laitimes

The unique copy of digital security listed companies has more than 360 exposures to the NSA's top cyber weapons

"The 360 report points out that many countries that cooperate with the United States are also targets of U.S. cyber attacks." On March 24, Foreign Ministry Spokesperson Wang Wenbin presided over a regular press conference and answered reporters' questions on the report "Prelude to CyberWarried: The NSA(APT-C-40) Launched an Indiscriminate Attack on the World for More Than a Decade" recently released by 360. Wang Wenbin said that he has noticed reports that the Us side uses quantum attacks to launch attacks on all the Internet, "which means that no matter who you are, no matter where you are in the world, as long as you use online social platforms, there may be a boss staring at you behind your back." In this regard, the Foreign Ministry urges the Us side to be a responsible country in cyberspace.

The unique copy of digital security listed companies has more than 360 exposures to the NSA's top cyber weapons
The unique copy of digital security listed companies has more than 360 exposures to the NSA's top cyber weapons

The relevant exposure of 360 also highlights the increasingly fierce attack and defense of the digital space, and the construction of digital security protection system is imminent in order to protect China's digital economy construction and national security.

The unique copy of digital security listed companies has more than 360 exposures to the NSA's top cyber weapons

"Regardless of the white cat or the black cat, the one who can catch the mouse is the good cat." In the field of digital security, only security companies that can truly capture APT organizations and help countries and enterprises consolidate their security capabilities are truly powerful companies, and only 360 has done this among China's security companies. "There are industry insiders who comment.

The unique copy of digital security listed companies has more than 360 exposures to the NSA's top cyber weapons

Netizens commented that 360 is a heavy weapon of the country

However, due to the past compliance-driven business development, resulting in selling products become the mainstream of the market, domestic security listed companies often sell more products than who sells, the market value is high, and ignore the core security capability construction of "practical confrontation". However, when the country's digital security is threatened, the fragmented defense established through the sale of products often does not play a substantial role, and only by seeing the threat and catching the threat can we help the country build an "anti-missile system" of digital security.

Therefore, there is an urgent need to establish a new yardstick for judging listed safety companies. A number of securities companies have said that in the new era of digital civilization, actual combat drills are the only criterion for testing security capabilities. Huatai Securities report pointed out that the current mainland security industry is entering a period of rapid growth, one of the most significant features is that the effect of the actual combat attack and defense exercise is prominent, promoting the development of the actual network security construction and security service industry. At present, there is a general consensus in the security circle: to promote the development of the industry by establishing the "security capability" of the actual combat drill rather than "compliance", it will allow high-quality customers to see the value of the security industry and bring huge blue ocean market space.

The Capital Securities Report also believes that the protection of the network to promote the security needs from formal compliance to the advanced combat exercise, the customer's security construction needs from passive defense to active defense stage change, with combat, confrontation, offensive and defensive thinking and systematic construction capabilities of security vendors can be deeply integrated and covered with the customer's information environment, forming an effective and systematic protection. In the digital space, to protect against the threat, you first need to build the capacity to "see" the threat.

In fact, this is precisely the "card neck" problem faced by China's digital security field, and Western countries have long maintained a single transparent advantage in the mainland digital space, resulting in the major problem of "who comes in and does not know, whether it is an enemy or a friend does not know, and what is done does not know".

However, through 17 years of unremitting efforts, 360 independently discovered more than 96% of foreign national hacking organizations, with as many as 47 data, including 3600 attacks on the mainland, more than 20,000 targets, and the number of APT (Advanced Sustainable Threat) reports released was the highest in the world.

Taking the United States as an example, in March 2020, 360 Security Brain captured and disclosed the eleven-year-long cyberattack infiltration of the mainland by the CIA Attack Group (APT-C-39), ending the U.S. one-way transparency advantage over the mainland. In addition, 360 also issued an exclusive report in March this year, publicly disclosing that the US National Security Agency, in order to achieve the purpose of intelligence collection of the US government, launched cyber attacks against the government, finance, scientific research institutes, operators, education, military, aerospace, medical and other industries in the mainland, as well as important sensitive units and organizations, causing serious harm to the national security of the mainland. This also partly ends the history of the United States in my cyberspace without a trace.

As the world's largest digital security company, 360's achievements are no accident. 360 has invested a total of 23 billion yuan in research and development funds, using the world's largest security big data and attack sample library harvested in the front line of attack and defense confrontation for many years, analyzing and refining to form a unique attack knowledge base in the world, establishing a cloud security brain with security big data analysis as the core, forming a strong cyberspace early warning capability, and providing a foundation for solving the card neck problem of "visible" advanced attacks. In addition, 360 has also broken through eight "killer skills" technologies, including network map mapping, big data intelligent analysis, APT detection, knowledge graph, 0Day vulnerability capture, SASE, zero trust, and digital certificates. At present, 360 is contributing this complete set of technologies to the country, helping the country to establish a "homeland air defense system" in the digital space.

Read on