Workflow
安全
icon
Search documents
格尔软件召开2024年度业绩说明会 全力推进技术储备与生态建设
Zheng Quan Ri Bao Wang· 2025-05-23 11:45
Core Viewpoint - Geer Software focuses on the information security industry, emphasizing digital trust and data security, and aims to enhance its performance through technological advancements and market expansion [1][2]. Group 1: Company Performance - In 2024, Geer Software achieved an operating income of 529 million yuan, with a net profit attributable to shareholders of 36.81 million yuan and a non-recurring net profit of 15.69 million yuan [1]. - The company is committed to leveraging its advantages in cryptography technology while expanding into emerging security fields such as IoT, low-altitude economy, and artificial intelligence [1]. Group 2: Future Strategy - The company will adhere to the principles of "youthfulness, capitalization, digitalization, and standardization," focusing on cybersecurity and digital asset security [2]. - Geer Software aims to build a comprehensive strategic system covering cryptographic security, data security, digital transformation, and technological innovation through multi-business collaboration [2]. Group 3: Quantum Security Initiatives - Geer Software has completed upgrades to its entire line of cryptographic products to enhance quantum resistance capabilities, with plans to launch a series of quantum-safe products at an upcoming international technology trade fair [2]. - The company is one of the first in China to conduct research on quantum-resistant technology and has initiated pilot projects in banking and securities sectors [2][3]. - The market is optimistic about the prospects of quantum-resistant cryptography, especially as quantum computers pose a threat to traditional encryption methods [3].
三六零: 三六零安全科技股份有限公司2024年年度权益分派实施公告
Zheng Quan Zhi Xing· 2025-05-23 11:14
证券代码:601360 证券简称:三六零 公告编号:2025-028 号 本公司董事会及全体董事保证本公告内容不存在任何虚假记载、误导性陈述或者重大遗 漏,并对其内容的真实性、准确性和完整性承担法律责任。 A 股每股现金红利0.1元(含税) 一、通过分配方案的股东大会届次和日期 本次利润分配方案经公司2025 年 5 月 16 日的2024年年度股东大会审议通过。 二、分配方案 (财税〔2012〕85 号)的规定,自 然人股东和证券投资基金在转让公司股票时,将按照上述通知有关规定执行差别化个人所得 税率,持股期限(指个人从公开发行和转让市场取得公司股票之日至转让交割该股票之日前 一日的持有时间)在 1 个月以内(含 1 个月)的,其股息红利所得全额计入应纳税所得额, 实际税负为 20%;持股期限在 1 个月以上至 1 年(含 1 年)的,暂减按 50%计入应纳税所得 额,实际税负为 10%;持股期限超过 1 年的,暂免征收个人所得税。自然人股东和证券投资 基金在股权登记日后转让股票时,中国结算上海分公司根据其持股期限计算实际应纳税额, 由证券公司等股份托管机构从个人资金账户中扣收并划付中国结算上海分公司,中国 ...
恒宝股份(002104) - 002104恒宝股份投资者关系管理信息20250523
2025-05-23 11:14
证券代码:002104 证券简称:恒宝股份 恒宝股份有限公司 恒宝股份 2024 年度业绩说明会 投资者活动记录表 编号:2025-001 | | □特定对象调研□分析师会议 | | --- | --- | | 投资者关系活动 类别 | □媒体采访√业绩说明会 | | | □新闻发布会□路演活动 | | | □现场参观□电话会议 | | | □其他:(请文字说明其他活动内容) | | 参与单位名称 | 恒宝股份2024年度业绩说明会采用网络远程方式进行,面向全体投资者 | | 及人员姓名 | | | 时间 | 2025 年 5 月 22 日(星期四)下午 15:00-17:00 | | 地点 | 深圳证券交易所"互动易平台"http://irm.cninfo.com.cn"云访谈"栏目 | | 公司接待人员 | 董事长、总裁:钱京先生 | | | 董事、副总裁、财务总监:徐霄凌女士 | | 姓名 | 独立董事:丁虹女士 | | | 董事会秘书:王坚先生 | | 投资者关系活动 | 1.【查询-001】高管您好。请问贵公司本期财务报告中,盈利表现如何? 谢谢。 答:尊敬的投资者,您好,2024 年度公司实现营业 ...
华懋科技三次收购富创优越,后者估值下滑难懂!
