网络安全
Search documents
奇安信:目前公司的一批核心产品已完成了全面国产化适配或全栈国产化适配
Zheng Quan Ri Bao· 2026-01-21 11:43
Group 1 - The core viewpoint of the article is that Qihoo 360 has completed the full domestic adaptation of several key products, indicating a significant step towards localization in its offerings [2] Group 2 - The company has achieved full-stack domestic adaptation for its core products in the security operation field, such as the "Tianyan" system [2] - In the boundary security field, the company has also completed the domestic adaptation of its traffic decryption orchestrator [2]
智能网联汽车云平台漏洞分析报告
奇安信· 2026-01-21 01:55
Investment Rating - The report indicates a critical investment rating for the smart connected vehicle cloud platform industry due to the high vulnerability detection rates and significant security risks identified [5][10]. Core Insights - The analysis conducted by Qihoo 360's Code Security Laboratory on 30 automotive manufacturers revealed that 93.3% of the cloud platforms had vulnerabilities, with a total of 207 vulnerabilities identified, including 66 critical and high-risk vulnerabilities, accounting for 31.9% [5][10]. - The report highlights that over 70% of the automotive manufacturers' cloud platforms have critical/high-risk vulnerabilities that pose severe threats to vehicle security, including unauthorized vehicle unlocking and sensitive information leakage [11][12]. - A significant portion of vulnerabilities (65.2%) stem from basic errors such as lack of identity verification and interface authentication, indicating a low overall security level in the industry [14]. - The report emphasizes the complexity and severity of vulnerability risks, with over 70% of platforms having identity authentication and access control vulnerabilities, and half exhibiting excessive data exposure vulnerabilities [5][31]. Summary by Sections Overall Vulnerability Status Analysis - Among the 30 automotive manufacturers analyzed, 28 platforms were found to have vulnerabilities, with a detection rate of 93.3% and a total of 207 vulnerabilities identified [10]. - 76.7% of the platforms had critical or high-risk vulnerabilities, which could lead to severe consequences such as remote unlocking of vehicles and unauthorized driving [11][12]. Major Vulnerability Types Analysis - 60% of the platforms exhibited broken access control vulnerabilities, while 50% had excessive data exposure vulnerabilities [16]. - 73.3% of the platforms were affected by both broken access control and authentication failures, indicating systemic issues in security management processes [17][18]. Major Vulnerability Hazard Analysis - 73.3% of the platforms experienced sensitive information leakage due to various vulnerabilities, including excessive data exposure and broken access control [45]. - 66.7% of the manufacturers' vehicles could be unlocked without authorization, directly threatening vehicle property security [47]. - 40% of the platforms had vulnerabilities that allowed unauthorized operations through account impersonation, leading to potential financial losses for users [49][50]. Summary and Recommendations - The report concludes that the network information security of smart connected vehicles is a complex systemic issue, with many foundational vulnerabilities indicating a lack of comprehensive security management [51]. - Recommendations include elevating security responsibility to the strategic level, integrating security into the product development lifecycle, and enhancing collaboration between vehicle and cloud security teams [52][56].
2025年中国防火墙细分市场分析——工控防火墙【组图】
Qian Zhan Wang· 2026-01-21 01:40
Core Insights - The industrial firewall market in China is experiencing rapid growth, with the market size expected to reach 1.61 billion yuan in 2024, representing a year-on-year increase of 11.8%, and projected to reach 1.9 billion yuan in 2025 [4]. Group 1: Definition and Key Capabilities - Industrial firewalls are specialized firewalls designed to protect industrial control systems, focusing on network security for industrial equipment and systems. Key functions include access control, security domain management, network address translation (NAT), protocol filtering, and deep packet inspection [3]. - Key capabilities of industrial firewalls include deep protocol analysis, whitelist mechanisms, and high reliability. They can deeply analyze specific industrial protocols to ensure data packet security and integrity, employ active defense techniques through whitelists, and maintain high operational reliability in harsh industrial environments [3][6]. Group 2: Market Growth and Delivery Models - The industrial firewall market is primarily channel-driven, accounting for 52% of the market. This model allows for efficient matching of product features, customer needs, and industry regulations, facilitating effective supply-demand connections [6]. - The energy sector is the most significant application area for industrial firewalls, accounting for 30% of the market in 2024. Industrial firewalls are essential for ensuring stable production by intercepting abnormal traffic and protecting against attacks, especially as the boundaries of industrial control systems become less defined [7]. Group 3: Regional Insights - The North China region has the highest sales volume for industrial firewalls, accounting for 31% of the market in 2024. This area is industrially significant, with many industries relying heavily on industrial control systems, making the demand for robust firewalls critical [9]. Group 4: Market Leaders - The leading companies in the Chinese smart industrial firewall market include Weinuo, Qimingxingchen, Liufangyun, Tiandihexing, Zhongdian Anke, Fortinet, and Zhongkong Technology. Weinuo holds the largest market share at 10.2% in 2024, recognized for developing the first industrial firewall in China [12].
