{"id":2,"date":"2020-07-07T04:27:29","date_gmt":"2020-07-07T04:27:29","guid":{"rendered":"http:\/?page_id=2"},"modified":"2026-01-05T01:57:32","modified_gmt":"2026-01-04T17:57:32","slug":"about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip","status":"publish","type":"page","link":"https:\/\/cybersecthreat.com\/zh\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/","title":{"rendered":"\u95dc\u65bc\u5275\u8fa6\u4eba"},"content":{"rendered":"<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id2_1f74e2-42{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id2_1f74e2-42 > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id2_1f74e2-42 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id2_1f74e2-42 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-none, 0rem );row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-4xl, 8rem);grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}.kb-row-layout-id2_1f74e2-42 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id2_1f74e2-42 > .kt-row-column-wrap{padding-top:var(--global-kb-spacing-3xl, 6.5rem);padding-right:0px;padding-left:0px;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id2_1f74e2-42 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id2_1f74e2-42 alignnone has-kb-palette-18-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-left-golden kt-tab-layout-row kt-mobile-layout-row kt-row-valign-middle kb-theme-content-width\">\n<style>.kadence-column2_94c3ab-92 > .kt-inside-inner-col,.kadence-column2_94c3ab-92 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column2_94c3ab-92 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column2_94c3ab-92 > .kt-inside-inner-col{flex-direction:column;}.kadence-column2_94c3ab-92 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column2_94c3ab-92 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column2_94c3ab-92{position:relative;}@media all and (max-width: 1024px){.kadence-column2_94c3ab-92 > .kt-inside-inner-col{display:flex;padding-top:0px;padding-bottom:var(--global-kb-spacing-lg, 3rem);flex-direction:row;flex-wrap:wrap;align-items:center;justify-content:center;}}@media all and (min-width: 768px) and (max-width: 1024px){.kadence-column2_94c3ab-92 > .kt-inside-inner-col > *, .kadence-column2_94c3ab-92 > .kt-inside-inner-col > figure.wp-block-image, .kadence-column2_94c3ab-92 > .kt-inside-inner-col > figure.wp-block-kadence-image{margin-top:0px;margin-bottom:0px;}.kadence-column2_94c3ab-92 > .kt-inside-inner-col > .kb-image-is-ratio-size{flex-grow:1;}}@media all and (max-width: 767px){.kadence-column2_94c3ab-92 > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-sm, 1.5rem);flex-direction:row;flex-wrap:wrap;justify-content:flex-start;justify-content:center;}.kadence-column2_94c3ab-92 > .kt-inside-inner-col > *, .kadence-column2_94c3ab-92 > .kt-inside-inner-col > figure.wp-block-image, .kadence-column2_94c3ab-92 > .kt-inside-inner-col > figure.wp-block-kadence-image{margin-top:0px;margin-bottom:0px;}.kadence-column2_94c3ab-92 > .kt-inside-inner-col > .kb-image-is-ratio-size{flex-grow:1;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column2_94c3ab-92 kb-section-dir-vertical kb-section-md-dir-horizontal\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading2_0e84b6-3a, .wp-block-kadence-advancedheading.kt-adv-heading2_0e84b6-3a[data-kb-block=\"kb-adv-heading2_0e84b6-3a\"]{padding-bottom:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading2_0e84b6-3a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading2_0e84b6-3a[data-kb-block=\"kb-adv-heading2_0e84b6-3a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading2_0e84b6-3a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading2_0e84b6-3a[data-kb-block=\"kb-adv-heading2_0e84b6-3a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading2_0e84b6-3a wp-block-kadence-advancedheading has-kb-palette-6-color has-text-color\" data-kb-block=\"kb-adv-heading2_0e84b6-3a\">Kelvin Yip, founder of CyberSecThreat Corporation Limited<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading2_a61fce-33, .wp-block-kadence-advancedheading.kt-adv-heading2_a61fce-33[data-kb-block=\"kb-adv-heading2_a61fce-33\"]{padding-top:0px;text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading2_a61fce-33 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading2_a61fce-33[data-kb-block=\"kb-adv-heading2_a61fce-33\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading2_a61fce-33 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading2_a61fce-33[data-kb-block=\"kb-adv-heading2_a61fce-33\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading2_a61fce-33 wp-block-kadence-advancedheading has-kb-palette-6-color has-text-color\" data-kb-block=\"kb-adv-heading2_a61fce-33\">Hello! My name is Kelvin Yip,  the founder of <a href=\"https:\/\/cybersecthreat.com\/\">CyberSecThreat<\/a> Corporation Limited. I am passionate about the cybersecurity industry and enjoy my daily life as a cybersecurity participant. For this reason, I created CyberSecThreat to contribute more to the cybersecurity industry. Everything started from a compromised Linux machine. That incident inspired me and light my way.