© 1996-2024 JPCERT/CC
KRCERT/CC
Dongwook Kim have been working for KRCERT/CC since 2013 as Computer Incident Analyst. He has a lot of experiences related to internet security incident response(Supply Chain Attacks, cryptocurrency exchange hacking and so on). Recently, He is tracking and analyzing specific hacking group targeting Korea.
KRCERT/CC
Seulgi Lee is currently a malware analyst at Korea Internet & Security Agency. He carried out research into cyber security such as cyber threat intelligence, SIEM for 7 years from 2012 in the R&D department. After moving to KrCERT/CC position, He has been analyzing threats targeting Korea and sharing insights based on the results to prevent the infringement cases and minimize the damage in Korea.
ESET
Facundo Munoz is a malware researcher, working for ESET since 2021. Facundo focuses on hunting and analyzing advanced persistent threat malware from China-aligned threat actors, and writing reports for ESET’s threat intelligence services. Facundo has presented at conferences such as BotConf and NorthSec.
Macnica, Inc.
Kenzo is the head of Macnica, Inc.'s Security Research Center. He has been researching cyber attack and countermeasures since 2013, with experience in IDS/IPS, WAF, Sandbox, EDR, and other security products. He has been interested in security since he saw cyber crimes during the time of Win95.
Macnica, Inc.
Takeya is a researcher at Macnica, Inc.'s Security Research Center. He used to be a product manager for DDoS attack and targeted attack countermeasures and security evangelist. Currently, he develops and provides original services for Attack Surface Management and cyber defense competitions. He is the organizer of the security study group "Hamasec" an organizer of Mini Hardening, and a lecturer at Security Camp 2023.
Macnica, Inc.
Yutaka is a researcher at Macnica, Inc.'s Security Research Center. He focuses on researching threats related to ransomware and vulnerabilities and spreading information on cyber security countermeasures through Attack Surface Management to reduce the number of cyber-attacks against Japanese companies as much as possible. His daily routine includes checking vulnerability information published and investigating servers by OSINT, frequently using Shodan. His X account is @nekono_nanomotoni.
Macnica, Inc.
Takeshi is a researcher at Macnica, Inc.'s Security Research Center. He is involved in a variety of activities, including providing and developing Attack Surface Management services, researching new products, and giving presentations. His primary focus for the Attack Surface Management Service is researching information that uniquely identifies the product and its version.
Internet Initiative Japan Inc.
Masafumi is a malware analyst at SOC in Internet Initiative Japan Inc. since 2018. He has experience in building and operating SOC infrastructure and EDR verification.
Internet Initiative Japan Inc.
Tomoya is a malware analyst at SOC in Internet Initiative Japan Inc. since 2017. He is a SOC expert from management of the SOC detection rule to operation of analysis system infrastructure.
TeamT5
Yi-Chin Chuang is a Threat Intelligence Researcher at TeamT5. She is interested in reverse engineering and malware analysis. Currently, her research focuses on the APT threat in the APAC region.
TeamT5
Yu-Tung Chang is a Threat Intelligence Researcher from TeamT5. He is interested in reverse engineering, vulnerability exploiting and malware analysis. He is engaged in network attacks research and rule writing. Currently, his research focuses on cyber threat intelligence in the East Asia region. He has spoken at Code Blue 2022.
ITOCHU Cyber & Intelligence Inc.
Yumi is engaged in response and analysis on security incidents arising from email at ITOCHU Cyber & Intelligence Inc. In her previous position, she provided technical support to business customers on Microsoft products in identity and security field.
N.F.Laboratories Inc.
Ryo is engaged in threat intelligence generation and malware analysis at NFLabs. He also works with NTT Communications’ NA4Sec project to track targeted attacks and their threat infrastructures. He checks VirusTotal daily to catch and share information on targeted attacks on Japan. He gave a presentation at JSAC2023.
NTT Communications Corporation
Atsushi has established NA4Sec in NTT Communications Corporation. He leads the team but also works as a researcher with his unique viewpoint as a former network engineer, investigating and analysing the threat infrastructure. He is NTT Group Certified Security Principal.
NTT Communications Corporation
Kaichi is a newbie at NTT Communications Corporation. During his time at university, he was involved in research on IoT malware, analysing vulnerabilities exploited by malware and monitoring C&C servers.
