网络安全
Search documents
第十五届VARA大会在天津开幕 周鸿祎发表主题演讲:筑牢AI安全底座 护航高质量发展
Zheng Quan Ri Bao· 2025-12-11 11:13
Group 1 - The 15th Vulnerability Analysis and Risk Assessment Conference (VARA) was held in Tianjin, featuring Zhou Hongyi, founder of 360 Group, as the only representative from the industry, discussing new challenges in cybersecurity in the era of artificial intelligence [2] - 360 Digital Security Technology Group received two significant honors from the National Information Security Vulnerability Database (CNNVD) and the China Information Security Testing Center, recognizing its contributions and technical support capabilities in national vulnerability governance [2] - Zhou Hongyi emphasized that the existence of vulnerabilities has fundamentally changed the rules of cybersecurity, allowing attackers to exploit a single vulnerability to bypass traditional defenses and directly invade systems [2] Group 2 - The emergence of "hacker agents" is raising concerns, as they can automate tasks such as vulnerability discovery and network attacks, allowing a single human hacker to manage multiple agents, thus shifting the cybersecurity landscape from "human vs. human" to "human vs. machine" [3] - 360's core strategy to combat these challenges is "using AI to fight AI," enhancing vulnerability detection efficiency and accuracy through its self-developed 360 security model, which includes multiple expert models working in collaboration [3][4] - 360 has developed a swarm intelligence model for automated vulnerability analysis and discovery, significantly simplifying the vulnerability management process and reducing reliance on human intervention [4]
第十五届VARA大会在津开幕 周鸿祎强调筑牢AI安全底座
Zheng Quan Shi Bao Wang· 2025-12-11 10:55
Group 1 - The VARA conference, a significant annual event in the cybersecurity field, focuses on vulnerability management and AI security, highlighting the importance of collaboration among government, industry, academia, and research [1] - Zhou Hongyi, founder of 360 Group, emphasized the changing landscape of cybersecurity due to vulnerabilities, which allow attackers to bypass traditional defenses with minimal effort [2] - The emergence of "hacker agents" has transformed the nature of cyber warfare, shifting the confrontation from "human vs. human" to "human vs. machine," increasing the asymmetry in cyber defense [2] Group 2 - 360's core strategy to combat AI threats involves using its self-developed 360 security model to enhance the efficiency and accuracy of vulnerability detection, transitioning from rule-based to learning-driven methods [3] - The company has developed multiple expert models that work collaboratively to address various issues in vulnerability management, laying the groundwork for creating intelligent security agents [3] - 360 has introduced a swarm intelligence model for automated vulnerability analysis and discovery, significantly streamlining the vulnerability management process and reducing reliance on manual operations [4]
聚焦AI时代网络安全新挑战 周鸿祎:用AI对抗AI
Zhong Guo Xin Wen Wang· 2025-12-11 10:21
他表示,传统网络攻击往往需要强行突破防御体系,而如今攻击者仅需利用一个漏洞即可绕过传统防 护。更为严峻的是,基于AI的"黑客智能体"可将人类黑客的经验与能力程序化,自动执行漏洞挖掘、利 用和攻击任务,并能被大规模复制与管理,形成"超级黑客"效应,推动网络攻防从"人与人"对抗转 向"人与机器"对抗。 面对新型挑战,周鸿祎提出"用AI对抗AI"的应对思路。他介绍,通过自主研发的360安全大模型,可将 传统规则驱动的检测升级为学习驱动,并构建协同工作的专家模型群,为打造应对威胁的安全智能体提 供"大脑"。基于大模型、知识库与专用工具开发的专业安全智能体,能复刻人类高级安全专家能力,实 现全天候快速响应,提升防御自动化水平。 据悉,VARA大会自2008年创办以来,已成为国内网络安全领域凝聚"政产学研用"各方力量的重要年度 交流平台。本届大会由中央网信办、国家市场监督管理总局指导,中国信息安全测评中心主办。(完) 【编辑:刘阳禾】 中新网天津12月11日电 (记者 周亚强)"漏洞的存在已彻底改变了网络安全的游戏规则。"360集团创始人 周鸿祎10日表示,AI既是新质生产力与安全防御的新载体,也是全新的风险源头。 当天 ...
