China directs firms to halt use of US and Israeli cybersecurity software

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

Three people briefed on the matter revealed that Chinese authorities have directed domestic companies to cease using cybersecurity software from firms including Broadcom-owned VMware, Palo Alto Networks, and Fortinet from the US, as well as Israel's Check Point Software Technologies. A third source added Alphabet-owned Mandiant, Wiz whose acquisition Alphabet announced last year, CrowdStrike, SentinelOne, Recorded Future, McAfee, Claroty, and Rapid7 to the list. Israeli additions include CyberArk, acquired by Palo Alto last year, Orca Security, Cato Networks, and Imperva, bought by France's Thales in 2023.

Several companies stated they conduct no business in China. Recorded Future said it has none and intends none. CrowdStrike and SentinelOne noted minimal impact due to lacking offices, staff, or infrastructure there. Orca Security CEO Gil Geron said the firm was not notified and called a ban misguided, emphasizing its defense focus.

Broadcom shares dropped over 4% on January 14, Fortinet more than 2%, and Rapid7 over 1%. Palo Alto remained nearly flat, while Check Point closed slightly higher. Authorities worried the software might gather and send sensitive data abroad.

This fits broader US-China frictions, with a trade truce holding ahead of US President Donald Trump's planned April visit to Beijing. China fears Western gear could be hacked by foreign powers, prompting swaps for local tools like 360 Security Technology and Neusoft. Some targeted firms have accused Chinese hacking, including Check Point's report last month on a China-linked operation against a European government office and Palo Alto's September findings on attacks against diplomats worldwide.

Artikel Terkait

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

Dilaporkan oleh AI

Cisco Talos merinci bagaimana kelompok terkait China mengeksploitasi zero-day belum ditambal di perangkat keamanan email sejak akhir November 2025, menyebar pintu belakang dan alat pembersih log untuk akses persisten.

Peretas yang disponsori negara Rusia dengan cepat menjadikan kerentanan Microsoft Office yang baru di-patch sebagai senjata untuk menargetkan organisasi di sembilan negara. Kelompok yang dikenal sebagai APT28 menggunakan email spear-phishing untuk memasang pintu belakang sembunyi-sembunyi di entitas diplomatik, pertahanan, dan transportasi. Peneliti keamanan di Trellix menghubungkan serangan tersebut dengan keyakinan tinggi kepada unit mata-mata siber terkenal ini.

Dilaporkan oleh AI

Chinese cyberattacks on Taiwan's key infrastructure rose 6% in 2025 to an average of 2.63 million daily, according to the National Security Bureau. This surge forms part of 'hybrid threats' synchronized with military drills. It supports China's broader aims in technology and politics.

 

 

 

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak