{"id":8,"date":"2020-05-27T15:57:19","date_gmt":"2020-05-27T15:57:19","guid":{"rendered":"http:\/\/imported-template\/?page_id=8"},"modified":"2024-05-01T23:57:34","modified_gmt":"2024-05-01T15:57:34","slug":"about-cybersecthreat-lab","status":"publish","type":"page","link":"https:\/\/cybersecthreat.com\/zh\/about-cybersecthreat-lab\/","title":{"rendered":"\u95dc\u65bc\u6211\u5011"},"content":{"rendered":"<style>.kadence-column8_1ca8b7-9a > .kt-inside-inner-col,.kadence-column8_1ca8b7-9a > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column8_1ca8b7-9a > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_1ca8b7-9a > .kt-inside-inner-col{flex-direction:column;}.kadence-column8_1ca8b7-9a > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column8_1ca8b7-9a > .kt-inside-inner-col{background-color:#313131;}.kadence-column8_1ca8b7-9a > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_1ca8b7-9a{position:relative;}@media all and (max-width: 1024px){.kadence-column8_1ca8b7-9a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column8_1ca8b7-9a > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_1ca8b7-9a alignfull\"><div class=\"kt-inside-inner-col\"><style>.kt-img-overlay8_a25eeb-e5{max-width:0px;width:100%;}.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-img-overlay8_a25eeb-e5{margin-left:unset;margin-right:unset;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-wrap .kt-block-intrisic{padding-bottom:52.3333%;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-color-wrapper{opacity:0.3;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-wrap:has(:focus-visible) .kt-image-overlay-color-wrapper{opacity:1 !important;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-wrap:hover .kt-image-overlay-color-wrapper{opacity:1 !important;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-color{background-color:#191919;opacity:0.6;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message{border-top:0px solid rgba(255,255,255,0.8);border-right:0px solid rgba(255,255,255,0.8);border-bottom:0px solid rgba(255,255,255,0.8);border-left:0px solid rgba(255,255,255,0.8);inset:10px;}.wp-block-kadence-imageoverlay.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message .image-overlay-title{color:#fff;background:rgba(0, 0, 0, 0);padding-top:5px;padding-right:5px;padding-bottom:5px;padding-left:5px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-size:var(--global-kb-font-size-xxl, 4rem);font-weight:regular;font-style:normal;}.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-divider{border-top-color:#fff;border-top-width:1px;width:80%;border-top-style:double;}.wp-block-kadence-imageoverlay.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message .image-overlay-subtitle{color:#fff;background:rgba(0, 0, 0, 0);padding-top:5px;padding-right:5px;padding-bottom:5px;padding-left:5px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;font-weight:regular;font-style:normal;}@media all and (max-width: 1024px){.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message{border-top:0px solid rgba(255,255,255,0.8);border-right:0px solid rgba(255,255,255,0.8);border-bottom:0px solid rgba(255,255,255,0.8);border-left:0px solid rgba(255,255,255,0.8);}}@media all and (max-width: 1024px){.wp-block-kadence-imageoverlay.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message .image-overlay-title{font-size:var(--global-kb-font-size-xl, 3rem);}}@media all and (max-width: 767px){.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message{border-top:0px solid rgba(255,255,255,0.8);border-right:0px solid rgba(255,255,255,0.8);border-bottom:0px solid rgba(255,255,255,0.8);border-left:0px solid rgba(255,255,255,0.8);}.wp-block-kadence-imageoverlay.kt-img-overlay8_a25eeb-e5 .kt-image-overlay-message .image-overlay-title{font-size:var(--global-kb-font-size-lg, 2rem);}}<\/style>\n<div class=\"kt-img-overlay8_a25eeb-e5 alignfull wp-block-kadence-imageoverlay\"><div class=\"kt-image-overlay-wrap kt-over-image-slide\"><div class=\"kt-block-intrisic\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png\" alt=\"CyberSecThreat WebSite Header Banner\" width=\"1200\" height=\"628\" class=\"kt-img-overlay wp-image-13880\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png 1200w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628-300x157.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628-1024x536.png 1024w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628-768x402.png 768w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628-18x9.png 18w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628-600x314.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><div class=\"kt-image-overlay-color-wrapper\"><div class=\"kt-image-overlay-color\"><\/div><\/div><span class=\"kt-imageoverlay-link\"><div class=\"kt-image-overlay-message kt-over-substyle-hidden_below kt-over-valign-center kt-over-halign-center\"><div class=\"kt-image-overlay-inner\"><h1 class=\"image-overlay-title\">ABOUT CYBERSECTHREAT<\/h1><div class=\"kt-image-overlay-divider\"><\/div><h2 class=\"image-overlay-subtitle\">A safe digital life<\/h2><\/div><\/div><\/span><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<style>.kb-row-layout-id8_e83548-2b > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id8_e83548-2b > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id8_e83548-2b > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, calc(55% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(45% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id8_e83548-2b > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id8_e83548-2b > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id8_e83548-2b > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id8_e83548-2b alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column8_40d161-5c > .kt-inside-inner-col,.kadence-column8_40d161-5c > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column8_40d161-5c > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_40d161-5c > .kt-inside-inner-col{flex-direction:column;}.kadence-column8_40d161-5c > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column8_40d161-5c > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_40d161-5c{position:relative;}@media all and (max-width: 1024px){.kadence-column8_40d161-5c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column8_40d161-5c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_40d161-5c\"><div class=\"kt-inside-inner-col\"><style>.kadence-column8_2d4496-eb > .kt-inside-inner-col,.kadence-column8_2d4496-eb > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column8_2d4496-eb > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_2d4496-eb > .kt-inside-inner-col{flex-direction:column;}.kadence-column8_2d4496-eb > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column8_2d4496-eb > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_2d4496-eb{position:relative;}.kadence-column8_2d4496-eb, .kt-inside-inner-col > .kadence-column8_2d4496-eb:not(.specificity){margin-right:0px;margin-left:var(--global-kb-spacing-3xl, 6.5rem);}@media all and (max-width: 1024px){.kadence-column8_2d4496-eb > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column8_2d4496-eb > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column8_2d4496-eb, .kt-inside-inner-col > .kadence-column8_2d4496-eb:not(.specificity){margin-left:var(--global-kb-spacing-xs, 1rem);}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_2d4496-eb\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading8_ea4f85-13, .wp-block-kadence-advancedheading.kt-adv-heading8_ea4f85-13[data-kb-block=\"kb-adv-heading8_ea4f85-13\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_ea4f85-13 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_ea4f85-13[data-kb-block=\"kb-adv-heading8_ea4f85-13\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_ea4f85-13 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_ea4f85-13[data-kb-block=\"kb-adv-heading8_ea4f85-13\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading8_ea4f85-13 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_ea4f85-13\">The rise of CyberSecThreat<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_0d5321-6b, .wp-block-kadence-advancedheading.kt-adv-heading8_0d5321-6b[data-kb-block=\"kb-adv-heading8_0d5321-6b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_0d5321-6b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_0d5321-6b[data-kb-block=\"kb-adv-heading8_0d5321-6b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_0d5321-6b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_0d5321-6b[data-kb-block=\"kb-adv-heading8_0d5321-6b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_0d5321-6b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_0d5321-6b\">CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including <a href=\"https:\/\/cybersecthreat.com\/product\/recorded-future\/\">Cyber Threat Intelligence (CTI)<\/a>, Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. <a href=\"https:\/\/cybersecthreat.com\/2022\/05\/01\/cybersecthreat-named-as-top-10-cyber-security-companies-2022\/\">CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition.<\/a><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_ee8ced-1f, .wp-block-kadence-advancedheading.kt-adv-heading8_ee8ced-1f[data-kb-block=\"kb-adv-heading8_ee8ced-1f\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_ee8ced-1f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_ee8ced-1f[data-kb-block=\"kb-adv-heading8_ee8ced-1f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_ee8ced-1f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_ee8ced-1f[data-kb-block=\"kb-adv-heading8_ee8ced-1f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_ee8ced-1f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_ee8ced-1f\">We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class&nbsp;<a href=\"https:\/\/cybersecthreat.com\/services\/\">services<\/a>&nbsp;to our global clients including&nbsp;<a href=\"https:\/\/cybersecthreat.com\/vciso\/\">vCISO<\/a>, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_5256b7-2d, .wp-block-kadence-advancedheading.kt-adv-heading8_5256b7-2d[data-kb-block=\"kb-adv-heading8_5256b7-2d\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_5256b7-2d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_5256b7-2d[data-kb-block=\"kb-adv-heading8_5256b7-2d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_5256b7-2d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_5256b7-2d[data-kb-block=\"kb-adv-heading8_5256b7-2d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_5256b7-2d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_5256b7-2d\">CyberSecThreat Research Lab, which is led by our founder <a href=\"https:\/\/cybersecthreat.com\/zh\/about-founder-cybersecthreat-cyber-security-research-lab-kelvin-yip\/\">Kelvin Yip<\/a>, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission!<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_70bd13-7b, .wp-block-kadence-advancedheading.kt-adv-heading8_70bd13-7b[data-kb-block=\"kb-adv-heading8_70bd13-7b\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_70bd13-7b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_70bd13-7b[data-kb-block=\"kb-adv-heading8_70bd13-7b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_70bd13-7b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_70bd13-7b[data-kb-block=\"kb-adv-heading8_70bd13-7b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_70bd13-7b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_70bd13-7b\">Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_ee5e06-83, .wp-block-kadence-advancedheading.kt-adv-heading8_ee5e06-83[data-kb-block=\"kb-adv-heading8_ee5e06-83\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_ee5e06-83 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_ee5e06-83[data-kb-block=\"kb-adv-heading8_ee5e06-83\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_ee5e06-83 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_ee5e06-83[data-kb-block=\"kb-adv-heading8_ee5e06-83\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading8_ee5e06-83 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_ee5e06-83\">Learn More<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_e49b9d-e7, .wp-block-kadence-advancedheading.kt-adv-heading8_e49b9d-e7[data-kb-block=\"kb-adv-heading8_e49b9d-e7\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_e49b9d-e7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_e49b9d-e7[data-kb-block=\"kb-adv-heading8_e49b9d-e7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_e49b9d-e7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_e49b9d-e7[data-kb-block=\"kb-adv-heading8_e49b9d-e7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_e49b9d-e7 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_e49b9d-e7\">Feel free to visit the following resources for more information:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items8_36f3c8-59:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items8_36f3c8-59 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items8_36f3c8-59 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items8_36f3c8-59 .kb-svg-icon-wrap{font-size:20px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items8_36f3c8-59 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items8_36f3c8-59 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items8_36f3c8-59 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-8_06a869-8f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-8_06a869-8f\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><a href=\"https:\/\/cybersecthreat.com\/blogs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Research paper<\/a><\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-8_cdc389-a8 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-8_cdc389-a8\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><a href=\"https:\/\/cybersecthreat.com\/category\/vulnerability-research\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability Research<\/a><\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-8_e08897-7a .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-8_e08897-7a\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><a href=\"https:\/\/cybersecthreat.com\/product-category\/products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Products<\/a><\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-8_c89eef-98 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-8_c89eef-98\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><a href=\"https:\/\/cybersecthreat.com\/services\/\" target=\"_blank\" rel=\"noreferrer noopener\">Services Offering<\/a><\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-8_55324f-5d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-8_55324f-5d\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><a href=\"https:\/\/splunkbase.splunk.com\/apps?author=cybersecthreat\" target=\"_blank\" rel=\"noreferrer noopener\">Free Splunk Apps<\/a><\/strong><\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-8_92647f-17 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-8_92647f-17\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><a href=\"https:\/\/github.com\/cybersecthreat\" target=\"_blank\" rel=\"noreferrer noopener\">Free Tools on GitHub<\/a><\/strong><\/span><\/li>\n<\/ul><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column8_e87d86-88 > .kt-inside-inner-col{display:flex;}.kadence-column8_e87d86-88 > .kt-inside-inner-col,.kadence-column8_e87d86-88 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column8_e87d86-88 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_e87d86-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;align-items:flex-start;}.kadence-column8_e87d86-88 > .kt-inside-inner-col > .kb-image-is-ratio-size{align-self:stretch;}.kadence-column8_e87d86-88 > .kt-inside-inner-col > .wp-block-kadence-advancedgallery{align-self:stretch;}.kadence-column8_e87d86-88 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column8_e87d86-88{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_e87d86-88{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_e87d86-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column8_e87d86-88 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_e87d86-88{position:relative;}.kadence-column8_e87d86-88, .kt-inside-inner-col > .kadence-column8_e87d86-88:not(.specificity){margin-right:var(--global-kb-spacing-3xl, 6.5rem);}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column8_e87d86-88{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_e87d86-88{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_e87d86-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column8_e87d86-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;align-items:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column8_e87d86-88{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_e87d86-88{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_e87d86-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column8_e87d86-88 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;align-items:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_e87d86-88 kvs-sm-false\"><div class=\"kt-inside-inner-col\"><style>.kb-image8_2f09dc-27 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image8_2f09dc-27\"><figure class=\"aligncenter size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_512x512-min-300x300.png\" alt=\"CyberSecThreat website site logo\" class=\"kb-img wp-image-12534\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_512x512-min-300x300.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_512x512-min-150x150.png 150w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_512x512-min-12x12.png 12w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_512x512-min-100x100.png 100w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_512x512-min.png 512w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<style>.kb-row-layout-id8_784cac-8a > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id8_784cac-8a > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id8_784cac-8a > .kt-row-column-wrap{column-gap:var(--global-kb-gap-none, 0rem );row-gap:var(--global-kb-gap-none, 0rem );max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id8_784cac-8a > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id8_784cac-8a > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id8_784cac-8a > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id8_784cac-8a alignfull has-theme-palette3-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column8_5a1531-6e > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column8_5a1531-6e > .kt-inside-inner-col,.kadence-column8_5a1531-6e > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column8_5a1531-6e > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_5a1531-6e > .kt-inside-inner-col{flex-direction:column;}.kadence-column8_5a1531-6e > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column8_5a1531-6e > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_5a1531-6e{text-align:center;}.kadence-column8_5a1531-6e{position:relative;}.kadence-column8_5a1531-6e, .kt-inside-inner-col > .kadence-column8_5a1531-6e:not(.specificity){margin-right:var(--global-kb-spacing-5xl, 10rem);margin-left:var(--global-kb-spacing-5xl, 10rem);}@media all and (max-width: 1024px){.kadence-column8_5a1531-6e > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 1024px){.kadence-column8_5a1531-6e, .kt-inside-inner-col > .kadence-column8_5a1531-6e:not(.specificity){margin-right:var(--global-kb-spacing-3xl, 6.5rem);margin-left:var(--global-kb-spacing-3xl, 6.5rem);}}@media all and (max-width: 767px){.kadence-column8_5a1531-6e > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column8_5a1531-6e, .kt-inside-inner-col > .kadence-column8_5a1531-6e:not(.specificity){margin-right:0px;margin-left:0px;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_5a1531-6e\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading8_74899a-ca, .wp-block-kadence-advancedheading.kt-adv-heading8_74899a-ca[data-kb-block=\"kb-adv-heading8_74899a-ca\"]{margin-bottom:var(--global-kb-spacing-xs, 1rem);text-align:center;font-style:normal;text-transform:uppercase;color:#fffefe;}.wp-block-kadence-advancedheading.kt-adv-heading8_74899a-ca mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_74899a-ca[data-kb-block=\"kb-adv-heading8_74899a-ca\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_74899a-ca img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_74899a-ca[data-kb-block=\"kb-adv-heading8_74899a-ca\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<div class=\"kt-adv-heading8_74899a-ca wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_74899a-ca\">ABOUT CYBERSECTHREAT<\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_3c1229-1b, .wp-block-kadence-advancedheading.kt-adv-heading8_3c1229-1b[data-kb-block=\"kb-adv-heading8_3c1229-1b\"]{margin-top:0px;margin-bottom:var(--global-kb-spacing-xl, 4rem);text-align:center;font-size:var(--global-kb-font-size-lg, 2rem);line-height:1.2;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading8_3c1229-1b mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_3c1229-1b[data-kb-block=\"kb-adv-heading8_3c1229-1b\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_3c1229-1b img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_3c1229-1b[data-kb-block=\"kb-adv-heading8_3c1229-1b\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading8_3c1229-1b wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_3c1229-1b\">What CyberSecThreat Research Lab focus on?<\/h2>\n<\/div><\/div>\n\n\n<style>.kadence-column8_925fa2-c1 > .kt-inside-inner-col,.kadence-column8_925fa2-c1 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column8_925fa2-c1 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_925fa2-c1 > .kt-inside-inner-col{flex-direction:column;}.kadence-column8_925fa2-c1 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column8_925fa2-c1 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_925fa2-c1{position:relative;}@media all and (max-width: 1024px){.kadence-column8_925fa2-c1 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column8_925fa2-c1 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_925fa2-c1\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-sm, 1rem);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap{grid-template-columns:repeat(3, minmax(0, 1fr));}.kb-row-layout-id8_801d3f-9c > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 1024px){.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id8_801d3f-9c > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}.kb-row-layout-id8_801d3f-9c .wp-block-kadence-column .kt-inside-inner-col { \r  display: flex;\r  flex-direction: column;\r  flex: 1; \r}\r  \r.kb-row-layout-id8_801d3f-9c .wp-block-kadence-column .kt-inside-inner-col .wp-block-kadence-advancedbtn {\r  margin-top: auto;\r}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id8_801d3f-9c alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-3-columns kt-row-layout-equal kt-tab-layout-row kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full\">\n<style>.kadence-column8_dba246-23 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-md, 2rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kadence-column8_dba246-23 > .kt-inside-inner-col{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);}.kadence-column8_dba246-23 > .kt-inside-inner-col,.kadence-column8_dba246-23 > .kt-inside-inner-col:before{border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-right-radius:8px;border-bottom-left-radius:8px;}.kadence-column8_dba246-23 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_dba246-23 > .kt-inside-inner-col{flex-direction:column;}.kadence-column8_dba246-23 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column8_dba246-23 > .kt-inside-inner-col{background-color:var(--global-palette4, #2D3748);}.kadence-column8_dba246-23 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_dba246-23{position:relative;}@media all and (max-width: 1024px){.kadence-column8_dba246-23 > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-xl, 4rem);padding-left:var(--global-kb-spacing-xl, 4rem);border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column8_dba246-23 > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_dba246-23\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-image.kb-image8_f4d8dc-54:not(.kb-specificity-added):not(.kb-extra-specificity-added){margin-bottom:0px;}.kb-image8_f4d8dc-54.kb-image-is-ratio-size, .kb-image8_f4d8dc-54 .kb-image-is-ratio-size{max-width:150px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image8_f4d8dc-54.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image8_f4d8dc-54 .kb-image-is-ratio-size{align-self:unset;}.kb-image8_f4d8dc-54 figure{max-width:150px;}.kb-image8_f4d8dc-54 .image-is-svg, .kb-image8_f4d8dc-54 .image-is-svg img{width:100%;}.kb-image8_f4d8dc-54:not(.kb-image-is-ratio-size) .kb-img, .kb-image8_f4d8dc-54.kb-image-is-ratio-size{padding-bottom:0px;}.kb-image8_f4d8dc-54 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image8_f4d8dc-54\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-blue_team.png\" alt=\"CyberSecThreat Blue Team\" class=\"kb-img wp-image-480\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-blue_team.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-blue_team-150x150.png 150w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-blue_team-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_85d050-18, .wp-block-kadence-advancedheading.kt-adv-heading8_85d050-18[data-kb-block=\"kb-adv-heading8_85d050-18\"]{margin-top:var(--global-kb-spacing-xs, 1rem);margin-bottom:var(--global-kb-spacing-xs, 1rem);text-align:center;font-size:var(--global-kb-font-size-lg, 2rem);font-style:normal;font-family:Arial, Helvetica, sans-serif;}.wp-block-kadence-advancedheading.kt-adv-heading8_85d050-18 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_85d050-18[data-kb-block=\"kb-adv-heading8_85d050-18\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_85d050-18 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_85d050-18[data-kb-block=\"kb-adv-heading8_85d050-18\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading8_85d050-18 wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_85d050-18\">Blue Team<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_131353-9f, .wp-block-kadence-advancedheading.kt-adv-heading8_131353-9f[data-kb-block=\"kb-adv-heading8_131353-9f\"]{text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_131353-9f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_131353-9f[data-kb-block=\"kb-adv-heading8_131353-9f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_131353-9f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_131353-9f[data-kb-block=\"kb-adv-heading8_131353-9f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_131353-9f wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_131353-9f\">CyberSecThreat assists companies in protecting themselves from cyber attackers by enhancing their incident response capabilities, strengthening detection methods, and adequately preparing for various security incidents. While prevention is crucial, detection is essential! That\u2019s why we also work on creating tools, sharing technical expertise, and organizing demonstrations to enhance the efficiency of Security Operations Centers (SOC). Our objective is to address challenges like dealing with an increased number of false positives in Indicators of Compromise (IoC).<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns8_250ba0-96{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-end;align-items:flex-end;}.kt-btns8_250ba0-96 .kt-button{font-weight:normal;font-style:normal;}.kt-btns8_250ba0-96 .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns8_250ba0-96 .