IPO日报· 2025-05-23 10:21
星标 ★ IPO日报 精彩文章第一时间推送 5月20日晚间,华懋科技(下称"华懋科技",603306.SH)发布公告称,其拟收购深圳市富创优越科技有限公司(下称"富创优 越")部分股权。 本次交易完成后,华懋科技将直接及间接持有富创优越100%股权。本次交易预计构成重大资产重组,但不会导致控股股东、实 际控制人变更。 AI制图 持股100% 具体来看,华懋科技计划通过发行股份及支付现金的方式,购买富创优越约19.46%股权及富创优越股东深圳市洇锐科技有限公 司(下称"洇锐科技")100%股权、深圳市富创优越壹号企业管理合伙企业(下称"富创壹号")100%出资份额,同时拟发行股 份募集配套资金。 目前,洇锐科技和富创壹号分别持有富创优越约26.26%和约12.13%的股权。 本次交易前,华懋科技通过全资子公司持有富创优越42.16%股权。本次交易完成后,华懋科技将直接及间接持有富创优越 100%股权。 回顾华懋科技此前入股以来富创优越的过程,2024年9月、10月,华懋东阳合计以约2.38亿元的价格,取得了富创优越25%股 权。 今年1月,华懋科技公告称,华懋东阳先以6086.1万元,取得了富创优越7.16%股 ...
2024年度企业所得税汇算清缴专题——专用设备投资抵免优惠政策
蓝色柳林财税室· 2025-05-23 10:17
企业自2008年1月1日起购置并实际使用 列入《环境保护专用设备企业所得税优惠目 录》、《节能节水专用设备企业所得税优惠目 录》和《安全生产专用设备企业所得税优惠目 录》范围内的环境保护、节能节水、安全生产 专用设备,可以按专用设备投资额的10%抵免 当年企业所得税应纳税额。 环境保护 T 能 可 K 欢迎扫描下方二维码关注: 企业当年应纳税额不足抵免的, 可以向以后年度结转,但结转期不得 超过5个纳税年度 结转年限最长不得超过五年。 计算要点 2 0 (1) 购置投资额 是指购买专用设备发票价税合计价格,但 不包括按有关规定退还的增值税税款以及设备 运输、安装和调试等费用。 取得专用发票时 如增值税进项税额允许抵扣,投资 额不包括增值税进项税额;如增值税进 项税额不允许抵扣,投资额应为增值税 专用发票上注明的价税合计金额。 改造 企业在2024年1月1日至2027年12月31日 期间发生的节能节水、环境保护和安全生产专 用设备数字化、智能化改造投入,不超过该专 用设备购置时原计税基础50%的部分,可按照 10%比例抵免企业当年应纳税额。企业当年应 纳税额不足抵免的,可以向以后年度结转,但 办理方式 "自行判 ...
Palo Alto:人工智能领域的发展将推动下一代测序 (NGS) 产品的发展
美股研究社· 2025-05-23 09:52
编译 | 华尔街大事件 如果关注这一指标的进展,那么我们就应该有信心,该公司仍有望实现150亿美元的目标。虽然 下一代产品平均经常性收入(NGS ARR)的同比增长并非直线上升,但从绝对值来看,NGS ARR每个季度都在稳步增长。第三季度是该指标首次 突破50亿美元大关 ,而根据第四季度的业 绩指引,距离60亿美元目标也并不遥远。 作者 | Vinay Utham, CFA Palo Alto ( NASDAQ: PANW )第三季度业绩表现不俗,营收和利润均超出预期。具体而言, 第 三季度营收为 22.9 亿美元 ,同比增长 15.33%,超出分析师预期 899 万美元。非公认会计准则 (Non-GAAP) 摊薄后每股收益为 0.80 美元,同比增长 21.2%,超出分析师预期 0.03 美元。非公 认会计准则 (Non-GAAP) 营业利润率为 27.4%。剩余履约义务 (RPO) 也表现强劲,同比增长 19%,达到 135 亿美元。 该公司还发布了强劲的第四季度和全年业绩指引。具体而言,预计2025财年营收将在91.7亿美元 至91.9亿美元之间,中间值与分析师预期一致。2025财年非公认会计准则(No ...
国家互联网应急中心发布关于“游蛇”黑产攻击活动的风险提示
news flash· 2025-05-23 09:25
Core Viewpoint - The National Internet Emergency Center has issued a warning regarding the "Youshe" black industry attack activities, highlighting the increasing frequency of organized attacks by this group, which employs deceptive SEO techniques to mislead users into downloading malicious software [1] Group 1: Attack Methods - The "Youshe" group, also known by aliases such as "Yinhu," "Guduo Dadao," and "UTG-Q-1000," utilizes search engine optimization (SEO) to promote fake download sites that closely resemble the official Chrome browser website [1] - Users who mistakenly download the malicious installation package will have the Youshe remote control Trojan implanted in their systems, allowing attackers to remotely control the devices and steal sensitive data [1] Group 2: Scale of Operations - Monitoring has revealed that the number of compromised domestic devices (measured by IP count) has exceeded 17,000 daily [1]
天融信: 关于召开2024年度网上业绩说明会的公告
Zheng Quan Zhi Xing· 2025-05-23 09:21
Core Viewpoint - The company, Tianrongxin Technology Group Co., Ltd., is set to hold an online performance briefing for the 2024 fiscal year to enhance investor understanding of its operational performance [1][2]. Group 1: Announcement Details - The online performance briefing will take place on April 19, 2025, and will be accessible through the investor relations interactive platform [1]. - Key personnel attending the briefing include the Chairwoman and General Manager, Ms. Li Xueying, along with other executives and independent directors [1]. Group 2: Investor Engagement - The company is actively soliciting questions from investors prior to the briefing to ensure relevant and targeted communication [2]. - Investors can submit their questions via email or by scanning a QR code to access a dedicated question collection page [2].
