11-11 22:58
Core Insights - The article highlights the security risks associated with outdated electronic devices that have surpassed their manufacturer's support period, leading to unpatched vulnerabilities and increased exposure to cyber threats [1][2]. Group 1: Security Risks of Outdated Devices - Devices that are no longer supported by manufacturers become vulnerable due to unaddressed security flaws, making them easy targets for hackers [2]. - Once compromised, these devices can be used as tools for further attacks, allowing intruders to conduct operations undetected and access sensitive information [4]. Group 2: Escalation of Threats - A single vulnerability can lead to exponential threats as attackers exploit it to access sensitive data and network permissions, potentially affecting interconnected systems and critical infrastructure [6]. - The initial isolated technical flaw can escalate into complex security incidents, resulting in data breaches, service disruptions, and systemic risks [6]. Group 3: Recommendations for Mitigation - Users are advised to regularly check the lifecycle of their devices and replace those that are outdated to eliminate potential security risks [8]. - Implementing strict access controls and minimizing network exposure can help prevent compromised devices from being used as attack vectors [8]. - Continuous monitoring for firmware updates and security patches is essential to protect devices that are still within their support lifecycle [8].