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns8_250ba0-96 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns8_250ba0-96 .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns8_250ba0-96 .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns8_250ba0-96 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns8_250ba0-96 .kt-btn-wrap-0 .kt-button:focus{background:#444444;}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn.kb-btns8_250ba0-96{justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns8_250ba0-96\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn8_ac3ec8-75.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn8_ac3ec8-75.kb-button{color:#7ad7ff;background:rgba(255,255,255,0);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-btn8_ac3ec8-75.kb-button .kb-svg-icon-wrap{color:var(--global-palette1, #3182CE);}.kb-btn8_ac3ec8-75.kb-button:hover .kb-svg-icon-wrap, .kb-btn8_ac3ec8-75.kb-button:focus .kb-svg-icon-wrap{color:var(--global-palette2, #2B6CB0);}.wp-block-kadence-advancedbtn .kb-btn8_ac3ec8-75.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn8_ac3ec8-75.kb-button:focus{color:var(--global-palette2, #2B6CB0);background:rgba(255,255,255,0);}<\/style><span class=\"kb-button kt-button button kb-btn8_ac3ec8-75 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\"><span class=\"kt-btn-inner-text\">Learn more<\/span><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-btn-icon-side-right\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><\/span><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column8_829bd7-ba > .kt-inside-inner-col{display:flex;}.kadence-column8_829bd7-ba > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-md, 2rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kadence-column8_829bd7-ba > .kt-inside-inner-col{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);}.kadence-column8_829bd7-ba > .kt-inside-inner-col,.kadence-column8_829bd7-ba > .kt-inside-inner-col:before{border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-right-radius:8px;border-bottom-left-radius:8px;}.kadence-column8_829bd7-ba > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_829bd7-ba > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column8_829bd7-ba > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column8_829bd7-ba{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_829bd7-ba{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_829bd7-ba > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column8_829bd7-ba > .kt-inside-inner-col{background-color:var(--global-palette4, #2D3748);}.kadence-column8_829bd7-ba > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_829bd7-ba{position:relative;}@media all and (max-width: 1024px){.kadence-column8_829bd7-ba > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-xl, 4rem);padding-left:var(--global-kb-spacing-xl, 4rem);border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column8_829bd7-ba{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_829bd7-ba{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_829bd7-ba > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kadence-column8_829bd7-ba > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);flex-direction:column;justify-content:flex-start;}.kt-row-column-wrap > .kadence-column8_829bd7-ba{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_829bd7-ba{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_829bd7-ba > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_829bd7-ba\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-image.kb-image8_28e7db-f6:not(.kb-specificity-added):not(.kb-extra-specificity-added){margin-bottom:0px;}.kb-image8_28e7db-f6.kb-image-is-ratio-size, .kb-image8_28e7db-f6 .kb-image-is-ratio-size{max-width:150px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image8_28e7db-f6.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image8_28e7db-f6 .kb-image-is-ratio-size{align-self:unset;}.kb-image8_28e7db-f6 figure{max-width:150px;}.kb-image8_28e7db-f6 .image-is-svg, .kb-image8_28e7db-f6 .image-is-svg img{width:100%;}.kb-image8_28e7db-f6:not(.kb-image-is-ratio-size) .kb-img, .kb-image8_28e7db-f6.kb-image-is-ratio-size{padding-bottom:0px;}.kb-image8_28e7db-f6 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image8_28e7db-f6\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-red_team.png\" alt=\"CyberSecThreat Red Team\" class=\"kb-img wp-image-481\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-red_team.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-red_team-150x150.png 150w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-red_team-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_92212d-25, .wp-block-kadence-advancedheading.kt-adv-heading8_92212d-25[data-kb-block=\"kb-adv-heading8_92212d-25\"]{margin-top:var(--global-kb-spacing-xs, 1rem);margin-bottom:var(--global-kb-spacing-xs, 1rem);text-align:center;font-size:var(--global-kb-font-size-lg, 2rem);font-style:normal;font-family:Arial, Helvetica, sans-serif;}.wp-block-kadence-advancedheading.kt-adv-heading8_92212d-25 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_92212d-25[data-kb-block=\"kb-adv-heading8_92212d-25\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_92212d-25 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_92212d-25[data-kb-block=\"kb-adv-heading8_92212d-25\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading8_92212d-25 wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_92212d-25\">Red Team<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_41d9d8-2e, .wp-block-kadence-advancedheading.kt-adv-heading8_41d9d8-2e[data-kb-block=\"kb-adv-heading8_41d9d8-2e\"]{text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_41d9d8-2e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_41d9d8-2e[data-kb-block=\"kb-adv-heading8_41d9d8-2e\"] mark.kt-highlight{font-style:normal;color:#854b25;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_41d9d8-2e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_41d9d8-2e[data-kb-block=\"kb-adv-heading8_41d9d8-2e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_41d9d8-2e wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_41d9d8-2e\">CyberSecThreat specializes in security assessments, penetration testing, and red team simulations for companies. We replicate actual cyber threats using the same tools and tactics that malicious actors employ. The red team phase serves as a crucial initial step; the primary objective is to enhance the Blue Team\u2019s response and detection capabilities. Our ultimate aim is to assist organizations in developing metrics to gauge the effectiveness of their cybersecurity investments.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns8_a95acf-1d{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-end;align-items:flex-end;}.kt-btns8_a95acf-1d .kt-button{font-weight:normal;font-style:normal;}.kt-btns8_a95acf-1d .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns8_a95acf-1d .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns8_a95acf-1d .