Aggregator
直播预告:Exchange/M365邮件系统防护方案
8月14日15:00 邮件系统防护方案直播
立即预约:领取千元好礼
Exchange/M365邮件系统安全如何防范?安全专家现场支招,结合专属防护方案与客户案例,为你深度解析!
直播亮点:
·威胁解析与应对方案:
看邮件安全网关如何层层布防,加固防护
·跨行业应用案例拆解:
深度拆解交通/珠宝/啤酒等不同领域实际案例
直播预告:Exchange/M365邮件系统防护方案
聚势共商,智御新威胁!ISC.AI 2025 “智能化时代下的勒索挑战与应对”论坛在京召开
近日,ISC.AI 2025 “智能化时代下的勒索挑战与应对”主题论坛在京成功召开。本次论坛由数世咨询李少鹏主持,特别邀请知名技术专家、行业领袖、企业代表,通过技术解析与实践经验融合,提供全链路解决方案与技术实践参考,助力行业系统性提升勒索防护能力,推动行业从被动防御向主动应对转型,为构建安全屏障注入新动能。
在主题演讲环节中,思而听(山东)网络科技有限公司总经理何颖以《勒索病毒演进史与应急响应服务的创新实践》为题进行了分享。他指出,勒索病毒的攻击与企业的等保或合规状态无关,攻击者只会精准利用系统漏洞实施勒索与数据窃取。面对日益复杂多变的威胁环境,仅依赖单一技术手段难以应对所有风险。AI的价值在于辅助分析、提升效率,加快处置节奏,而真正有效的防护需要威胁情报平台、检测响应能力与行业协作的有机结合。勒索防护是一场长期战役,唯有加强信息共享、整合各方力量,才能精准识别攻击来源、追溯家族特征并进行有效防御。
思而听Solar应急响应团队核心成员袁泽宇在《AI驱动下的勒索病毒分析与破解技术研究》的分享中提到,AI技术的飞速发展是把双刃剑。技术本身无善恶之分,关键在于使用者。恶意行为者正利用AI制造威胁,其能力日益增强。例如,单个攻击者借助AI,也能生成具备组织级破坏力的勒索病毒样本。这凸显了技术被滥用的现实风险。
思而听(山东) 网络科技有限公司副总经理梁文豪在《防勒索引擎驱动:掘金中东中亚欧洲中资出海安全新蓝海》的主题演讲里聚焦中资企业在"一带一路"沿线的三大痛点(安全人才短缺、复杂勒索威胁、差异化合规压力)。他表示,网络安全是一场持久战,而非一时之功,需要十年如一日的长期投入。企业级安全的真正实现,根基在于拥有一支专业化、稳定化的安全运营团队。
同时,他分享了基于思而听防勒索产品+安全运营服务的海外落地经验与防护成果,方案既可破解中企出海安全困局,并倡议与各类安全厂商携手,共建海外市场的战略支点——启航欧亚中东安全蓝海。
360天御技术总监霍亮在《移动应用通信协议风险及防护思路》的分享中表示,应用对网络通信的深度依赖,不可避免地引入了协议层面的安全风险。一旦核心通信协议存在漏洞或被恶意攻击者盯上,极易引发敏感数据泄露、关键业务中断等严重后果,不仅造成直接经济损失,更将严重损害企业品牌声誉与用户信任。360依托长达十余年的安全实战积淀,历经数百次攻防对抗考验,积累了深厚的安全防御能力与技术洞察。基于此,我们构建了一套成熟完善的安全解决方案,能够有效识别、阻断协议层威胁,并为业务连续性提供坚实保障。
海外油气行业企业网络安全负责人朱正轩则以《AI赋能的安全运营与勒索病毒响应》为题进行了分享,他表示,当前AI已能助力网络安全行业超越基础运营范畴,例如在勒索病毒分析等场景显著提升效率。然而,AI与行业的深度整合仍处于发展阶段,存在明显差距。这种技术与应用融合的挑战并非网络安全独有,而是现阶段各行业的普遍现象。
为积极应对人工智能时代背景下的勒索攻击挑战,本次论坛特别设置“思而听新时代勒索病毒防护产品发布”环节。思而听(山东)网络科技有限公司技术总监艾力扎提·黑力力在发布仪式上指出,企业应对勒索病毒主要面临着八大困境——检测手段滞后、安全团队缺失、应急响应薄弱、溯源能力不足、情报闭塞、备份机制不完善、资源预算有限及终端防护差。防勒索AI疫苗——SAR作为企业级解决方案,专注预防、检测、响应与恢复全流程,通过实时监控设备状态、动态威胁分析、自动化密钥备份及威胁情报联动,构建覆盖事前防护、事中拦截、事后恢复的全生命周期防护体系。
论坛压轴的圆桌论坛以“AI驱动的识别-分析-响应全链路实战对话”为主题,汇聚多方智慧,围绕提升威胁检测精度、加速攻击行为研判及构建自动化响应体系展开,为应对高隐蔽、强对抗的勒索攻击提供新一代防护思路。
AI浪潮奔涌,勒索威胁持续升维。本次ISC.AI 2025 “智能化时代的勒索挑战与应对”主题论坛的成功召开,有效破解了高隐蔽、强对抗勒索病毒的防护困境,填补了智能化时代下勒索攻防的实战经验空白,为政企机构系统化提升勒索防护能力提供关键支撑。
聚势共商,智御新威胁!ISC.AI 2025 “智能化时代下的勒索挑战与应对”论坛在京召开
CVE-2025-8908 | Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.5.4 event.php openid sql injection
XCon2025议题||在幻觉与超能中前行——大模型参与安全运营的应用探索
WinRAR 零日漏洞被利用 可在解压文档时植入恶意软件
AWS CISO explains how cloud-native security scales with your business
In this Help Net Security interview, Amy Herzog, CISO at AWS, discusses how cloud-native security enables scalable, flexible protection that aligns with how teams build in the cloud. She explains the Shared Responsibility Model and the tools and processes that scale security. Herzog also explains how AI helps automate threat detection and vulnerability management. What does “cloud-native security” mean? Cloud-native security refers to both security controls that work the same way the cloud does and … More →