十七年终端安全领导者!北信源获评“年度创新领航企业”
Xin Lang Cai Jing· 2025-12-11 10:16
Core Viewpoint - Beijing Beixin Source Software Co., Ltd. has been awarded the "Annual Innovative Leading Enterprise" at the 9th China Cybersecurity and Information Industry "Golden Intelligence Award," recognizing its contributions and innovation in the terminal security market and as a leader in the domestic security sector [2][9]. Group 1: Company Background - Beixin Source was established in 1996 and is one of the first suppliers of independent brand information security products and solutions in China, reflecting the industrialization process of China's cybersecurity sector [10]. - Since its listing on the Growth Enterprise Market in 2012, the company has prioritized safeguarding national cybersecurity as its core mission [10]. Group 2: National Security Contributions - The company has over 20 years of experience in providing security assurance for major national events, including the National People's Congress and the 20th National Congress of the Communist Party, achieving a "zero-error" record that has earned it high trust from the state [4][13]. - Beixin Source is recognized as a technical support unit for the National Cyber and Information Security Information Reporting Center and the National Internet Emergency Center, establishing its technical capabilities as a cornerstone for safeguarding national digital sovereignty [4][13]. Group 3: Market Leadership - Beixin Source has maintained the number one market share in China's terminal security management market for 17 consecutive years, demonstrating the stability, applicability, and customer reputation of its products [14]. - The company is acknowledged as a leading enterprise in the domestic security sector, actively engaging in the innovation wave of information technology applications and contributing to the construction of a domestic security ecosystem [5][14]. Group 4: Strategic Vision and Development - The company adheres to a brand philosophy centered on "the source of information, trust, confidence, and belief," integrating information security into its corporate culture [6][15]. - Beixin Source aims to be the foundation for communication security in digital business applications, particularly in the field of instant communication, by developing a secure and reliable domestic instant messaging and mobile office platform [6][15]. Group 5: Service to National Strategy - The client base of Beixin Source spans national agencies, ministries, defense industries, and critical sectors such as finance and energy, illustrating its role in protecting key national information infrastructure [7][16]. - The "Golden Intelligence Award" has evolved into an important indicator of the pulse of China's cybersecurity industry, promoting innovation and technological advancement within the sector [7][16].
周鸿祎第十五届VARA演讲:筑牢AI安全底座,护航高质量发展
华尔街见闻· 2025-12-11 08:21
Core Viewpoint - The VARA conference highlights the increasing importance of cybersecurity in the age of artificial intelligence, emphasizing the need for advanced strategies to combat new threats posed by vulnerabilities and AI-driven attacks [3][5][8]. Group 1: Conference Overview - The 15th VARA conference took place in Tianjin, attended by representatives from 27 national ministries, 52 state-owned enterprises, over 100 cybersecurity companies, and more than 30 universities and research institutions [1]. - The conference serves as a significant platform for collaboration among government, industry, academia, and research, focusing on key issues such as vulnerability management and AI security [3]. Group 2: Recognition and Achievements - 360 Digital Security Technology Group received two prestigious awards from the National Information Security Vulnerability Database (CNNVD) and the China Information Security Testing Center, recognizing its contributions to the national vulnerability management ecosystem [2][4]. Group 3: Key Challenges and Strategies - Zhou Hongyi, founder of 360, discussed the transformative impact of vulnerabilities on cybersecurity, noting that attackers can exploit a single vulnerability to bypass traditional defenses [3][5]. - The emergence of "hacker agents" has shifted the landscape of cyber warfare, allowing individuals to manage multiple automated hacking entities, thus intensifying the asymmetry in cyber defense [3][5]. Group 4: AI-Driven Solutions - 360's strategy to combat AI-driven threats involves developing an AI-powered security model that enhances the efficiency and accuracy of vulnerability detection [5]. - The company has created multiple expert models that work collaboratively to address various security challenges, laying the groundwork for the development of intelligent security agents [5][7]. - The introduction of automated vulnerability analysis and discovery through the "hive intelligence" model significantly streamlines the vulnerability management process, reducing reliance on manual operations [7]. Group 5: Future Outlook - Zhou emphasized that AI represents both a new productivity driver and a potential source of risk, advocating for collaborative efforts to strengthen digital security foundations [8].