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns8_a95acf-1d .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns8_a95acf-1d .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns8_a95acf-1d .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns8_a95acf-1d .kt-btn-wrap-0 .kt-button:focus{background:#444444;}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn.kb-btns8_a95acf-1d{justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns8_a95acf-1d\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn8_e3cda3-71.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn8_e3cda3-71.kb-button{color:#7ad7ff;background:rgba(255,255,255,0);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-btn8_e3cda3-71.kb-button .kb-svg-icon-wrap{color:var(--global-palette1, #3182CE);}.kb-btn8_e3cda3-71.kb-button:hover .kb-svg-icon-wrap, .kb-btn8_e3cda3-71.kb-button:focus .kb-svg-icon-wrap{color:var(--global-palette2, #2B6CB0);}.wp-block-kadence-advancedbtn .kb-btn8_e3cda3-71.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn8_e3cda3-71.kb-button:focus{color:var(--global-palette2, #2B6CB0);background:rgba(255,255,255,0);}<\/style><span class=\"kb-button kt-button button kb-btn8_e3cda3-71 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\"><span class=\"kt-btn-inner-text\">Learn more<\/span><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-btn-icon-side-right\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><\/span><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column8_b00dcb-72 > .kt-inside-inner-col{display:flex;}.kadence-column8_b00dcb-72 > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-md, 2rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kadence-column8_b00dcb-72 > .kt-inside-inner-col{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);}.kadence-column8_b00dcb-72 > .kt-inside-inner-col,.kadence-column8_b00dcb-72 > .kt-inside-inner-col:before{border-top-left-radius:8px;border-top-right-radius:8px;border-bottom-right-radius:8px;border-bottom-left-radius:8px;}.kadence-column8_b00dcb-72 > .kt-inside-inner-col{row-gap:var(--global-kb-gap-none, 0rem );column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column8_b00dcb-72 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column8_b00dcb-72 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column8_b00dcb-72{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_b00dcb-72{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_b00dcb-72 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column8_b00dcb-72 > .kt-inside-inner-col{background-color:var(--global-palette4, #2D3748);}.kadence-column8_b00dcb-72 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column8_b00dcb-72{position:relative;}@media all and (max-width: 1024px){.kadence-column8_b00dcb-72 > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-xl, 4rem);padding-left:var(--global-kb-spacing-xl, 4rem);border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column8_b00dcb-72{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_b00dcb-72{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_b00dcb-72 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kadence-column8_b00dcb-72 > .kt-inside-inner-col{padding-right:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);flex-direction:column;justify-content:flex-start;}.kt-row-column-wrap > .kadence-column8_b00dcb-72{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_b00dcb-72{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column8_b00dcb-72 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column8_b00dcb-72\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-image.kb-image8_b7f9ab-e8:not(.kb-specificity-added):not(.kb-extra-specificity-added){margin-bottom:0px;}.kb-image8_b7f9ab-e8.kb-image-is-ratio-size, .kb-image8_b7f9ab-e8 .kb-image-is-ratio-size{max-width:150px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image8_b7f9ab-e8.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image8_b7f9ab-e8 .kb-image-is-ratio-size{align-self:unset;}.kb-image8_b7f9ab-e8 figure{max-width:150px;}.kb-image8_b7f9ab-e8 .image-is-svg, .kb-image8_b7f9ab-e8 .image-is-svg img{width:100%;}.kb-image8_b7f9ab-e8:not(.kb-image-is-ratio-size) .kb-img, .kb-image8_b7f9ab-e8.kb-image-is-ratio-size{padding-bottom:0px;}.kb-image8_b7f9ab-e8 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image8_b7f9ab-e8\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-purple_team.png\" alt=\"CyberSecThreat Purple Team\" class=\"kb-img wp-image-482\" srcset=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-purple_team.png 300w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-purple_team-150x150.png 150w, https:\/\/cybersecthreat.com\/wp-content\/uploads\/2020\/07\/k-sec-purple_team-100x100.png 100w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_644c12-25, .wp-block-kadence-advancedheading.kt-adv-heading8_644c12-25[data-kb-block=\"kb-adv-heading8_644c12-25\"]{margin-top:var(--global-kb-spacing-xs, 1rem);margin-bottom:var(--global-kb-spacing-xs, 1rem);text-align:center;font-size:var(--global-kb-font-size-lg, 2rem);font-style:normal;font-family:Arial, Helvetica, sans-serif;}.wp-block-kadence-advancedheading.kt-adv-heading8_644c12-25 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_644c12-25[data-kb-block=\"kb-adv-heading8_644c12-25\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_644c12-25 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_644c12-25[data-kb-block=\"kb-adv-heading8_644c12-25\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading8_644c12-25 wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_644c12-25\">Purple Team<\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_85a7c9-3c, .wp-block-kadence-advancedheading.kt-adv-heading8_85a7c9-3c[data-kb-block=\"kb-adv-heading8_85a7c9-3c\"]{text-align:left;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_85a7c9-3c mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_85a7c9-3c[data-kb-block=\"kb-adv-heading8_85a7c9-3c\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_85a7c9-3c img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_85a7c9-3c[data-kb-block=\"kb-adv-heading8_85a7c9-3c\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_85a7c9-3c wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading8_85a7c9-3c\">The most effective strategy for enhancing the defense team is to ensure they have a deep understanding of their adversaries, instead of solely relying on rigid procedures based on MITRE ATT&amp;CK and Threat Intelligence data during triage or investigations. Recognizing that knowledge from the offensive side allows the blue team to anticipate potential moves by attackers and scrutinize relevant artifacts. That\u2019s why CyberSecThreat is dedicated to creating automation and collaboration tools.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns8_55240d-83{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-end;align-items:flex-end;}.kt-btns8_55240d-83 .kt-button{font-weight:normal;font-style:normal;}.kt-btns8_55240d-83 .