The post AWS CISO explains how cloud-native security scales with your business appeared first on Help Net Security.
CVE-2025-8907 | H3C M2 NAS V100R006 Webserver Configuration unnecessary privileges
Submit #626276: Shanghai Lingdang Information Technology Co., Ltd Ling Dang CRM System <= V8.6.5.2.23 SQL Injection [Accepted]
Submit #624554: H3C M2 V100R006 Misconfiguration [Accepted]
Chrome Security Update Fixes High-Severity Flaws Allowing Arbitrary Code Execution
Google has released a critical security update for its Chrome browser, addressing six security vulnerabilities, including three high-severity flaws that could potentially allow arbitrary code execution on affected systems. The stable channel update, version 139.0.7258.127/.128 for Windows and Mac, and 139.0.7258.127 for Linux, was announced on August 12, 2025, and will roll out to users […]
The post Chrome Security Update Fixes High-Severity Flaws Allowing Arbitrary Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical FortiSIEM Vulnerability Lets Attackers Execute Malicious Commands – PoC Found in the Wild
A critical security vulnerability in the Fortinet FortiSIEM platform allows unauthenticated attackers to execute arbitrary commands remotely. The vulnerability CVE-2025-25256, classified as CWE-78 (OS Command Injection), has been actively exploited in the wild with practical exploit code already circulating among threat actors. Key Takeaways1. Critical FortiSIEM flaw actively exploited with PoC in the wild.2. Targets […]
The post Critical FortiSIEM Vulnerability Lets Attackers Execute Malicious Commands – PoC Found in the Wild appeared first on Cyber Security News.
Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
FortiWeb Authentication Bypass Vulnerability Allows Logins as Any Existing User
A critical security vulnerability in Fortinet’s FortiWeb web application firewall has been discovered that allows unauthenticated attackers to bypass authentication and impersonate any existing user on affected devices. The flaw, tracked as CVE-2025-52970 and dubbed “Fort-Majeure” by its discoverer, stems from improper parameter handling in the application’s cookie parsing mechanism. Vulnerability Details and Impact The […]
The post FortiWeb Authentication Bypass Vulnerability Allows Logins as Any Existing User appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.