© 1996-2023 JPCERT/CC
KRCERT/CC
Dongwook Kim have been working for KRCERT/CC since 2013 as Computer Incident Analyst. He has a lot of experiences related to internet security incident response(Supply Chain Attacks, cryptocurrency exchange hacking and so on). Recently, He is tracking and analyzing specific hacking group targeting Korea.
KRCERT/CC
Seulgi Lee is currently a malware analyst at Korea Internet & Security Agency. He carried out research into cyber security such as cyber threat intelligence, SIEM for 7 years from 2012 in the R&D department. After moving to KrCERT/CC position, He has been analyzing threats targeting Korea and sharing insights based on the results to prevent the infringement cases and minimize the damage in Korea.
ESET
Facundo Munoz is a malware researcher, working for ESET since 2021. Facundo focuses on hunting and analyzing advanced persistent threat malware from China-aligned threat actors, and writing reports for ESET’s threat intelligence services. Facundo has presented at conferences such as BotConf and NorthSec.
Macnica, Inc.
Kenzo is the head of Macnica, Inc.'s Security Research Center. He has been researching cyber attack and countermeasures since 2013, with experience in IDS/IPS, WAF, Sandbox, EDR, and other security products. He has been interested in security since he saw cyber crimes during the time of Win95.
Macnica, Inc.
Takeya is a researcher at Macnica, Inc.'s Security Research Center. He used to be a product manager for DDoS attack and targeted attack countermeasures and security evangelist. Currently, he develops and provides original services for Attack Surface Management and cyber defense competitions. He is the organizer of the security study group "Hamasec" an organizer of Mini Hardening, and a lecturer at Security Camp 2023.
Macnica, Inc.
Yutaka is a researcher at Macnica, Inc.'s Security Research Center. He focuses on researching threats related to ransomware and vulnerabilities and spreading information on cyber security countermeasures through Attack Surface Management to reduce the number of cyber-attacks against Japanese companies as much as possible. His daily routine includes checking vulnerability information published and investigating servers by OSINT, frequently using Shodan. His X account is @nekono_nanomotoni.
Macnica, Inc.
Takeshi is a researcher at Macnica, Inc.'s Security Research Center. He is involved in a variety of activities, including providing and developing Attack Surface Management services, researching new products, and giving presentations. His primary focus for the Attack Surface Management Service is researching information that uniquely identifies the product and its version.
Internet Initiative Japan Inc.
Masafumi is a malware analyst at SOC in Internet Initiative Japan Inc. since 2018. He has experience in building and operating SOC infrastructure and EDR verification.
Internet Initiative Japan Inc.
Tomoya is a malware analyst at SOC in Internet Initiative Japan Inc. since 2017. He is a SOC expert from management of the SOC detection rule to operation of analysis system infrastructure.
TeamT5
Yi-Chin Chuang is a Threat Intelligence Researcher at TeamT5. She is interested in reverse engineering and malware analysis. Currently, her research focuses on the APT threat in the APAC region.
TeamT5
Yu-Tung Chang is a Threat Intelligence Researcher from TeamT5. He is interested in reverse engineering, vulnerability exploiting and malware analysis. He is engaged in network attacks research and rule writing. Currently, his research focuses on cyber threat intelligence in the East Asia region. He has spoken at Code Blue 2022.
ITOCHU Cyber & Intelligence Inc.
Yumi is engaged in response and analysis on security incidents arising from email at ITOCHU Cyber & Intelligence Inc. In her previous position, she provided technical support to business customers on Microsoft products in identity and security field.
N.F.Laboratories Inc.
Ryo is engaged in threat intelligence generation and malware analysis at NFLabs. He also works with NTT Communications’ NA4Sec project to track targeted attacks and their threat infrastructures. He checks VirusTotal daily to catch and share information on targeted attacks on Japan. He gave a presentation at JSAC2023.
NTT Communications Corporation
Atsushi has established NA4Sec in NTT Communications Corporation. He leads the team but also works as a researcher with his unique viewpoint as a former network engineer, investigating and analysing the threat infrastructure. He is NTT Group Certified Security Principal.
NTT Communications Corporation
Kaichi is a newbie at NTT Communications Corporation. During his time at university, he was involved in research on IoT malware, analysing vulnerabilities exploited by malware and monitoring C&C servers.
Frankie is an independent researcher specializing in computer forensics and malware analysis. He published a research paper on “Evidence of Advanced Persistent Threat: A Case Study of Malware for political espionage.” His “APT Attribution and DNS Profiling” research was presented at the 2014 US Black Hat conference. He is also a frequent speaker at cybersecurity conferences in the APAC region, such as HTCIA APAC, ISSUMMIT, HITCON, (ISC)2 Security Congress, Cyber Security Consortium, and CyberCrimeCon. He also holds some certifications from the SANS Institute.
PwC Hong Kong
Michael is a lead of cyber threat operations team with PwC Hong Kong's Dark Lab, with a strong focus in digital forensics and incident response. He takes an important role of assisting enterprises and organisations in their recovery from cyberattacks, utilizing knowledge in both cyber defense and offensive security methodologies. Michael is a proactive leader within the realm of cyber threat operations, conducting research on the tradecraft of threat actors, and combining these field experience from incidents response as well as threat intelligence into valuable insights and enhancements in offensive security, security operations, and cloud technologies within our team.
Victor is a Dragon Advance Tech Consulting cyber security analyst specializing in Endpoint Detection and DFIR. He has a strong background in the field, demonstrated by completing a research paper with Frankie Li titled 'Collecting Forensic Evidence from SaaS Applications: A Study of Microsoft 365 Forensics'. In his previous assignments, he had helped with a possible APT investigation for an APAC hospitality chain. Victor's passion lies in advanced offensive techniques and knowledge in reversing malware, which enable him to more easily identify the root causes of security incidents from sophisticated attackers. With his expertise and dedication, he consistently strives to enhance security measures and protect against potential threats.
Recruit Co.
Yuji joined Recruit Technologies Co.,Ltd in 2016. As a member of Recruit-CSIRT, he leads security incident response in Recruit. In April 2021, he launched the Cybercrime Countermeasures Group, specializing in analysis and investigation of fraudulent credit card use and spoofed logins for the purpose of cybercrime countermeasures. CISSP, GCIH, GCTI, GNFA.
Recruit Co.
Masaki’s current work includes security incident response, monitoring, and threat hunting at Recruit-CSIRT. Before that, he was engaged in vulnerability assessment and penetration test in Recruit Technologies Co.,Ltd.
BlackBerry Japan
Masaki is engaged in malware analysis and writing blog articles about technical analysis at Asia Pacific team in BlackBerry Japan Limited. His current research interests include C2 server activity and additional payload distribution by operating malware emulators. His Ph.D. dissertation, which elaborates on a method triggering characteristic behaviour of highly-stealthy malware, received the student paper prize and the best student presentation prize.
ITOCHU Cyber & Intelligence Inc.
Hayate joined ITOCHU Cyber & Intelligence Inc. in 2023. Previously, he worked for a major company's CERT, where he was involved in security product validation, policy development and incident response. Prior to that, he spent five years at a security company in Tokyo developing and operating WAFs and researching attack and defense techniques for web security. He also experienced in system development and operation in his hometown, Nagasaki.
Flatt Security Inc.
After graduating in 2020, Norihide joined Flatt Security Inc. He is currently a security engineer, mainly responsible for security diagnostics for web applications and public clouds. He has been involved in development and security since he was a student. He is also active outside the company, such as in ISOG-J WG1 and Security Camp.
Sterra Security Co.,Ltd.
Daisuke is engaged in enhancing product security and corporate IT security at Akatsuki Games Inc. He is interested in improving the quality of vulnerability assessments.
ITOCHU Cyber & Intelligence Inc.
Takahiro works as an analyst at ITOCHU Cyber & Intelligence Inc. Previously, he experienced in proposing and building security solutions, as well as researching and validating the solutions for containers and public clouds in a Sier.
Details
Details