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading2_2b7ca3-5d, .wp-block-kadence-advancedheading.kt-adv-heading2_2b7ca3-5d[data-kb-block=\"kb-adv-heading2_2b7ca3-5d\"]{text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading2_2b7ca3-5d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading2_2b7ca3-5d[data-kb-block=\"kb-adv-heading2_2b7ca3-5d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading2_2b7ca3-5d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading2_2b7ca3-5d[data-kb-block=\"kb-adv-heading2_2b7ca3-5d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading2_2b7ca3-5d wp-block-kadence-advancedheading has-kb-palette-6-color has-text-color\" data-kb-block=\"kb-adv-heading2_2b7ca3-5d\">I am a cyber security participant with 15 years in information security. By the time of writing, I achieved 40 IT certification exams, over half of them were information security or cyber security related. Those certifications include OSCP, GSCA, GXPN, GPEN, GWAPT, GCIH, GMON, GCDA, GCIA, GCFA, CISSP, CISA, CISM.<\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column2_6a1689-53 > .kt-inside-inner-col,.kadence-column2_6a1689-53 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column2_6a1689-53 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column2_6a1689-53 > .kt-inside-inner-col{flex-direction:column;}.kadence-column2_6a1689-53 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column2_6a1689-53 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column2_6a1689-53{position:relative;}@media all and (max-width: 1024px){.kadence-column2_6a1689-53 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column2_6a1689-53 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column2_6a1689-53\"><div class=\"kt-inside-inner-col\"><style>.kb-gallery-id-2_fdb675-76 .kadence-blocks-gallery-item .kb-gal-image-radius, .kb-gallery-id-2_fdb675-76 .kb-slide-item .kb-gal-image-radius img{border-radius:0px 0px 0px 0px;;}.kb-gallery-wrap-id-2_fdb675-76.wp-block-kadence-advancedgallery{overflow:visible;}.kb-gallery-wrap-id-2_fdb675-76.wp-block-kadence-advancedgallery .kt-blocks-carousel{overflow:visible;}<\/style><div class=\"kb-gallery-wrap-id-2_fdb675-76 alignnone skip-lazy kb-skip-lazy wp-block-kadence-advancedgallery\"><div class=\"kb-gallery-ul kb-gallery-non-static kb-gallery-type-slider kb-gallery-id-2_fdb675-76 kb-gallery-caption-style-bottom-hover kb-gallery-filter-none\" data-image-filter=\"none\" data-lightbox-caption=\"true\"><div class=\"kt-blocks-carousel splide kt-carousel-container-dotstyle-none kt-carousel-arrowstyle-whiteondark kt-carousel-dotstyle-none kb-slider-group-arrow kb-slider-arrow-position-center\" data-slider-anim-speed=\"400\" data-slider-scroll=\"1\" data-slider-arrows=\"true\" data-slider-fade=\"true\" data-slider-dots=\"false\" data-slider-type=\"slider\" data-slider-hover-pause=\"false\" data-slider-auto=\"1\" data-slider-speed=\"7000\" data-show-pause-button=\"false\"><div class=\"splide__track\"><ul class=\"kt-blocks-carousel-init kb-blocks-slider splide__list\"><li class=\"kb-slide-item kb-gallery-slide-item splide__slide\"><div class=\"kadence-blocks-gallery-item\"><div class=\"kadence-blocks-gallery-item-inner\"><figure class=\"kb-gallery-figure kadence-blocks-gallery-item-hide-caption\"><div class=\"kb-gal-image-radius\"><div class=\"kb-gallery-image-contain kadence-blocks-gallery-intrinsic kb-gallery-image-ratio-port23 kb-has-image-ratio-port23\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-Cyber-Security-Kelvin-Yip.jpg\" width=\"300\" height=\"450\" alt=\"CyberSecThreat Cyber Security Kelvin Yip\" data-full-image=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-Cyber-Security-Kelvin-Yip.jpg\" data-light-image=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-Cyber-Security-Kelvin-Yip.jpg\" data-id=\"19203\" class=\"wp-image-19203 