网络安全
Search documents
山石网科:公司近年来持续推进组织与人员优化
Zheng Quan Ri Bao Wang· 2025-12-23 14:14
证券日报网讯12月23日,山石网科在互动平台回答投资者提问时表示,公司近年来持续推进组织与人员 优化,2024年全面推行事业部制改革,明确各单元利润考核导向,带动公司人均产出提升和费比下降, 有效降低固定成本开支、提高投入产出比。作为技术密集型的网安企业,公司保持必要的研发与销售投 入以巩固核心竞争力:研发端聚焦ASIC安全芯片等硬核技术,巩固产品竞争优势;销售端内部加强优 化和赋能,外部打造渠道生态,在控制费用率的前提下实现稳定发展。此外,公司还从多方面发力改善 财务状况:营收端强化金融、运营商、能源等行业深度合作,拓展数据安全治理、出海业务等新增长 极;回款端加大收款力度、优化应收账款结构,降低回款风险。随着公司经营逐渐实现稳健改善,公司 将进一步提升偿债能力,持续优化资本结构、降低杠杆率。 ...
山石网科:公司积极推动ASIC新一代安全产品的商机落地
Zheng Quan Ri Bao Wang· 2025-12-23 13:41
证券日报网讯12月23日,山石网科在互动平台回答投资者提问时表示,技术创新和高效的运营管理是公 司制定的行业突围策略,对公司而言,ASIC安全芯片技术是应对信创市场需求、打造差异化竞争优势 的战略创新。自量产测试成功公告发布以来,公司积极推动ASIC新一代安全产品的商机落地,目前已 实现能源行业等客户的项目中标。 ...
山石网科中标|某电网信息化项目
Xin Lang Cai Jing· 2025-12-23 12:15
Group 1 - The core concept of the news is the introduction of a new intelligent firewall by the company, which integrates ASIC security chips and emphasizes "open integration, AI empowerment, and intelligent operation and maintenance" [2][7] - The new firewall aims to create a comprehensive security foundation that covers both domestic and international scenarios, providing a full-spectrum network security solution [2][7] - The product is characterized by five core advantages: ultra-high performance, extremely low latency, multiple high-speed interfaces, low carbon energy-saving, and reliable performance, redefining the standards for network security devices [2][7] Group 2 - The intelligent firewall is applicable across critical industries such as finance, energy, government, and healthcare, supporting both domestic replacement and digital transformation in non-domestic contexts [2][7] - The product features high-speed interfaces that reduce latency by over 50% compared to traditional firewalls in the same category, with standard configurations including 10GE, 40GE, and 100GE [9]
加密不减速:山石网科ASIC防火墙,为IPSec高吞吐业务注入澎湃动力
Xin Lang Cai Jing· 2025-12-23 12:15
Core Viewpoint - The article discusses the challenge of balancing data security and transmission speed in digital business operations, particularly in high-throughput scenarios requiring encryption, such as inter-data center communication and secure corporate communications [1][9]. Group 1: Challenges in Traditional Firewall Solutions - Traditional firewalls rely on CPU for encryption and data processing, leading to high CPU resource usage and affecting overall system performance [3][11]. - The performance of traditional firewalls is limited by CPU single-core performance and the ability to expand core numbers, making it difficult to meet the demands of large-scale operations [3][11]. - Encryption processing delays can lead to data packet accumulation, increasing end-to-end latency and potentially disrupting business operations [4][11]. Group 2: ASIC Firewall Solutions - The ASIC firewall from Hillstone Networks employs a "hardware-level encryption offload and heterogeneous computing collaboration" architecture, providing a solution that balances security and performance for high-throughput IPSec scenarios [5][12]. - The ASIC firewall integrates ASIC chips and decryption modules, achieving over 80% reduction in CPU usage and microsecond-level transmission delays, significantly enhancing throughput performance [6][12]. - The ASIC chip's parallel computing capabilities allow for efficient handling of high-concurrency encrypted sessions, making it suitable for data center-level data synchronization and high-frequency trading in finance [6][13]. Group 3: Compliance and Standards - The hardware acceleration of IPSec VPN performance adheres to domestic and international security standards, supporting national cryptographic algorithms and international mainstream algorithms, thus meeting compliance requirements [7][14]. - The solution maintains transmission stability even under sudden traffic surges, minimizing the impact of performance fluctuations on business operations [7][14]. Group 4: Industry Applications - The ASIC firewall can significantly improve operations across various industries, enabling large internet companies to achieve GB-level secure data synchronization and providing compliant encryption and high-speed transmission for critical financial data [8][15]. - By alleviating the performance limitations of traditional firewalls in high-throughput IPSec scenarios, the ASIC firewall supports stable business operations and compliance for enterprises [8][15].
A股五张图:随随便便就得到的,能是什么赚钱玩意儿?