Frankie is an independent researcher specializing in computer forensics and malware analysis. He published a research paper on “Evidence of Advanced Persistent Threat: A Case Study of Malware for political espionage.” His “APT Attribution and DNS Profiling” research was presented at the 2014 US Black Hat conference. He is also a frequent speaker at cybersecurity conferences in the APAC region, such as HTCIA APAC, ISSUMMIT, HITCON, (ISC)2 Security Congress, Cyber Security Consortium, and CyberCrimeCon. He also holds some certifications from the SANS Institute.
PwC Hong Kong
Michael is a lead of cyber threat operations team with PwC Hong Kong's Dark Lab, with a strong focus in digital forensics and incident response. He takes an important role of assisting enterprises and organisations in their recovery from cyberattacks, utilizing knowledge in both cyber defense and offensive security methodologies. Michael is a proactive leader within the realm of cyber threat operations, conducting research on the tradecraft of threat actors, and combining these field experience from incidents response as well as threat intelligence into valuable insights and enhancements in offensive security, security operations, and cloud technologies within our team.
Victor is a Dragon Advance Tech Consulting cyber security analyst specializing in Endpoint Detection and DFIR. He has a strong background in the field, demonstrated by completing a research paper with Frankie Li titled 'Collecting Forensic Evidence from SaaS Applications: A Study of Microsoft 365 Forensics'. In his previous assignments, he had helped with a possible APT investigation for an APAC hospitality chain. Victor's passion lies in advanced offensive techniques and knowledge in reversing malware, which enable him to more easily identify the root causes of security incidents from sophisticated attackers. With his expertise and dedication, he consistently strives to enhance security measures and protect against potential threats.
Recruit Co.
Yuji joined Recruit Technologies Co.,Ltd in 2016. As a member of Recruit-CSIRT, he leads security incident response in Recruit. In April 2021, he launched the Cybercrime Countermeasures Group, specializing in analysis and investigation of fraudulent credit card use and spoofed logins for the purpose of cybercrime countermeasures. CISSP, GCIH, GCTI, GNFA.
Recruit Co.
Masaki’s current work includes security incident response, monitoring, and threat hunting at Recruit-CSIRT. Before that, he was engaged in vulnerability assessment and penetration test in Recruit Technologies Co.,Ltd.
BlackBerry Japan
Masaki is engaged in malware analysis and writing blog articles about technical analysis at Asia Pacific team in BlackBerry Japan Limited. His current research interests include C2 server activity and additional payload distribution by operating malware emulators. His Ph.D. dissertation, which elaborates on a method triggering characteristic behaviour of highly-stealthy malware, received the student paper prize and the best student presentation prize.
ITOCHU Cyber & Intelligence Inc.
Hayate joined ITOCHU Cyber & Intelligence Inc. in 2023. Previously, he worked for a major company's CERT, where he was involved in security product validation, policy development and incident response. Prior to that, he spent five years at a security company in Tokyo developing and operating WAFs and researching attack and defense techniques for web security. He also experienced in system development and operation in his hometown, Nagasaki.
Flatt Security Inc.
After graduating in 2020, Norihide joined Flatt Security Inc. He is currently a security engineer, mainly responsible for security diagnostics for web applications and public clouds. He has been involved in development and security since he was a student. He is also active outside the company, such as in ISOG-J WG1 and Security Camp.
Sterra Security Co.,Ltd.
Daisuke is engaged in enhancing product security and corporate IT security at Akatsuki Games Inc. He is interested in improving the quality of vulnerability assessments.
ITOCHU Cyber & Intelligence Inc.
Takahiro works as an analyst at ITOCHU Cyber & Intelligence Inc. Previously, he experienced in proposing and building security solutions, as well as researching and validating the solutions for containers and public clouds in a Sier.
Trend Micro Inc.
Hiroaki focuses on threat intelligence research in Asia-Pacific region. He specializes in threat hunting, incident response, malware analysis and targeted attack research. He has previously presented at JSAC 2021/2022/2023 and HITCON 2022.
Cyber Defense Institute Inc.
Shota is engaged in malware analysis, incident response as well as threat research. He has presented at many conferences such as JSAC, HITCON, AVAR, CPRCon, Black Hat EUROPE Arsenal, and CodeBlue BlueBox, and he also led some workshops at Security Camp and JSAC.
Cyber Defense Institute Inc.
Ryonosuke is engaged in malware and threat information analysis in Cyber Defense Institute, Inc. Since his was a student, he has been fascinated by cyber security, particularly malware analysis, and polishing up his skills through his self-study, research, and internship.
NTT Security Japan
Kazuya is a SOC analyst at NTT Security Japan. He has previously presented at JSAC 2023, CODEBLUE, and HITCON 2023 CMT.
