Aggregator
用户数突破六万!美亚鉴真小程序守护人工智能安全防线
近日,由国投智能股份全资子公司美亚柏科自主研发的“美亚鉴真平台”微信小程序用户数突破六万大关,这一里程碑标志着美亚柏科人工智能及AI内容检测识别技术的持续进步和用户的广泛认可。
欢迎大家扫描下图二维码
上传视频、图像
一起鉴真!
智能化时代,人工智能正快速向千行百业和日常生活中应用,推动经济社会高质量发展。值得注意的是,人工智能技术若被别有用心的个人和组织利用,会成为危害社会稳定、威胁个人安全、危害国家安全的“隐形武器”。
面对深伪合成与 AI 生成图片、视频带来的内容真实性挑战,公司自主研发的检测技术已构建起全面且精准的防御体系。平台可有效识别近500种各类伪造生成手段,广泛覆盖当前主流AI换脸、AI生成等方法。经领域多家专业厂家评测,美亚柏科视频图像鉴真能力,检测的精度、召回、速度等性能行业领先,为内容安全筑牢技术防线。
自互联网上线“美亚鉴真平台”微信小程序以来,目前已在全国13个省级、超100个地市级反诈及政务平台完成对接,成为全国唯一接入各类政务平台以及覆盖最广的深度合成生成内容检测小程序,并获得央视新闻专题报道和各地反诈中心部门的好评。
公司“鉴真”系列产品以多元化的业务模式,能够满足不同场景需求,用户可依据业务特性、数据规模及安全要求,灵活选择适配版本,获取定制化的AI合成生成内容检测解决方案:
·实验室装备版适配专业科研与鉴定场景;
·手机、平板、电脑等端侧SDK支持移动设备及终端应用的实时检测集成;
·私有服务版通过本地化部署,保障数据隐私与安全;
·SaaS化服务版以云端API实现低成本、高灵活的能力输出;
·互联网微信小程序则为个人用户及中小机构提供便捷的轻量化检测服务。
未来,国投智能股份将继续携手美亚柏科深耕生成式人工智能及AI内容检测识别技术,持续打磨推出更安全可靠的技术产品,为打击AI新型涉网犯罪提供技术支撑,助力AI健康发展与规范应用。
CVE-2025-9483 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 singlePortForwardAdd ruleName/schedule/inboundFilter stack-based overflow
CVE-2025-9482 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portRangeForwardAdd ruleName/schedule/inboundFilter/TCPPorts/UDPPorts stack-based overflow
CVE-2025-9481 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 /goform/setIpv6 tunrd_Prefix stack-based overflow
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary spyware or SMS stealers. Initially, droppers served banking malware families that required elevated Accessibility permissions to harvest credentials. These small applications appeared innocuous at first glance, often masquerading as utility or government apps in high-risk […]
The post Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof appeared first on Cyber Security News.
CVE-2025-55231 | Microsoft Windows 2012 R2/2016/2019/2022/2025 Storage race condition (EUVD-2025-25494 / WID-SEC-2025-1891)
复旦大学计算与智能创新学院CodeWisdom团队斩获首届HitchOpen世界AI赛车竞速锦标赛仿真复赛冠军
Submit #634823: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow [Accepted]
Submit #634820: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow [Accepted]
Submit #634819: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow [Accepted]
Submit #634818: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) Stack-based Buffer Overflow [Duplicate]
Forgiare l’acciaio umano: come costruire team di incident response realmente efficaci
CVE-2025-53419 | Delta Electronics COMMGR up to 2.9.0 code injection (PCSA-2025-00014)
Submit #633692: COMFAST CF-XR11 V2.7.2 Command Injection [Duplicate]
苹果指控前雇员为 Oppo 窃取智能手表的商业机密
苹果指控前雇员为 Oppo 窃取智能手表的商业机密
Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection
A stealthy espionage campaign emerged in early 2025 targeting diplomats and government entities in Southeast Asia and beyond. At the heart of this operation lies STATICPLUGIN, a downloader meticulously disguised as a legitimate Adobe plugin update. Victims encountered a captive portal hijack that redirected browsers to malicious domains, where an HTTPS-secured landing page prompted users […]
The post Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection appeared first on Cyber Security News.