Aggregator
嘶吼快讯|网安厂商动态汇(第5期)
聚焦网安厂商最新动作,整合新品发布、战略合作、技术升级等核心动态,省去碎片化信息筛选时间,1 篇GET网安厂商近期关键动作!
网安厂商最新动态
360年度勒索软件流行态势报告发布:AI成未来勒索对抗决胜因素
近日,360数字安全集团以2025年全年勒索软件事件监测、分析与处置数据为基石,融合国内外一线安全态势数据、权威研究报告及国际热点事件情报,经综合研判梳理后,发布《2025年勒索软件流行态势报告》。
瑞数信息获评API安全推荐厂商,入选IDC《中国数据安全技术发展路线图,2025》
近日,IDC正式发布《中国数据安全技术发展路线图,2025》。瑞数信息成为IDC中国数据安全-API安全领域重点推荐的代表厂商。
观安信息9款产品入选CCIA《网络安全专用产品指南》
近日,中国网络安全产业联盟(CCIA)发布《网络安全专用产品指南》第三版。观安信息共有9款产品成功入选。
入选信通院典型案例,网易易盾携手云从科技交出政务大模型“安全答卷”
近日,由中国信息通信研究院云计算与大数据研究所组织开展的政务领域人工智能大模型应用典型案例征集结果公布。网易易盾联合国家网络安全人才与创新基地开展的“国家网安基地大模型训推一体化项目”成功入选。
芯盾时代中标湖南银行 破解特权账号管理难题
芯盾时代最新宣布中标湖南银行。帮助企业实现特权账号梳理、管理特权用户、识别账号风险、全局定期改密和完善安全审计等,全面提升企业特权账号的安全水平。
云天安全子公司正式入驻北京朝阳工业AI产业园
2026年1月,国信云天(北京)信息安全技术有限公司——山东云天安全技术有限公司旗下全资子公司正式迁入北京市朝阳区中关村(朝阳)工业AI产业园,进一步聚焦“AI+安全+工业”战略布局。
昆仑技术×可信华泰联合打造AI安全可信一体机解决方案
昆仑技术依托自主研发的服务器与KunLunOS操作系统,结合可信华泰在可信计算领域的优势,联合打造了通用及AI安全可信一体机解决方案。
明朝万达入选CCIA《网络安全专用产品指南》第三版
明朝万达两款核心产品——安元数据防泄漏系统、安元数据库安全审计系统成功入选CCIA《网络安全专用产品指南》。
通付盾销售智能体通过国家网信办备案
近日,国家互联网信息办公室正式公布第十五批深度合成服务算法备案信息,江苏通付盾信息安全技术有限公司自主研发的“通付盾销售智能体生成合成类算法”成功完成备案。
18家机构联合发布数据安全产品目录,天融信全品类上榜
近日,由中国信息通信研究院牵头,联合18家权威单位共同编制的《数据安全产品目录(2025年版)》正式发布。天融信数据分类分级系统、数据库审计系统、API安全审计系统、数据安全管理平台、数据脱敏系统五款产品成功入选,实现全品类覆盖。
信安世纪参编的4项密码行业标准发布,1项金融行业标准施行
日前,国家密码管理局发布第54号公告,批准公布了多项密码行业标准,自2026年7月1日起实施。其中,北京信安世纪科技股份有限公司参与了其中4项标准的编制工作。同时,依据中国证券监督管理委员会公告〔2026〕2号,信安世纪参编的金融行业推荐性标准JR/T 0347-2026 《证券期货业信息系统密码技术应用指引》已于2026年1月9日正式施行。
奇安信入选北京市可持续信息披露试点企业名单
近日,北京市财政局、北京市发展和改革委员会、北京市人民政府国有资产监督管理委员会联合发布《关于印发北京市通过可持续信息披露试点企业名单的通知》,奇安信集团成功入选北京市首批可持续信息披露试点企业名单。
江民科技与数字重庆政务科技达成技术生态合作
近日,江民科技与数字重庆政务科技达成技术生态合作,双方将围绕数字政府建设的安全需求,在政务安全解决方案、数据安全保障和信创生态适配等领域展开深度协作。
知道创宇大模型网关入选“巢燧”大模型创新应用案例
在第三届“大模型 大未来”人工智能大模型基准测试发展大会上,创宇“巢燧”大模型创新应用案例正式发布。
启明星辰五款产品入选国家级数据安全产品目录
在中国互联网产业年会“数据安全产业发展论坛”上,启明星辰共有五款产品成功入选《数据安全产品目录(2025年版)》,实现该目录五大产品类别全覆盖。
Digital Archeology: GotMeta Unearths Hidden Data from Target Domains
GotMeta A Python tool for discovering, downloading, and extracting metadata from publicly available files on target domains. Useful
The post Digital Archeology: GotMeta Unearths Hidden Data from Target Domains appeared first on Penetration Testing Tools.