周鸿祎第十五届VARA演讲:筑牢AI安全底座,护航高质量发展
券商中国· 2025-12-11 07:32
Core Viewpoint - The VARA conference highlighted the increasing challenges in cybersecurity due to the emergence of AI-driven threats and the need for advanced solutions to address vulnerabilities in the digital landscape [5][6]. Group 1: Conference Overview - The 15th VARA conference took place in Tianjin, attended by over a thousand representatives from 27 national ministries, 52 central enterprises, and more than 100 cybersecurity companies, along with 30 universities and research institutions [1]. - The conference serves as a significant platform for collaboration among government, industry, academia, and research, focusing on key issues such as vulnerability management and AI security [5]. Group 2: Recognition of 360 Group - 360 Digital Security Technology Group received two prestigious awards from the National Information Security Vulnerability Database (CNNVD) and the China Information Security Testing Center, recognizing its contributions to national vulnerability management [2][3]. Group 3: Key Insights from Zhou Hongyi's Speech - Zhou Hongyi emphasized that vulnerabilities have fundamentally altered the rules of cybersecurity, allowing attackers to exploit weaknesses with minimal effort, such as through malicious emails or specially crafted data packets [5]. - The rise of "hacker agents" has intensified the asymmetry in cyber defense, enabling a single hacker to manage multiple automated agents, transforming the nature of cyber warfare from human-to-human to human-to-machine confrontations [5][6]. Group 4: 360's AI Strategy - 360's strategy involves using AI to combat AI threats, enhancing vulnerability detection efficiency and accuracy through the development of a security model that integrates multiple expert models for comprehensive threat management [6]. - The introduction of automated vulnerability detection and response systems has streamlined processes that previously relied heavily on manual intervention, significantly improving operational efficiency [8]. Group 5: Future Outlook - Zhou Hongyi concluded by stating that while AI presents new opportunities for productivity and security, it also introduces new risks, urging collaboration across sectors to strengthen digital security foundations [9].
第十五届VARA大会在津开幕,周鸿祎:攻击者仅需一个漏洞就能入侵系统
Xin Lang Cai Jing· 2025-12-11 05:07
Group 1 - The 15th Vulnerability Analysis and Risk Assessment Conference (VARA) was held in Tianjin, recognized as a significant annual event in the domestic cybersecurity field since its inception in 2008, serving as a vital communication platform for various stakeholders [1] - At the conference, 360 Digital Security Technology Group was awarded two important honors: "2025 Outstanding Technical Support Unit" and "CNNVD Collaborative Hardware and Software Excellent Vulnerability Management Enterprise" by the National Information Security Vulnerability Database (CNNVD) and the China Information Security Evaluation Center [3][5] - Zhou Hongyi, the founder of 360 Group, emphasized that the existence of vulnerabilities has fundamentally changed the rules of cybersecurity, allowing attackers to exploit a single vulnerability to bypass traditional defenses and directly invade systems [3][5] Group 2 - Zhou highlighted the emergence of "hacker intelligences," which exacerbates the asymmetry in cyber offense and defense [3][5] - 360 has developed multiple professional security intelligences based on a security large model, knowledge base, workflows, and specialized tools, capable of replicating the abilities of advanced human security experts to respond quickly to security incidents [3][5] - The vulnerability mining swarm intelligence created by 360 can automate the analysis and discovery of security vulnerabilities, allowing operators to input a vulnerability number and the system to complete the entire operational process without human intervention [3][5] - Zhou stated that AI serves as both a new productive force and a new source of risk in security defense, expressing 360's willingness to collaborate with various sectors to strengthen the digital security foundation [3][5]