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns8_55240d-83 .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#555555;}.wp-block-kadence-advancedbtn.kt-btns8_55240d-83 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns8_55240d-83 .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns8_55240d-83 .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns8_55240d-83 .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns8_55240d-83 .kt-btn-wrap-0 .kt-button:focus{background:#444444;}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn.kb-btns8_55240d-83{justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns8_55240d-83\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn8_58e984-f9.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn8_58e984-f9.kb-button{color:#7ad7ff;background:rgba(255,255,255,0);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-btn8_58e984-f9.kb-button .kb-svg-icon-wrap{color:var(--global-palette1, #3182CE);}.kb-btn8_58e984-f9.kb-button:hover .kb-svg-icon-wrap, .kb-btn8_58e984-f9.kb-button:focus .kb-svg-icon-wrap{color:var(--global-palette2, #2B6CB0);}.wp-block-kadence-advancedbtn .kb-btn8_58e984-f9.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn8_58e984-f9.kb-button:focus{color:var(--global-palette2, #2B6CB0);background:rgba(255,255,255,0);}<\/style><span class=\"kb-button kt-button button kb-btn8_58e984-f9 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\"><span class=\"kt-btn-inner-text\">Learn more<\/span><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRight kt-btn-icon-side-right\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"5\" y1=\"12\" x2=\"19\" y2=\"12\"\/><polyline points=\"12 5 19 12 12 19\"\/><\/svg><\/span><\/span><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n<\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_b24939-cc, .wp-block-kadence-advancedheading.kt-adv-heading8_b24939-cc[data-kb-block=\"kb-adv-heading8_b24939-cc\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_b24939-cc mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_b24939-cc[data-kb-block=\"kb-adv-heading8_b24939-cc\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_b24939-cc img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_b24939-cc[data-kb-block=\"kb-adv-heading8_b24939-cc\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading8_b24939-cc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_b24939-cc\">CyberSecThreat Research Lab needs you<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_bbb6f6-2f, .wp-block-kadence-advancedheading.kt-adv-heading8_bbb6f6-2f[data-kb-block=\"kb-adv-heading8_bbb6f6-2f\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_bbb6f6-2f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_bbb6f6-2f[data-kb-block=\"kb-adv-heading8_bbb6f6-2f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_bbb6f6-2f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_bbb6f6-2f[data-kb-block=\"kb-adv-heading8_bbb6f6-2f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_bbb6f6-2f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_bbb6f6-2f\">If you are a crazy enthusiast of Cybersecurity targeted to change the world and also Stand With Ukraine &amp; Taiwan like us, we welcome you to join CyberSecThreat Research Lab. <\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading8_216075-f1, .wp-block-kadence-advancedheading.kt-adv-heading8_216075-f1[data-kb-block=\"kb-adv-heading8_216075-f1\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading8_216075-f1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading8_216075-f1[data-kb-block=\"kb-adv-heading8_216075-f1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading8_216075-f1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading8_216075-f1[data-kb-block=\"kb-adv-heading8_216075-f1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading8_216075-f1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading8_216075-f1\">We love #Devops! We also love feedback! If you have any ideas or anything want to share with us, then feel free to reach us via <a href=\"mailto:info@cybersecthreat.com\">info@cybersecthreat.com<\/a>. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-6ae4d4c6 wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/contact-us\">Let&#8217;s get in touch<\/a><\/div>\n<\/div>\n\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-8_9797a9-07 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-8_9797a9-07 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-8_9797a9-07\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The rise of CyberSecThreat CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves&#8230;<\/p>","protected":false},"author":2,"featured_media":13880,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_kad_post_transparent":"disable","_kad_post_title":"hide","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"unboxed","_kad_post_vertical_padding":"hide","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-8","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>About CyberSecThreat - CyberSecThreat<\/title>\n<meta name=\"description\" content=\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecthreat.com\/zh\/about-cybersecthreat-lab\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About CyberSecThreat\" \/>\n<meta property=\"og:description\" content=\"ABOUT CYBERSECTHREATA safe digital life The rise of CyberSecThreat CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecthreat.com\/zh\/about-cybersecthreat-lab\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSecThreat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybersecthreat\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-01T15:57:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cybersecthreat\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/\",\"name\":\"About CyberSecThreat - CyberSecThreat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png\",\"datePublished\":\"2020-05-27T15:57:19+00:00\",\"dateModified\":\"2024-05-01T15:57:34+00:00\",\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions\",\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png\",\"width\":1200,\"height\":628,\"caption\":\"CyberSecThreat WebSite Header Banner\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#website\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"name\":\"CyberSecThreat\",\"description\":\"CyberSecurity Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecthreat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/#organization\",\"name\":\"CyberSecThreat Corporation Limited.\",\"alternateName\":\"CyberSecThreat\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cybersecthreat\",\"https:\\\/\\\/x.com\\\/cybersecthreat\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cybersecthreat-corporation-limited\"],\"description\":\"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\\\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\\\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.