2026-01-19: Six days of scans and probes and web traffic hitting my web server
2026-01-15: XLoader (Formbook) infection
2026-01-14: Lumma Stealer infection with follow-up malware
The Jackpotting Ring: Venezuelan Malware Syndicate Admits to Multi-State ATM Heist
A collective of Venezuelan nationals, implicated in a sophisticated series of fiscal exfiltrations from automated teller machines via
The post The Jackpotting Ring: Venezuelan Malware Syndicate Admits to Multi-State ATM Heist appeared first on Penetration Testing Tools.
Botnet King Denied: Singapore High Court Blocks Wang Yunhe’s Bid to Reclaim Seized Gear
A Singaporean tribunal has dismissed a motion filed by Wang Yunhe, a Chinese national indicted in the United
The post Botnet King Denied: Singapore High Court Blocks Wang Yunhe’s Bid to Reclaim Seized Gear appeared first on Penetration Testing Tools.
The Broker Unmasked: Jordanian “r1z” Admits Selling Access to 50 Corporate Networks
A Jordanian national residing in Georgia has formally confessed to his involvement in the illicit trade of unauthorized
The post The Broker Unmasked: Jordanian “r1z” Admits Selling Access to 50 Corporate Networks appeared first on Penetration Testing Tools.
The Gazprom Slip: Georgia Scrambles After State Secrets Leak on Official Portal
For several hours, the official portal of the Georgian government inadvertently hosted sensitive information that authorities would have
The post The Gazprom Slip: Georgia Scrambles After State Secrets Leak on Official Portal appeared first on Penetration Testing Tools.
Unpatched RCE in Livewire Filemanager Grants Full Server Access
A critical vulnerability has emerged within a popular utility for the Laravel framework, effectively transmuting a standard file
The post Unpatched RCE in Livewire Filemanager Grants Full Server Access appeared first on Penetration Testing Tools.
No More Accidental Texts: Google Messages Tests Life-Saving “Tap to Edit” Feature
Sometimes, the most mortifying missives are dispatched not by intent, but by a stray, clumsy gesture. It appears
The post No More Accidental Texts: Google Messages Tests Life-Saving “Tap to Edit” Feature appeared first on Penetration Testing Tools.
Foundations of Sand: 30-Year-Old glibc Vulnerability Exposed in Linux Core
Occasionally, the most unforeseen vulnerabilities reside not within nascent code, but within foundations that have been deemed unimpeachable
The post Foundations of Sand: 30-Year-Old glibc Vulnerability Exposed in Linux Core appeared first on Penetration Testing Tools.
The PC That Never Sleeps: Microsoft Issues Emergency Fix for Windows 11 Shutdown Bug
The January suite of Windows 11 updates has unexpectedly manifested as one of those troublesome releases where the
The post The PC That Never Sleeps: Microsoft Issues Emergency Fix for Windows 11 Shutdown Bug appeared first on Penetration Testing Tools.
Outlook Classic Paralyzed: January Windows 11 Update Breaks POP Email Access
Microsoft has initiated a formal inquiry into a proliferation of grievances asserting that the January security update for
The post Outlook Classic Paralyzed: January Windows 11 Update Breaks POP Email Access appeared first on Penetration Testing Tools.
黑客在 Instagram 上泄露美国最高法院数据
The Resilience Debt: Dell Unveils the Hidden Risk Behind Overconfident Cyber Recovery
Corporations across the globe frequently harbor an inflated perception of their capacity to recuperate from cyber incursions. This
The post The Resilience Debt: Dell Unveils the Hidden Risk Behind Overconfident Cyber Recovery appeared first on Penetration Testing Tools.
The End of NTLMv1: Mandiant Releases Rainbow Tables to Kill Legacy Logins
Mandiant has disseminated an exhaustive repository of rainbow tables engineered to decrypt the antiquated Net-NTLMv1 protocol. This initiative
The post The End of NTLMv1: Mandiant Releases Rainbow Tables to Kill Legacy Logins appeared first on Penetration Testing Tools.
扩展程序引发浏览器崩溃,为ClickFix攻击铺路
The Security Paradox: New Study Reveals 69 Vulnerabilities in AI-Generated Apps
The automation of software development via artificial intelligence has transitioned from the realm of speculative fiction into an
The post The Security Paradox: New Study Reveals 69 Vulnerabilities in AI-Generated Apps appeared first on Penetration Testing Tools.