© 1996-2023 JPCERT/CC
Trend Micro Inc.
Toru joined the Incident Response team after working as a sales engineer at Trend Micro. He is engaged in assisting users affected by security incidents, including ransomware, to recover from them. He also develops detection logic for EDR products based on his knowledge of attack methods gained through incident response.
Trend Micro Inc.
Yoshihiro previously worked as a web programmer before joining Trend Micro in 2007. After working in support desk, he has been engaged in threat research and malware analysis. Currently, he is mainly in charge of log analysis and forensic work for incidents in Japan.
Trend Micro Inc.
He joined Trend Micro in 2007 and worked at the support desk for both personal and corporate products. In 2012, he became an account manager for the central governments, where he monitored threats, responded to incidents, and recommended countermeasures. He then became manager of the threat research team, and since 2019, he has been supervising incident response support services. In September 2021, he became a doctoral student (Uehara Laboratory) at the Graduate School of Information Science and Engineering, Ritsumeikan University.
LINE Corporation
Simon is a developer focusing mainly on the field of network security and security infrastructure. He is currently building a system to find vulnerabilities and misconfigurations hidden in LINE’s vast infrastructure. The process is like looking for a needle in a haystack.
LINE Corporation
Manabu is involved in the development of anti-fraud, server-side SecCM and vulnerability auditing systems. He has presented at HITCON, Botconf, OBTS, and JSAC.
Trend Micro Inc.
Nick Dai is a threat researcher in Trend Micro. He is devoted to tracking and detecting APT attacks within APAC region by malware analysis and threat intelligence. He also develops tools for threat hunting and malware analysis. He has published several publications regarding targeted attacks and malwares.
Trend Micro Inc.
Sunny W Lu is a threat researcher at Trend Micro. She has been engaged in tracking and hunting APT malwares and attacks in APAC region.
Trend Micro Inc.
Vickie Su is a threat researcher in Trend Micro. She is in charge of handling targeted attack cases around the Asia-Pacific region by malware analysis, performing correlating intelligence during the investigation, figuring out threat actors' Tactics, Techniques and Procedures (TTPs).
National Yang Ming Chiao Tung University & CyCraft Technology
Shu-Ming Chang (@LJP-TW) is currently pursuing a master’s degree in cybersecurity at National Yang Ming Chiao Tung University, with an interest in binary exploitation and reverse engineering. He is a member of 10sec / TSJ CTF team and an intern at CyCraft.
NTT Security Japan
Kazuya is a SOC analyst at NTT Security Japan. His main responsibilities include alert monitoring with IPS/IDS/EDR. He has contributed articles on malware analysis and data visualization at the company and received the MWS2020 paper award. He is also a distinguished alumnus of SecHack2020.
NTT Security Japan
Sachito is a SOC analyst at NTT Security Japan and in charge of NW/EDR alert monitoring as well as malware analysis. Formally, he was an infrastructure engineer at financial industry.
N.F.Laboratories Inc.
Ryo is engaged in threat intelligence generation and malware analysis at NFLabs. He also works with NTT Communications’ NA4Sec project to track targeted attacks and their threat infrastructures.
N.F.Laboratories Inc.
Daisuke is engaged in threat intelligence generation and malware analysis at NFLabs. He is interested in the field of deception in active cyber defense, and he privately creates such environment and plays with it.
N.F.Laboratories Inc.
Hiroki is currently engaged in threat intelligence, malware analysis, and development at NFLabs, focusing on creating values for customers. While he has been recently focusing on improving his development and analysis skills, he is also planning to get involved in offensive security.
CyCraft
Shih-Min Chan is currently a senior security analyst in CyCraft, mainly focuses on incident response, APT research, malware analysis and threat intelligence analysis. He has been the speaker in various training for practitioners and presented technical presentations in technical conferences, such as Infosec in the City, CodeBlue OpenTalk and FIRST.