skip-lazy\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-Cyber-Security-Kelvin-Yip.jpg 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-Cyber-Security-Kelvin-Yip-200x300.jpg 200w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-Cyber-Security-Kelvin-Yip-8x12.jpg 8w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/div><\/figure><\/div><\/div><\/li><li class=\"kb-slide-item kb-gallery-slide-item splide__slide\"><div class=\"kadence-blocks-gallery-item\"><div class=\"kadence-blocks-gallery-item-inner\"><figure class=\"kb-gallery-figure kadence-blocks-gallery-item-hide-caption\"><div class=\"kb-gal-image-radius\"><div class=\"kb-gallery-image-contain kadence-blocks-gallery-intrinsic kb-gallery-image-ratio-port23 kb-has-image-ratio-port23\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-CyberSecurity-Kelvin-Yip_300x450.png\" width=\"288\" height=\"449\" alt=\"CyberSecThreat CyberSecurity Kelvin Yip\" data-full-image=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-CyberSecurity-Kelvin-Yip_300x450.png\" data-light-image=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-CyberSecurity-Kelvin-Yip_300x450.png\" data-id=\"19204\" class=\"wp-image-19204 skip-lazy\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-CyberSecurity-Kelvin-Yip_300x450.png 288w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-CyberSecurity-Kelvin-Yip_300x450-192x300.png 192w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/03\/CyberSecThreat-CyberSecurity-Kelvin-Yip_300x450-8x12.png 8w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/div><\/div><\/figure><\/div><\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div>\n\n<\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-do-i-enter-cyber-security\">How do I enter Cyber Security?<\/h2>\n\n\n\n<p>I started my information technology career as a system engineer in 1997. Then, I moved to software engineer, web developer, and network engineer and finally landed in the infosec field in 2005. At that time, I work closely with different global banks and enterprises to avoid data leakage.<\/p>\n\n\n\n<p>So, the &#8220;compromised Linux machine&#8221; actually happened after a short time I worked as an information security officer. I was LPI level 2 and CCNA at that moment with some knowledge of forensics, malware analysis, ethereal(now called WireShark), and dd command to dump memory and disk images. After a lot of study and research, investigating different artifacts, and traffic analysis, I finally figured out most of the story. The initial exploit targeted a buffer overflow against a bind daemon. Then, the hacker uploaded multiple kernel exploits to the \/tmp directory, compiled them, and executed them to achieve privilege escalation. Lastly, it planted kernel mode rootkits and replaced a lot of executable files to hide their existence. It opened up my eyes!<\/p>\n\n\n\n<p>After that incident, I spent a lot of time studying how to defend and the common technique adopted by attackers. I reversed every single step the attacker did to build my defense strategy.<\/p>\n\n\n\n<p>If you also want to enter the cybersecurity industry. Let me remind you. &#8220;Common sense is the most important thing for you to work in the infosec industry, but common sense is based on your knowledge!&#8221;<\/p>\n\n\n\n<p>If you want to see my bio, please visit my <a href=\"https:\/\/www.linkedin.com\/in\/kkkelvinkk\/\">LinkedIn<\/a>.<\/p>\n\n\n\n<p>Visit my <a href=\"https:\/\/github.com\/kkkelvinkk\">GitHub<\/a>.<\/p>\n\n\n\n<p>Other contributions to the community network:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items2_015b3b-1a:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items2_015b3b-1a ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;padding-bottom:var(--global-kb-spacing-md, 2rem);}.wp-block-kadence-iconlist.kt-svg-icon-list-items2_015b3b-1a ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items2_015b3b-1a ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items2_015b3b-1a ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items2_015b3b-1a kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-2_c89b9e-94 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-2_c89b9e-94\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><a href=\"https:\/\/github.com\/tyranid\/DotNetToJScript\/pull\/14\u2028\">https:\/\/github.com\/tyranid\/DotNetToJScript\/pull\/14<\/a><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-2_c0a031-78 