深圳安全应急技术产品目录公布
Zhong Guo Hua Gong Bao· 2025-05-23 02:40
Core Viewpoint - Shenzhen Municipal Bureau of Industry and Information Technology has released the "Shenzhen Advanced Applicable Technologies and Products Directory for Safety Emergency (2024 Edition)", which includes 55 technologies and products from 19 companies, focusing on safety emergency applications [1][2] Group 1: Directory Overview - The directory categorizes technologies, products, and services into safety protection, monitoring and early warning, and emergency rescue and disposal [1] - It emphasizes the application of technologies in eight specific scenarios, including safety production and fire emergencies, encouraging innovation in the safety emergency sector [1] Group 2: Benefits of the Directory - The directory aids in emergency material preparation by providing an information index for relevant units, enhancing the specificity and effectiveness of emergency resource management [2] - It supports frontline operational needs by offering a reference for professionals to assess demands, select products, and coordinate resources effectively [2] - The directory aims to enhance professional capabilities by continuously updating and accumulating advanced applicable technologies and services for various emergency scenarios [2]
信息科技与金融科技结合,风险咋防?六个角度剖析
Sou Hu Cai Jing· 2025-05-22 23:21
Core Viewpoint - The integration of information technology and financial technology promotes innovation and service efficiency in the financial sector, but it also introduces numerous potential risks that require comprehensive and effective preventive measures [1] Risk Characteristics - Risks in the financial technology sector exhibit complexity, encompassing traditional financial risks as well as emerging risks such as cybersecurity and data breaches. These risks are interwoven, making precise identification and differentiation challenging. For instance, a hacker attack on financial systems can lead to data loss, triggering a crisis of user trust and financial losses [2] - The rapid spread of these risks can significantly impact a wide range of stakeholders. Additionally, vulnerabilities within information technology systems may remain hidden for extended periods, complicating detection. Certain risks may not be apparent during normal operations but can result in severe consequences under specific conditions, such as algorithmic flaws in online investment platforms during market volatility [2] Common Types of Risks - Cybersecurity issues are a significant category, as the shift of financial technology operations online has led to increased threats from hackers and malware. Criminals exploit vulnerabilities in financial institutions' networks to steal personal information and commit fraud, with many online banking users experiencing unauthorized account access [3] - Data quality issues pose substantial risks, potentially leading to erroneous decision-making by financial institutions. Inaccurate or incomplete data can result in banks extending loans to high-risk clients, increasing the likelihood of bad debts. Furthermore, incorrect credit rating data may also lead to similar outcomes, while poor data storage and management can result in data breaches, causing losses for both clients and institutions [3] Regulatory Policies - The country is continuously optimizing regulatory measures in the information technology and financial technology sectors. This includes the introduction of relevant laws and regulations to define industry entry standards and operational rules, aiming to prevent non-compliant companies from entering the market and disrupting financial order [4] - Regulatory authorities have strengthened oversight of financial technology innovations, conducting detailed assessments and ongoing monitoring of emerging financial technology products and business models to ensure their stable growth in compliance with laws and regulations. For example, regulations on virtual currency trading have effectively curbed potential risks such as financial fraud and illegal fundraising [4] Technological Risk Control - The use of artificial intelligence (AI) for risk monitoring and early warning is becoming prevalent. AI algorithms can analyze vast amounts of financial transaction data in real-time, identifying abnormal transaction patterns to quickly detect potential risks. Some banks utilize AI technology to promptly capture signs of unauthorized credit card usage and take preventive measures [7] - Blockchain technology enhances risk control capabilities by ensuring that transaction records cannot be easily altered and can be traced, thereby increasing the transparency and security of financial transactions. This is particularly effective in supply chain finance, where blockchain applications can significantly reduce fraudulent activities [7] Employee Awareness and Emergency Response - Financial institutions should enhance employee awareness of risks associated with information technology and financial technology. Regular training sessions are necessary to ensure employees understand the latest types of risks and response strategies. A lack of awareness can lead to exploitation by criminals, resulting in information leaks [8] - Establishing a robust employee evaluation and reward system is essential. Employees who excel in risk control should be rewarded, while those who violate operational regulations should face penalties. This approach can motivate employees and improve the organization's overall risk control capabilities [8] - Financial institutions need to establish emergency plans to respond swiftly to risk situations. Clear responsibilities for departments and individuals must be defined to ensure orderly emergency operations. In the event of a hacker attack, emergency protocols should be activated immediately to restore normal system operations [8] - Regular emergency drills are crucial for testing the feasibility and effectiveness of emergency plans, revealing shortcomings for improvement. Drills enhance employees' ability to respond to unexpected events, ensuring organized actions when real risks arise [8]