Success in Graduate School Admission!

Success in Graduate School Admission!

Yang Fan Graduated from the School of Information Engineering, Lanzhou University of Commerce in 2023, a member of the Communist Party of China. During his time at school, he received the Mandarin Level 2 A certificate, English Level 4, Computer Level 2 C Language Programming, Level 3 Network Technology certificate, and Intermediate Software Examination certificate.In … Read more

AI Applications in SOC: An Economical Future for Cybersecurity

AI Applications in SOC: An Economical Future for Cybersecurity

Like any powerful technology, the impact of AI depends on how it is utilized. For instance, cyber attackers are leveraging AI to execute increasingly sophisticated attacks such as phishing, network infiltration, and ransomware. However, when used correctly, AI can also become a formidable tool against these attacks.Embedding AI-driven cybersecurity solutions in Security Operations Centers (SOC) … Read more

Understanding Core Technologies of Commercial Cryptography: Algorithms, Keys, and Protocols

Understanding Core Technologies of Commercial Cryptography: Algorithms, Keys, and Protocols

From the perspective of development and application practice, the core technologies of commercial cryptography mainly include cryptographic algorithms, keys, and cryptographic protocols among other aspects. 01Cryptographic Algorithms Cryptographic algorithms includesymmetric cryptographic algorithms, public key cryptographic algorithms, and hash algorithms. To ensure the security of commercial cryptography, the national cryptography management department has established a series … Read more

In-Depth Study | Understanding Cybersecurity AI Agents and Multi-Agent Systems

This article contains 8284 words, estimated reading time is 21 minutes. · Abstract ·With the acceleration of digital transformation and the exponential increase in the complexity of cyber threats, security operation models are gradually shifting from single-product defenses and rule-driven approaches to a data-driven and AI-empowered intelligent defense era. Major cybersecurity vendors have launched their … Read more

Introduction to CISAW – Industrial Control System Cybersecurity

Introduction to CISAW - Industrial Control System Cybersecurity

CISAW Introduction to Industrial Control System Cybersecurity Focusing on core capabilities such as industrial control system security protection, threat detection, and emergency response, we are committed to cultivating versatile talents with both professional knowledge and practical skills, providing a solid guarantee for the stable operation of the country’s critical information infrastructure security. 01 Introduction to … Read more

Analysis of Major Attack Methods on PLC Industrial Control Systems and Industrial Networks

Analysis of Major Attack Methods on PLC Industrial Control Systems and Industrial Networks

↑ Click on the above “Smart Manufacturing Home” Follow us Members can enter theMember Download Areato obtainrelated materials~ Introduction Previously, we shared the main industrial control protocols and their ports from industrial giants such as Siemens, Schneider, Mitsubishi, and Rockwell: Siemens, Schneider, Mitsubishi, RA: Analysis of Major Global Industrial Control Protocols and Ports We have … Read more

Report | Deloitte: Smart Manufacturing and 3D Printing Enhance Manufacturing Competitiveness, Expected Output Increase of 10%-20%

Report | Deloitte: Smart Manufacturing and 3D Printing Enhance Manufacturing Competitiveness, Expected Output Increase of 10%-20%

Respondents view smart manufacturing as a key driver for enhancing competitiveness in the next three years, believing it will reshape production processes, improve corporate agility, and attract top talent in the industry. [Qiming Additive Manufacturing]Deloitte’s 2025 Smart Manufacturing Survey conducted between August and September 2024 shows that smart manufacturing is rapidly becoming a strategic focus … Read more

Discussion on Information Security Awareness During Cybersecurity Week: Wi-Fi Security

Discussion on Information Security Awareness During Cybersecurity Week Wi-Fi Security 01 Phishing Wi-Fi Risk Analysis In public places such as restaurants, shopping malls, train stations, and airports, free Wi-Fi hotspots are often deployed. However, attackers may create deceptive Wi-Fi hotspots. Once connected to these malicious hotspots, users may face risks such as information leakage and … Read more

Industrial Safety System Case Study | Automation Cybersecurity Defense Solutions for the Steel Industry

Industrial Safety System Case Study | Automation Cybersecurity Defense Solutions for the Steel Industry

✦ To implement the “Guidelines for Information Security Protection of Industrial Control Systems” and fulfill the policy requirements of the “14th Five-Year Plan” for coordinated development and safety, the Industrial Control System Information Security Industry Alliance (ICSISIA) launched a collection and selection activity for typical application cases of industrial safety systems on May 20, 2021. … Read more

PumaBot Malware Targets Linux IoT Devices

PumaBot Malware Targets Linux IoT Devices

Keywords Malware A botnet targeting IoT devices running the Linux operating system attacks by brute-forcing device credentials and downloading cryptocurrency mining software. Researchers at Darktrace have named this botnet “PumaBot” because its malware checks for the string “Pumatronix,” a Brazilian manufacturer of surveillance and traffic cameras, suggesting it may target such IoT devices or attempt … Read more