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-2_c0a031-78\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><a href=\"https:\/\/github.com\/rapid7\/metasploit-payloads\/issues\/354\">https:\/\/github.com\/rapid7\/metasploit-payloads\/issues\/354<\/a><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-2_5f8b1f-f6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-2_5f8b1f-f6\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><a href=\"https:\/\/bugzilla.samba.org\/show_bug.cgi?id=11076\">https:\/\/bugzilla.samba.org\/show_bug.cgi?id=11076<\/a><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-2_d5ad70-e4 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-2_d5ad70-e4\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><a href=\"https:\/\/zeoslib.sourceforge.io\/viewtopic.php?t=2652&amp;start=30\">https:\/\/zeoslib.sourceforge.io\/viewtopic.php?t=2652&amp;start=30<\/a><\/span><\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kelvin Yip, founder of CyberSecThreat Corporation Limited Hello! My name is Kelvin Yip, the founder of CyberSecThreat Corporation Limited. I am passionate about the cybersecurity industry and enjoy my daily life as a cybersecurity participant. For this reason, I created CyberSecThreat to contribute more to the cybersecurity industry. Everything started from a compromised Linux machine&#8230;.<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"disable","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"unboxed","_kad_post_vertical_padding":"hide","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>About Founder - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"Hello! My name is KELVIN YIP, the founder of CyberSecThreat Research Lab... ... Basically, I am a cyber security participant with 15 years\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About Founder\" \/>\n<meta property=\"og:description\" content=\"Kelvin Yip, founder of CyberSecThreat Corporation Limited Hello! My name is Kelvin Yip, the founder of CyberSecThreat Corporation Limited. I am passionate\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-04T17:57:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/\",\"name\":\"About Founder - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"datePublished\":\"2020-07-07T04:27:29+00:00\",\"dateModified\":\"2026-01-04T17:57:32+00:00\",\"description\":\"Hello! My name is KELVIN YIP, the founder of CyberSecThreat Research Lab... ... Basically, I am a cyber security participant with 15 years\",\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u95dc\u65bc\u5275\u8fa6\u4eba - \u5947\u8cc7\u5b89","description":"\u4f60\u597d\uff01 \u6211\u662f KELVIN YIP\uff0c\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8\u7684\u5275\u59cb\u4eba\u2026\u2026 \u6211\u662f\u4e00\u500b\u6709 15 \u5e74\u7684\u8cc7\u6b77\u7684\u8cc7\u8a0a\u5b89\u5168\u5c08\u5bb6\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/","og_locale":"zh_TW","og_type":"article","og_title":"About Founder","og_description":"Kelvin Yip, founder of CyberSecThreat Corporation Limited Hello! My name is Kelvin Yip, the founder of CyberSecThreat Corporation Limited. I am passionate","og_url":"https:\/\/cybersecthreat.com\/zh\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_modified_time":"2026-01-04T17:57:32+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@cybersecthreat","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"2 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/","url":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/","name":"\u95dc\u65bc\u5275\u8fa6\u4eba - \u5947\u8cc7\u5b89","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"datePublished":"2020-07-07T04:27:29+00:00","dateModified":"2026-01-04T17:57:32+00:00","description":"\u4f60\u597d\uff01 \u6211\u662f KELVIN YIP\uff0c\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8\u7684\u5275\u59cb\u4eba\u2026\u2026 \u6211\u662f\u4e00\u500b\u6709 15 \u5e74\u7684\u8cc7\u6b77\u7684\u8cc7\u8a0a\u5b89\u5168\u5c08\u5bb6\u3002","inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/"]}]},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"Kelvin Yip","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/kelvinyip-m\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":1,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":21628,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages\/2\/revisions\/21628"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}