China directs firms to halt use of US and Israeli cybersecurity software

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

Three people briefed on the matter revealed that Chinese authorities have directed domestic companies to cease using cybersecurity software from firms including Broadcom-owned VMware, Palo Alto Networks, and Fortinet from the US, as well as Israel's Check Point Software Technologies. A third source added Alphabet-owned Mandiant, Wiz whose acquisition Alphabet announced last year, CrowdStrike, SentinelOne, Recorded Future, McAfee, Claroty, and Rapid7 to the list. Israeli additions include CyberArk, acquired by Palo Alto last year, Orca Security, Cato Networks, and Imperva, bought by France's Thales in 2023.

Several companies stated they conduct no business in China. Recorded Future said it has none and intends none. CrowdStrike and SentinelOne noted minimal impact due to lacking offices, staff, or infrastructure there. Orca Security CEO Gil Geron said the firm was not notified and called a ban misguided, emphasizing its defense focus.

Broadcom shares dropped over 4% on January 14, Fortinet more than 2%, and Rapid7 over 1%. Palo Alto remained nearly flat, while Check Point closed slightly higher. Authorities worried the software might gather and send sensitive data abroad.

This fits broader US-China frictions, with a trade truce holding ahead of US President Donald Trump's planned April visit to Beijing. China fears Western gear could be hacked by foreign powers, prompting swaps for local tools like 360 Security Technology and Neusoft. Some targeted firms have accused Chinese hacking, including Check Point's report last month on a China-linked operation against a European government office and Palo Alto's September findings on attacks against diplomats worldwide.

関連記事

Illustration depicting FCC ban on new foreign-made routers due to security risks, featuring banned router, US flag, and production shift to America.
AIによって生成された画像

米連邦通信委員会(FCC)、安全保障上のリスクを理由に外国製ルーターの新規販売を禁止

AIによるレポート AIによって生成された画像

米連邦通信委員会(FCC)は2026年3月23日、米国以外で製造された消費者向けルーターが国家安全保障上の容認できないリスクをもたらすとして、同委員会の「対象リスト(Covered List)」に追加すると発表した。この禁止措置は新規モデルの販売に適用されるが、既存のモデルや承認済みのルーターは対象外となる。メーカーは、米国への生産移転計画を提示することで、適用除外を申請できる。

Weeks before a Trump-Xi summit, the Pentagon added major Chinese firms including Alibaba Group Holding, Baidu and BYD to a list of supposed “Chinese military companies,” only to withdraw the filing shortly after. The move highlights mixed signals from Washington and injects fresh uncertainty into the fragile US-China truce.

AIによるレポート

The EU Commission has presented a revised cybersecurity law to better fend off attacks and reduce dependencies on high-risk third countries. In particular focus: Chinese companies like Huawei and ZTE, which are to be effectively excluded from 5G rollout. This follows a recent hacker attack on the Eurail platform.

China has sanctioned 20 US defence firms and 10 executives following the US State Department's approval of a record $11.1 billion weapons package for Taiwan. Beijing's foreign ministry stated the package violates the one-China principle and interferes in China's internal affairs. The ministry pledged to take resolute measures to defend national sovereignty, security, and territorial integrity.

AIによるレポート

In a sharp reversal, the US Commerce Department and FCC have abandoned their December plan to blacklist new Chinese-made drones over national security risks, following the FCC's addition of foreign drones to its 'Covered List.' The decision supports the trade framework agreed by Presidents Trump and Xi, ahead of Trump's April visit to Beijing.

中国商務省は火曜日、軍事関連の懸念から40の日本企業・団体に対する措置を発表した。20の団体に対する輸出規制と、20の団体を監視リストに追加した。これらの措置は、日本の軍事力強化を抑制することを目的としている。

AIによるレポート

ロシア国営ハッカーが新たにパッチされたMicrosoft Officeの欠陥を迅速に武器化し、9カ国の組織を標的にした。APT28として知られるグループは、スピアフィッシングメールを使用して外交、防衛、交通機関に隠密なバックドアをインストールした。Trellixのセキュリティ研究者は、この悪名高いサイバー諜報部隊に高い確信を持って攻撃を帰属させた。

 

 

 

このウェブサイトはCookieを使用します

サイトを改善するための分析にCookieを使用します。詳細については、プライバシーポリシーをお読みください。
拒否