Recently, the National Computer Virus Emergency Response Center and 360 Company have further disclosed that the US NSA infiltration and control of China's infrastructure core equipment, stealing Chinese user privacy data, and also queried a group of sensitive identity personnel i

2025/04/0521:57:36 technology 1025

Recently, the National Computer Virus Emergency Response Center of China and 360 company attacked the Northwestern Polytechnical University incident in response to the specific intrusion operation office (TAO) under the US National Security Agency (NSA), further disclosed to the public that the US NSA infiltrated the core equipment of China's infrastructure, stole Chinese user privacy data, and also queried a group of sensitive identity personnel in China during the intrusion process, and packaged user information and encrypted it and then passed it back to the headquarters of the US National Security Agency through multiple springboards. The core of

security is to quickly see and deal with it quickly. Faced with advanced threat attacks from national opponents, in order to protect the security of our government, enterprises, universities, medical institutions, etc., 360 launches the Security Brain-APT Attack Quick Investigation and Disposal First Aid Kit to help all units quickly carry out APT attack self-inspection, and win the battle between "clever victory" and "fast victory" in three steps.

three-step process to realize APTh rapid investigation and disposal

· Deploy APT detection tool:

By deploying the 360 ​​terminal security management system, 360 advanced persistent threat warning system and 360 local security brain, based on the 360 ​​full network digital security brain empowerment, it realizes active discovery of APT attack behavior on the cloud, network, and terminal, dynamic analysis , and early warning blocking. On this basis, the security expert team will further analyze and judge based on historical sample data to check whether the user environment has been infected with APT.

· APT rapid detection and analysis:

360 terminal security management system has strong dynamic behavior monitoring and analysis capabilities and active defense capabilities for attack and trapping. By linking the 360 ​​advanced continuous threat warning system, relying on the 360 ​​network digital security brain 20 billion cloud malicious program sample library, cloud, network and terminal collaborative detection is carried out to realize rapid APT detection and analysis.

· APT attack traceability and disposal:

360 security expert team helps users discover and analyze security attacks that have been encountered, check possible security vulnerabilities, sort out possible attack paths, and guide users to conduct post-prevention and business recovery work. At the same time, through manual penetration test and attack simulation, the disposal effect is checked repeatedly, and the overall network security awareness and strength of users are continuously improved.

Recently, the National Computer Virus Emergency Response Center and 360 Company have further disclosed that the US NSA infiltration and control of China's infrastructure core equipment, stealing Chinese user privacy data, and also queried a group of sensitive identity personnel i - DayDayNews

360 Security Brain-APT Attack Quick Investigation and Disposal First Aid Kit launches a variety of product and service packages for different customer sizes and needs, committed to helping all units quickly investigate and deal with APT as soon as possible. At the same time, 360 has also launched the Security Brain-APT comprehensive and systematic prevention and control red book to help all units gradually establish long-term defense measures, achieve comprehensive and systematic prevention and control, and resist advanced threat attacks.

At present, 360 has captured a total of 50 national hacking organizations targeting my country, serving more than 10,000 government and enterprise customers, helping state, cities, large enterprises, small and medium-sized enterprises to perceive risks, see threats, and resist attacks. In the future, 360 will continue to leverage its technological advantages and capabilities, continuously improve security brain-APT solutions, protect national network security and infrastructure security, build a solid digital security barrier, and escort the development of digital economy .

technology Category Latest News