第十五届网络安全漏洞分析与风险评估大会在天津启幕
Zhong Guo Jing Ji Wang· 2025-12-11 01:45
中国经济网12月11日讯(记者鞠然)12月10日,由中央网络安全和信息化委员会办公室、国家市场监督管 理总局共同指导,中国信息安全测评中心主办的"第十五届网络安全漏洞分析与风险评估大会 (VARA)"在天津梅江会展中心召开。 作为我国网络安全领域极具权威性和影响力的专业性学术盛会,本届大会以"数智赋能智御未来"为主 题,由1个主论坛、3个分论坛及1个网络空间智能化先进成果装备展共同构成。参会阵容涵盖27家国家 部委和行业主管部门的省部级、司局级领导,52家央企和关键信息基础设施运营单位、100余家网络安 全企业,以及国内30余所高等院校和科研机构的1000余名嘉宾。通过搭建高端的交流展示平台,汇聚 政、产、学、研、用各方力量,全方位、深层次地展示了网络安全领域的新理念、新技术、新产品与新 应用,为筑牢国家网络安全屏障、推动产业高质量发展、护航网络强国建设提供坚实的技术支撑与智力 保障。 开幕式上,国家市场监督管理总局总工程师刘敏、国务院国有资产监督管理委员会副主任庞骁刚、天津 市人民政府副市长王秀峰、中国信息安全测评中心主任彭涛等领导先后登台致辞。他们强调,当前网络 安全已成为国家安全体系的重要组成部分,是数 ...
挖过特斯拉漏洞的黑客,来堵汽车的窟窿
汽车商业评论· 2025-12-10 23:07
Core Viewpoint - The article emphasizes the critical importance of cybersecurity in the automotive industry, particularly in the context of smart vehicles, highlighting the need for proactive security measures and the integration of AI in addressing vulnerabilities [4][10][21]. Group 1: Cybersecurity Challenges - The automotive industry faces significant cybersecurity challenges, including complex security designs, vulnerabilities in development and testing, and insufficient agility in security operations [20][21]. - The industry consensus is that there is no absolute security solution, and the key lies in the responsiveness to vulnerabilities and the efficiency of remediation efforts [21]. Group 2: Company Insights - The company, Dogan Technology, has established itself as a leader in cybersecurity, having discovered vulnerabilities in major systems like Tesla and Apple, and emphasizes a hacker's mindset in its approach to security [8][18]. - The founder, Li Jun, highlights the difficulties faced by startups in the cybersecurity space, particularly in expanding into markets like the U.S. due to geopolitical factors [6][18]. Group 3: Security Design and AI Integration - The article discusses the necessity of front-loading security design in automotive systems to avoid high costs and unresolvable issues later in the lifecycle [10][26]. - AI is positioned as a crucial tool for analyzing attack paths and optimizing security measures, allowing for targeted defenses at critical points [10][41]. Group 4: Lifecycle Approach to Security - The company advocates for a full lifecycle approach to cybersecurity, integrating design, testing, and operational phases to ensure continuous improvement and adaptation to new threats [44][49]. - The use of advanced modeling and AI is proposed to enhance the security design process, enabling a systematic and comprehensive analysis of potential vulnerabilities [29][40].
深圳国华网安科技股份有限公司关于中标项目的进展公告
Shang Hai Zheng Quan Bao· 2025-12-10 19:19
Group 1 - The company Shenzhen Guohua Network Security Technology Co., Ltd. has confirmed that its wholly-owned subsidiary Beijing Zhiyou Network Security Technology Co., Ltd. has won the bid for the "Kelong Cloud Intelligent Computing Center Phase II Section 3" project and has signed the contract with Xinjiang Kelong Cloud Computing Technology Co., Ltd. [2] - As of the date of this announcement, the first phase of the project is progressing normally according to the contract, with equipment supply, installation, and debugging being carried out in an orderly manner. However, the second phase of the project will not commence before December 31, 2025, and the timing for its initiation will be negotiated later. [3] - The company will recognize revenue based on the execution of each phase of the contract and the principles of revenue recognition, with specific amounts subject to confirmation by the auditing agency. [4]