\",\"legalName\":\"CyberSecThreat Corporation Limited.\",\"foundingDate\":\"2021-01-23\",\"address\":{\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"25.0600452\",\"longitude\":\"121.4594381\"},\"telephone\":[\"(+886) 02 - 77527628\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"}],\"email\":\"info@cybersecthreat.com\",\"areaServed\":\"Taiwan\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#local-main-place-address\",\"streetAddress\":\"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)\",\"addressLocality\":\"New Taipei City\",\"postalCode\":\"242032\",\"addressRegion\":\"Taiwan\",\"addressCountry\":\"TW\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\\\/\\\/cybersecthreat.com\\\/about-cybersecthreat-lab\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"contentUrl\":\"https:\\\/\\\/cybersecthreat.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/CyberSecThreat_website-site-logo-_164x164-min.png\",\"width\":164,\"height\":164,\"caption\":\"CyberSecThreat Corporation Limited.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"New Taipei City\" \/>\n<meta name=\"geo.position\" content=\"25.0600452;121.4594381\" \/>\n<meta name=\"geo.region\" content=\"Taiwan\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u95dc\u65bc\u6211\u5011 - \u5947\u8cc7\u5b89","description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecthreat.com\/zh\/about-cybersecthreat-lab\/","og_locale":"zh_TW","og_type":"article","og_title":"About CyberSecThreat","og_description":"ABOUT CYBERSECTHREATA safe digital life The rise of CyberSecThreat CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that","og_url":"https:\/\/cybersecthreat.com\/zh\/about-cybersecthreat-lab\/","og_site_name":"CyberSecThreat","article_publisher":"https:\/\/www.facebook.com\/cybersecthreat","article_modified_time":"2024-05-01T15:57:34+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@cybersecthreat","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"4 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/","url":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/","name":"\u95dc\u65bc\u6211\u5011 - \u5947\u8cc7\u5b89","isPartOf":{"@id":"https:\/\/cybersecthreat.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#primaryimage"},"image":{"@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png","datePublished":"2020-05-27T15:57:19+00:00","dateModified":"2024-05-01T15:57:34+00:00","description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions","inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#primaryimage","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628.png","width":1200,"height":628,"caption":"CyberSecThreat WebSite Header Banner"},{"@type":"WebSite","@id":"https:\/\/cybersecthreat.com\/#website","url":"https:\/\/cybersecthreat.com\/","name":"\u5947\u8cc7\u5b89","description":"\u7db2\u8def\u5b89\u5168\u65b9\u6848","publisher":{"@id":"https:\/\/cybersecthreat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecthreat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/cybersecthreat.com\/#organization","name":"\u5947\u8cc7\u8a0a\u4fdd\u5b89\u53ca\u7db2\u7d61\u6709\u9650\u516c\u53f8","alternateName":"CyberSecThreat","url":"https:\/\/cybersecthreat.com\/","logo":{"@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#local-main-organization-logo"},"image":{"@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/cybersecthreat","https:\/\/x.com\/cybersecthreat","https:\/\/www.linkedin.com\/company\/cybersecthreat-corporation-limited"],"description":"CyberSecThreat, headquartered in Taiwan, is a Cybersecurity solutions provider that offers cutting-edge Cybersecurity solutions including Cyber Threat Intelligence (CTI), Security Orchestration, Automation, and Response (SOAR), UBA\/UEBA, DFIR, and CyberSecurity consulting. CyberSecThreat was awarded as Top 10 Cyber Security Companies of 2022 in APAC CIO Outlook\u2019s Cyber Security Edition. We position ourselves as one of the most comprehensive players in the most advanced high-end marketplace with our highly customizable cybersecurity solutions. CyberSecThreat has been committed to contributing to the CyberSecurity industry and assisting our global clients to improve their CyberSecurity posture. With our global partners and experts, we can deliver a wide range of world-class services to our global clients including vCISO, SOC consulting, Splunk consulting, red team, blue team, and AppSec consulting. CyberSecThreat Research Lab, which is led by our founder Kelvin Yip, is a subdivision that focuses on researching Cyber Warfare, Cyber Influence Operation\/Cognitive Domain Warfare (including Disinformation, Propaganda, and psychological manipulation), the latest Cybersecurity trends, and threats that organizations face today as well as technology innovation. With decades of Cybersecurity and technology experience, our teams of experts carry out research and experiment, bringing it to the real world. When things come to the real world and production environment, it is more complicated than our imagination. Let us worry about it because this is our mission! Our vision: NextGen safe digital life, and our mission is to Transform Security Into Real World.","legalName":"CyberSecThreat Corporation Limited.","foundingDate":"2021-01-23","address":{"@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"25.0600452","longitude":"121.4594381"},"telephone":["(+886) 02 - 77527628"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"18:00"}],"email":"info@cybersecthreat.com","areaServed":"Taiwan"},{"@type":"PostalAddress","@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#local-main-place-address","streetAddress":"9 F.-A6, No. 601, Siyuan Rd., Xinzhuang Dist., New Taipei City 242032, Taiwan (R.O.C.)","addressLocality":"New Taipei City","postalCode":"242032","addressRegion":"Taiwan","addressCountry":"TW"},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/cybersecthreat.com\/about-cybersecthreat-lab\/#local-main-organization-logo","url":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","contentUrl":"https:\/\/cybersecthreat.com\/wp-content\/uploads\/2023\/12\/CyberSecThreat_website-site-logo-_164x164-min.png","width":164,"height":164,"caption":"CyberSecThreat Corporation Limited."}]},"geo.placename":"New Taipei City","geo.position":{"lat":"25.0600452","long":"121.4594381"},"geo.region":"Taiwan"},"taxonomy_info":[],"featured_image_src_large":["https:\/\/cybersecthreat.com\/wp-content\/uploads\/2024\/02\/CyberSecThreat-WebSite-Header_LCP_Image_1200x628-1024x536.png",1024,536,true],"author_info":{"display_name":"Kelvin Yip","author_link":"https:\/\/cybersecthreat.com\/zh\/author\/kelvinyip-m\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":0,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media\/13880"}],"wp:attachment":[{"href":"https:\/\/cybersecthreat.com\/zh\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}