CyCraft
Chung-Kuan Chen is currently a senior researcher in CyCraft, and responsible for organizing the research team, and Adjunct Assistant Professor in Soochow University, Taiwan. He earned his PHD degree of Computer Science and Engineering from National Chiao-Tung University (NCTU). His research focuses on cyber attack and defense, machine learning, software vulnerability, malware and program analysis. He also dedicates to security education. As the founder of NCTU hacker research clubs, he trained students to participate in world-class security contests, and has experience of participating DEFCON CTF (2016 in HITCON Team and 2018 as coach in BFS team). Besides, he has presented technical presentations in technique conferences, such as BlackHat, HITCON, HITB, RootCon, CodeBlue, FIRST and VXCON. As an active member in Taiwan security community, he is the chairman of HITCON review committee as well as a director of Association of Hacker In Taiwan, and member of CHROOT - the top private hacker group in Taiwan.
Macnica, Inc.
Yutaka is a member of Macnica's Security Research Center, where he works to reduce the damage to Japanese companies caused by cyber attacks. He mainly researches threat trends related to ransomware and vulnerabilities, and he also focuses on spreading information about countermeasures through Attack Surface Management. He checks vulnerability information and investigate servers with OSINT, frequently using Shodan, on a daily basis. His Twitter ID is @nenoko_nanomotoni.
Cyber Defense Institute Inc.
Shota is engaged in malware analysis, incident response as well as threat research. He has presented at domestic conferences such as JSAC, HITCON, and Black Hat EUROPE Arsenal, and he also led some workshops at Security Camp and JSAC. He is learning social engineering recently.
NTT Security Japan
Rintaro is engaged in threat research and malware analysis at NTT Security Japan. He is also a researcher at Team nao_sec. He has presented at VB, SAS, HITCON, and other conferences. A cat lover.
JPCERT/CC
Manager/Threat Analyst of Early Warning Group of JPCERT/CC. After working at the Information-technology Promotion Agency (IPA), Hayato was assigned to the Office of IT Security Policy in the Ministry of Economy, Trade and Industry (METI) in 2013. He has been engaging in publishing security alerts, incident response and sharing information among public and private sectors since he joined JPCERT/CC in 2016. The toughest work he did in 2022 was contribution to “Guidance on Information Sharing and Disclosure of Breaches Caused by Cyber Attacks”.
TeamT5
Peter is a security researcher at TeamT5. Peter's research mainly focuses on incident response and malware analysis. Some of his work has been presented at international security conferences.
TeamT5
Jr-Wei Huang is a product developer at TeamT5. His research interests are in the area of system security and threat hunting.
AhnLab
He is a Senior Principal Threat Intelligence Researcher at AhnLab. He joined AhnLab as a malware analyst in 1997. He research mainly focuses on cyberattacks and threat actors in East Asia. He has been appointed as a member of the Private/Public Cooperative Investigation Group and Cyber Expert Group in South Korea. He is a reporter for the WildList Organization International. He was a member of the board of directors of AVAR (Association of Anti-Virus Asia Researches) from 2018 to 2022. He was awarded the ISC2 ISLA Asia-Pacific Information Security Practitioner Award in 2018. He is a speaker at security conferences, including AVAR, AVTOKYO, CARO Workshop, CODE BLUE, HITB GSEC Commsec, JSAC, SECUINSIDE, Virus Bulletin. When he has free time, he enjoys old anime and video games.
FFRI Security, Inc.
Tsubasa has worked on the development of malware detection logic for NGAV products at FFRI Security, Inc. He is now conducting malware analysis and development of its environment as a security engineer. He attended SecHack365 and the Security Camp 2019. He was a lecturer at the Security Camp 2021.
Trend Micro Inc.
He focuses on threat intelligence research in Asia-Pacific region. He specializes in threat hunting, incident response, malware analysis and targeted attack research. He spends most of time to work out funny name for newly found malwares. He has previously presented at JSAC 2021/2022 and HITCON 2022.
Trend Micro Inc.
She specializes in the leverage of machine learning and data science for the cybersecurity field. She applies this expertise to Threat Hunting using a variety of data to find traces of attacks that are difficult to find using existing methods.
Trend Micro Inc.
He focuses on threat intelligence research and information sharing in Japan. He specializes in incident response, forensics, and attribution research related to intrusion set targeting Japanese organizations.
Details
Details