上海市委网信办组织召开网络安全工作协调机制(扩大)会议
Xin Lang Cai Jing· 2026-01-20 13:44
会议深入分析了当前网络安全领域面临的新形势、新挑战。强调随着新一轮科技革命和产业变革深入发 展,网络安全形势日趋严峻复杂,新型网络攻击手段层出不穷,数据安全与个人信息保护需求迫切,人 工智能等新技术应用带来的安全挑战不容忽视。全市上下要树立忧患意识和底线思维,切实增强做好网 络安全工作的使命感、责任感、紧迫感。会议强调,2026年是"十五五"开局之年,全市网络安全战线要 提高政治站位,重点抓好以下工作:一是加强统筹协调,全面用好网络安全协调机制。二是强化关键信 息基础设施安全保护,筑牢网络安全"防火墙"。三是加强数据全生命周期安全管理,护航数字经济发 展。四是探索人工智能安全治理新模式,提升新技术风险防范能力。五是健全网络安全应急响应体系, 提升实战化攻防对抗水平。 会议通报了2025年我市网络安全事件处置情况、个人信息保护工作开展情况以及党政机关网站运行情 况。会议指出,2025年,全市各单位网络安全工作围绕中心、服务大局,成功应对多起网络安全威胁, 圆满完成各项保障任务,全年未发生重大网络安全事件,网络安全保障体系和能力建设取得显著成效, 为全市经济社会高质量发展提供了坚实的网络安全屏障。 1月20日上午 ...
工信部发布工业互联网高质量发展行动方案,三大安全需求迫切待解
Xin Lang Cai Jing· 2026-01-20 13:40
Core Viewpoint - The Ministry of Industry and Information Technology has issued the "Action Plan for Promoting the High-Quality Development of Industrial Internet Platforms (2026-2028)", which aims to support new industrialization through four major actions [1][3]. Summary by Relevant Sections Action Plan Overview - The action plan emphasizes the "data-driven intelligence" initiative, focusing on unlocking the value of industrial data, building high-quality industrial model systems, and enhancing the application of artificial intelligence in industrial internet platforms [3][14]. - It also highlights the importance of industrial internet security, calling for strengthened platform security guarantees, compliance guidance for platform enterprises, and the implementation of classified and graded management for industrial internet security [3][14]. Security Challenges - The industrial internet platform faces three major security shortcomings: weak compliance foundations, lack of classified and graded management, and insufficient data security capabilities [16]. - Weak compliance is a prevalent issue, with many enterprises lacking professional compliance guidance, leading to high compliance risks [4][16]. - The need for classified and graded management is critical, as different industries and enterprises have varying security risks and requirements [5][17]. - Enhancing data security monitoring, early warning, and emergency response capabilities is essential for the secure operation of platforms [6][18]. Industrial Security Construction - The construction of industrial security is a systematic project that follows three core steps: "assess the foundation," "build the system," and "ensure sustainability" [19][22]. - "Assess the foundation" involves creating a complete asset ledger through automated identification and vulnerability scanning [21]. - "Build the system" focuses on the comprehensive deployment of security capabilities, including nine specific tasks such as optimizing industrial control network architecture and establishing security monitoring systems [21][23]. - "Ensure sustainability" emphasizes the continuous optimization of strategies and the cultivation of professional talent to respond to threats effectively [22]. Implementation and Expertise - The company, Qi Anxin, has developed a comprehensive industrial internet security framework that integrates security protection, monitoring, and operations across various levels, including cloud, edge, and data [23]. - Qi Anxin has provided industrial security solutions to numerous enterprises across various sectors, including energy, manufacturing, and transportation, leveraging its technical expertise and practical experience [26].
