Discover the top 12 most commonly exploited software vulnerabilities in 2022 as reported by CISA. Learn about CVEs like Log4Shell and ProxyShell that attackers
China has drafted new rules to manage the application of facial recognition technology, aiming to ensure user privacy and prevent misuse. The draft emphasizes o
ISC 2023 highlighted the significant role of private enterprises in cybersecurity. National Committee member Wang Hongyan discussed how these companies can cont
At the opening of ISC 2023, Shu Bo discussed the importance of data security in safeguarding the high-quality development of China's AI industry. Key points inc
At the ISC 2023 conference, Chaoyang区长吴小杰 discussed how innovation and technology are driving digital security advancements. Key highlights include the developm