Xuan Gu Bao· 2025-12-23 10:35
1、行情 指数虽然集体小幅收涨,但市场亏钱效应开始显现。 题材方面,网络安全局部高开,吉大正元一字开盘(炸),奇安信、启明星辰、三六零、绿盟科技、格尔软件、国投智能等集体高开,但整体呈 现高开低走的态势; 有色钨上午单边大涨,翔鹭钨业、章源钨业涨停,中钨高新、盛屯矿业、厦门钨业盘中集体走强; 昨晚快手突发大规模违规直播事件。 锂电池板块盘中突然发力,天际股份、滨海能源、深圳新星、多氟多涨停,华自科技、华盛锂电、天赐材料、鹏辉能源等集体大涨; 液冷服务器午后大涨,同飞股份(20CM)、川润股份、英维克、奕东电子(20CM)涨停,申菱环境、科创新源、强瑞技术、思泉新材等大 涨; 此外,玻纤、覆铜板、半导体等均有局部强势表现,航天、旅游等重挫。 截至收盘,沪指、深成指、创业板指分别收涨0.07%、0.27%、0.41%,市场超3800股下跌,1500余股上涨。 2、网络安全 晚上10点左右,快手的推荐直播页面中,原本正常的直播间倏地涌入大量淫秽影片播放、低俗表演等违规内容,直播间单场观看人数上万。 用户尝试通过举报功能封禁直播间时,系统显示"举报失败"或长时间无反馈。 这一情况一直延续到次日凌晨后才陆续恢复正常。 ...
“四链融合”,优化网信安全人才培养
Huan Qiu Wang Zi Xun· 2025-12-23 10:12
Core Viewpoint - The cultivation of cybersecurity talent in higher education is essential for addressing cybersecurity challenges and supporting the construction of a strong digital nation, necessitating a "four-chain integration" model that combines innovation, industry, talent, and funding [1][2]. Group 1: Importance of Cybersecurity Talent Development - The "four-chain integration" approach aligns with the need to strengthen national digital security, enhance new productivity development, and promote comprehensive development of cybersecurity talent, reflecting its significant contemporary value [2]. - Cybersecurity is a crucial foundation for national security in the digital age, with the quantity and quality of cybersecurity talent directly impacting national security [2]. - The integration of innovation and industry chains can lead to the development of a large number of well-rounded talents with both theoretical depth and practical skills, essential for addressing various cybersecurity threats and maintaining economic and social stability [2][3]. Group 2: Comprehensive Development of Talent - The core goal of higher education talent cultivation is the comprehensive development of individuals, with the "four-chain integration" model creating a precise and holistic talent cultivation ecosystem [3]. - This model optimizes teaching content and practical methods, promoting the overall enhancement of knowledge, skills, and qualities of cybersecurity talent [3]. - It effectively addresses the mismatch between supply and demand for cybersecurity talent, supporting social stability and public welfare [3]. Group 3: Scientific Pathways for Talent Development - A complete system for advancing cybersecurity talent cultivation should be established, focusing on "directional guidance, collaborative education, and empowerment" [4]. - The optimization of cybersecurity discipline construction is essential, with a focus on the interplay between innovation, industry, and talent chains to ensure high-quality talent cultivation [4]. - Emphasis should be placed on integrating talent training with production practices, industry development, and social services, enhancing the practical orientation of education [4]. Group 4: Collaborative Mechanisms and Funding Support - The establishment of an integrated mechanism for industry, academia, and research is crucial for promoting collaborative talent cultivation [5]. - A multi-party cooperation system involving universities, enterprises, research institutions, and industry organizations should be developed to meet local cybersecurity industry needs [5]. - Funding support for foundational theory and applied research in cybersecurity is necessary, with increased investment in emerging and interdisciplinary fields [6].
武汉大学设立网谷产创院
Di Yi Cai Jing· 2025-12-23 09:27
网谷今年产业规模预计达250亿元 根据东西湖区与武汉大学签订的新一轮办学协议,该区将持续为武汉大学国家网络安全学院提供激励性 支持,推动合作模式从"普惠性补贴"向"基础保障+梯度奖励"体系转型,设立"创新能力发展奖励",重 点围绕科技创新、成果转化与产业集聚三大方向精准发力,全面构建"创新—转化—集聚"全链条政策激 励体系。 新设立的网谷产创院将实行企业化运营,由武汉大学计算机学院牵头,协同网络安全、人工智能、信息 管理等学科资源,打造"安全+智能"产业育成生态体系。未来五年,合作双方将采用"先投后股""股权直 投"的市场化运作机制,为高校院所科创项目就地转化孵化、初创企业扎根成长提供全周期支撑。以"耐 心资本"为重要纽带,研究院着力培育"教授敢转、企业愿接、资本敢投"的良好创新生态。 揭牌现场,12家聚焦新质生产力的项目和企业代表签订意向入驻协议。青桐云创(武汉)科技有限公司 瞄准网安信创产业。其全生命周期3D可视化安全平台与软硬一体化装备,已成功对接国家电网电力工 控安全沙盘,完成跨五省特高压直流停电演练。"涉网犯罪实时预警与智慧侦查项目"则利用人工智能技 术精准锁定电诈资金流向乃至取现点位,试用阶段情报 ...