2025年中国信贷欺诈风险趋势年度研究报告-威胁猎人
Sou Hu Cai Jing· 2026-01-20 12:38
Core Insights - The report highlights a significant increase in credit fraud risks in China's financial loan sector for 2025, with malicious fraud incidents rising by 200% compared to 2024, indicating a serious challenge for financial institutions [1][11][16]. Group 1: Overview of Credit Fraud Risks - In 2025, the total monitored financial loan-related public sentiment reached 6.8 million, with malicious loan fraud sentiment accounting for 1.89 million, representing 28% of the total [16][21]. - The top three types of malicious loan fraud in 2025 are corporate loans, credit loans, and housing loans, with public sentiment in these areas showing significant growth [26][27]. - The regions most affected by malicious loan fraud are Guangdong, Sichuan, Shandong, Jiangsu, and Zhejiang, with Guangdong showing the highest risk levels [34]. Group 2: Types of Fraud and Their Trends - The primary types of malicious loan fraud include occupational debt (37%), debt optimization, and credit repair, with occupational debt being the most critical risk type [29][30]. - The risk of credit repair fraud surged dramatically, with a year-on-year increase of 199% in the second half of 2025 compared to the same period in 2024 [38][43]. - The credit fraud industry has developed a clear division of labor, with upstream actors researching vulnerabilities, midstream actors coordinating resources, and downstream actors recruiting clients [49]. Group 3: Industry Response and Regulatory Actions - Financial institutions are continuously upgrading their anti-fraud defense systems in response to the evolving fraud landscape, while regulatory bodies are collaborating with law enforcement to combat black market activities [11][12]. - In 2025, over 200 major black market groups were targeted in crackdown operations, resulting in more than 1,500 criminal cases with a total amount involved nearing 30 billion [11][12].
天融信:公司在GEO领域暂未布局
Zheng Quan Ri Bao Wang· 2026-01-20 08:45
Group 1 - The company Tianrongxin (002212) has not yet established a presence in the GEO field [1] - The company is continuously monitoring research and application of new technologies and new scenarios [1]
启明星辰:公司已经与华为持续开展脆弱性研究等安全领域的合作
Zheng Quan Ri Bao Wang· 2026-01-20 08:45
Core Viewpoint - The company, Qiming Star (启明星辰), is focusing on cybersecurity as its main business, with strategic layouts in "AI + Security" and quantum security [1] Group 1: AI + Security - The company is developing security intelligent agents to be applied in security operations, threat detection, and data security products or services [1] - A series of large model security products have been launched to ensure the safety of AI applications, forming a systematic solution [1] Group 2: Quantum Security - The company has upgraded its quantum-resistant encryption system, integrating post-quantum cryptographic algorithms and quantum key distribution technology [1] - Successful implementations of these technologies have been achieved in critical information infrastructure sectors such as finance and telecommunications [1] Group 3: Collaboration and Future Outlook - The company is collaborating with Huawei on vulnerability research and other security-related projects [1] - As new productive forces develop, the company acknowledges the increasing complexity and severity of cybersecurity challenges and aims to continuously track new security demands while focusing on technological innovation [1]
启明星辰:积极探索商业航天、人工智能等新兴领域的技术创新
Zheng Quan Ri Bao Wang· 2026-01-20 08:14
Core Viewpoint - Qiming Star (启明星辰) is leveraging national strategic opportunities by focusing on technological iterations and new scenario demands in the security field, while actively exploring innovations in emerging areas such as commercial aerospace and artificial intelligence [1] Group 1: Company Focus - Qiming Star is a subsidiary of China Mobile (中国移动) dedicated to cybersecurity [1] - The company is committed to ongoing research in security technologies and solutions [1] Group 2: Industry Trends - The company is actively exploring technological innovations in emerging fields like commercial aerospace and artificial intelligence [1] - There is a strong emphasis on adapting to new demands in the security sector [1]
启明星辰:公司正全力深化与中国移动的战略协同,加快布局AI安全、云安全等新赛道|焦点消息
Zheng Quan Ri Bao Wang· 2026-01-20 07:29
Core Viewpoint - The company, Qihoo 360 (启明星辰), has experienced fluctuations in performance due to changes in the external market environment and strategic R&D investments in new technology areas [2] Group 1: Company Strategy and Performance - The company is currently focusing on deepening strategic collaboration with China Mobile (中国移动) under the leadership of Chairman Yuan Jie [2] - The company aims to accelerate its layout in new sectors such as AI security and cloud security to solidify its long-term healthy development foundation [2] - As it enters the new development phase of the "14th Five-Year Plan," the company will actively respond to national strategies and closely monitor industry trends and market development opportunities [2] Group 2: Innovation and Business Optimization - The company is committed to technological innovation, optimizing its business layout, and enhancing operational quality and efficiency [2]