NTT Security Japan
Teruki is a SOC analyst at NTT Security Japan. He is engaged in alert monitoring with NR/EDR and developing internal systems in SOC.
NTT Security Japan
Masaya is a SOC analyst at NTT Security Japan. He was a lecturer at Security Mini Camp in Yamanashi in 2023. He is a member of the committee of the cyber security course for Society of Automotive Engineers of Japan, Inc.
CyCraft Technology
Alian Wang is currently a security analyst in CyCraft, mainly focuses on incident response, threat intelligence analysis, and cybersecurity analyst skills training. With a strong background in computer science and cybersecurity, Alian Wang has been actively involved in the field for several years. Prior to her role at CyCraft, she has worked at TWCERT/CC as an analyst to helped them identify, report and mitigate security threats.
CyCraft Technology
Chung-Kuan Chen is currently the security research director in CyCraft, and responsible for organizing the research team, and Adjunct Assistant Professor in Soochow Uiniversity, Taiwan. He earned his PHD degree of Computer Science and Engineering from National Chiao-Tung University (NCTU). His research focuses on cyber attack and defense, machine learning, software vulnerability, malware and program analysis. He tries to utilize machine learning to assist malware analysis and threat hunting, and build automatic attack and defense systems. He has published several academic journal and conference papers, and has been involved in many large research projects from digital forensic, incident response to malware analysis. He also dedicates to security education. Founder of NCTU hacker research clubs, he trained students to participate in world-class security contests, and has experience of participating DEFCON CTF (2016 in HITCON Team and 2018 as coach in BFS team). He organized the BambooFox Team to join some bug bounty projects and discover some CVEs in COTS software and several vulnerabilities in campus websites. Besides, he has presented technical presentations in technique conferences, such as BlackHat, HITCON, CHITB, RootCon, CodeBlue, JSAC, FIRST and VXCON. As an active member in Taiwan security community, he is the chairman of HITCON review committee as well as director of Association of Hacker In Taiwan, and member of CHROOT - the top private hacker group in Taiwan.
ITOCHU Cyber & Intelligence Inc.
Shuhei is engaged in alert monitoring, incident response and threat research in ITOCHU Cyber & Intelligence Inc.
NTT Communications Corporation
Masaomi is engaged in threat intelligence analysis in a project called NA4Sec in NTT Communications Corporation. He is posting information about phishing sites targeting Japan in X.
NTT Communications Corporation
Yuichi has been involved in research and analysis of threat intelligence as a member of NA4Sec since 2023. He works on the design and development of threat intelligence research and analysis systems, drawing on his previous experience.
JPCERT/CC
Hayato is a Manager of the Early Warning Group, Director of Policy, and Threat Analyst. After working at IPA, he was transferred to the Information Security Policy Office of the Ministry of Economy, Trade and Industry in 2013. Since 2016, he has been engaged in publications of alerts and other information, incident response support, and information sharing activities between the public and private sectors at JPCERT/CC. He is also a board member of The Association for Cybersecurity Law and Policy, Japan. In 2023, he strove to create the draft Guidance for Handling and Using Information on Attacks Techniques.
Trend Micro Inc.
He focuses on threat intelligence research and information sharing in Japan. He specializes in incident response, forensics, and attribution research related to intrusion set targeting Japanese organizations.
Trend Micro Inc.
She specializes in the leverage of machine learning and data science for the cybersecurity field. She applies this expertise to Threat Hunting using a variety of data to find traces of attacks that are difficult to find using existing methods.
Trend Micro Inc.
Vickie Su is a threat researcher in Trend Micro. She is in charge of handling targeted attack cases around the Asia-Pacific region by malware analysis, performing correlating intelligence during the investigation, figuring out threat actors' Tactics, Techniques and Procedures (TTPs).
Trend Micro Inc.
Nick Dai is a threat researcher in Trend Micro. He is devoted to tracking and detecting APT attacks within APAC region by malware analysis and threat intelligence. He also develops tools for threat hunting and malware analysis. He has published several publications regarding targeted attacks and malwares.
ESET
Dominik is a malware researcher at ESET. Coming from academia, he joined ESET in 2019 to help track the activities of APT groups. In particular, Dominik tracks the China-aligned group MirrorFace and the North Korea-aligned group Kimsuky. In his spare time, he plays video games and watches bad movies.
He is a speaker at HITCON, Botconf, OBTS, and JSAC as well as a Grade 3 climber.
Details
Details