账号与身份防线全面失守:黑灰产 Agent 化攻击下,如何用“第一性原理”重建防线?
AI前线· 2025-12-23 09:00
Core Insights - The article highlights the alarming rise of AI-driven cyberattacks, with a report from Anthropic indicating that AI has automated 90% of the hacking process, requiring minimal human intervention [1][3] - The evolution of black and gray market activities is marked by a significant shift towards AI agents, which enhances the efficiency and effectiveness of cybercriminal operations [4][5] Group 1: AI in Cybersecurity - Anthropic's report reveals that AI's capabilities in executing complex attacks have reached unprecedented levels, marking a turning point in cybersecurity [1][3] - The use of AI agents allows for autonomous operations with minimal human oversight, fundamentally changing the nature of digital warfare [4][5] Group 2: Evolution of Black and Gray Markets - The black market has transitioned from mechanical scripts to intelligent agents capable of generating realistic content, significantly lowering the barriers to entry for cybercriminals [5][6] - AI has enabled the mass production of high-quality fake accounts, which can pass Turing tests, thus complicating traditional risk control measures [5][6] Group 3: Defense Mechanisms - To counter the sophisticated AI-driven attacks, defense strategies must evolve to incorporate principles from the physical world and community behavior [9][10] - The "anti-fraud three laws" proposed by industry experts emphasize the importance of diversity, information consistency, and community detection in identifying fraudulent activities [9][10] Group 4: Challenges in AI Models - The introduction of "uncertainty labels" in AI models aims to address the issue of misjudgment caused by ambiguous samples, significantly improving accuracy rates [11][12] - Continuous feedback mechanisms are essential for enhancing the model's ability to recognize ambiguous cases, thereby reducing error rates [13] Group 5: New Paradigms in Risk Control - The traditional "machine review + human review" model is becoming obsolete, leading to the emergence of a new paradigm centered around AI-driven agents [16][17] - This new approach integrates AI machine review, agent-based review, and expert decision-making to enhance the assessment of complex risks [17][18]
直播间现大量色情内容,快手称遭黑灰产攻击:直播功能已逐步恢复正常服务!奇安信专家:黑客规模化攻击超出人工审核应对极限
Mei Ri Jing Ji Xin Wen· 2025-12-23 08:40
Core Viewpoint - Kuaishou Technology's live streaming feature was attacked on December 22, 2025, leading to a significant disruption, but the company has since restored normal service and reported the incident to authorities [1][10]. Group 1: Incident Details - The attack resulted in the appearance of a large amount of pornographic content in multiple live streams on the Kuaishou platform, with one stream reportedly having 100,000 viewers before being shut down [4][10]. - The attack was characterized as a well-organized black and gray market hacker attack, with experts suggesting that vulnerabilities in the live streaming interface were exploited [7][10]. - The incident is classified as a P0-level accident, indicating a severe impact on core business functions, necessitating immediate response and investigation [8][10]. Group 2: Company Response - Kuaishou has initiated an emergency response plan and is taking legal measures to protect its interests and those of its shareholders [1]. - The company has been criticized for its slow response time in shutting down the offending live streams, highlighting the need for improved emergency protocols [7][8]. - Experts recommend that Kuaishou enhance its automated response systems to quickly detect and address such incidents in the future [8][10]. Group 3: Market Impact - Following the incident, Kuaishou's stock price fell nearly 4%, with a market capitalization of HKD 276.7 billion [11]. - The cybersecurity sector saw a brief surge in stock prices, with companies like Feiling Kesi rising by 9.63% in response to the incident [13]. Group 4: Broader Implications - The attack underscores the shift towards automated attacks in the black and gray market, which can overwhelm traditional manual content moderation systems [10]. - Experts emphasize the importance of addressing both external threats and internal vulnerabilities, advocating for a comprehensive security strategy that includes internal controls [10].
专家谈快手现大量涉黄直播间:黑客规模化攻击超出人工审核应对极限
Xin Jing Bao· 2025-12-23 07:54
Core Viewpoint - The short video platform Kuaishou experienced a significant issue with a large number of live streams containing inappropriate content, attributed to a large-scale hacker attack that overwhelmed the limits of manual review processes [1] Group 1: Incident Overview - On December 22, Kuaishou faced an influx of live streams involving inappropriate content [1] - The following day, security experts from Qihoo 360 analyzed the situation and concluded that the hacker attack utilized automated tools to register and control zombie accounts, enabling rapid dissemination of violations [1] Group 2: Response and Recommendations - Kuaishou issued a statement strongly condemning illegal activities related to black and gray markets and reported the incident to law enforcement [1] - Experts recommended that companies should leverage AI to build automated external defenses to counteract such attacks effectively [1]