-+ 0.00%
-+ 0.00%
-+ 0.00%

On December 10, the 15th Cybersecurity Vulnerability Analysis and Risk Assessment Conference opened in Tianjin. 360 Group founder Zhou Hongli said that the existence of vulnerabilities has completely changed the rules of the cybersecurity game. Attackers don't need to attack; they only need to use a vulnerability to bypass traditional protections such as firewalls and directly invade systems through a malicious email or a special data packet. Currently, we are entering an era where everything is programmable and software defines the world. Government operations, city operations, business operations, and even people's lives are all structured on code, making bugs more destructive than ever before. What is even more worrisome is that the emergence of “hacker intelligence” will further exacerbate the asymmetry of cyber attacks and defense and become “superhackers.” This changed cyber attack and defense from a “man-to-man” confrontation to a “man-to-machine” confrontation, exacerbated the asymmetry of attack and defense, and even changed the shape of cyber warfare.

智通財經·12/11/2025 14:25:14
語音播報
On December 10, the 15th Cybersecurity Vulnerability Analysis and Risk Assessment Conference opened in Tianjin. 360 Group founder Zhou Hongli said that the existence of vulnerabilities has completely changed the rules of the cybersecurity game. Attackers don't need to attack; they only need to use a vulnerability to bypass traditional protections such as firewalls and directly invade systems through a malicious email or a special data packet. Currently, we are entering an era where everything is programmable and software defines the world. Government operations, city operations, business operations, and even people's lives are all structured on code, making bugs more destructive than ever before. What is even more worrisome is that the emergence of “hacker intelligence” will further exacerbate the asymmetry of cyber attacks and defense and become “superhackers.” This changed cyber attack and defense from a “man-to-man” confrontation to a “man-to-machine” confrontation, exacerbated the asymmetry of attack and defense, and even changed the shape of cyber warfare.