威脅曝險管理方案
XCockpit 威脅曝險管理平台
Identity 帳號安全態勢管理
Endpoint 端點安全態勢管理
EASM 外部資產曝險管理
CyberTotal
ThreatWall
最新消息
CyCraft 新聞
研討會活動
CyCraft.AI 部落格
資源中心
客戶案例
白皮書
報告書
影片
台灣共契專區
關於奧義
認識奧義
產業認證
人才招募
聯絡我們
CYBERSEC 2024
申請試用
研討會活動
探索最新的產業趨勢與專業見解
2024
SINCON 2024
Silent Intruders: Dissecting EDR Bypass Strategies in APT Attacks
2024
SINCON 2024
LLMs Bear the BOT, Yet Swallow Up — Exploring Potential Attacks against Retrieval Augmented Generation Models
2024
2024 FIRST Cyber Threat Intelligence Conference
Source Pollution Attack - A Hidden Threat in Cybersecurity
2024
2024 FIRST Cyber Threat Intelligence Conference
Multi Heads Are Better Than One: Leveraging Multimodal GenAI for Comprehending and Exploring Cyber Threat Intelligence
2024
BSides Tokyo
言語モデルを使用して CTI コックピットを作成する
2024
GCC Thailand 2024
Practical Malware Analysis and .NET Reversing Based on Real-World Cases
2024
JSAC
Ghost in Your Supply Chain
2024
SECCON
BloodHound's New Trail: Incorporating Scalable Edge Blocking Algorithms for Refined AD Defense
2024
SECCON
CyberSensei: Redefining Cybersecurity Inquiry Responses with AESG, Your Cybersecurity Assistant and Guardian
2023
AVTOKYO 2023
無職転生Azure行ったら本気だす: Microsoft Entra ID P2機能を使用してAzure IAMを乱用する
2023
Black Hat Europe Arsenal
Attack Knowledge Base for Automotive
2023
CODE BLUE
AI主導のIDアタックサーフェスの可視化でIDの誤設定をあぶり出す
2023
HITB Security Conference 2023 - Phuket
GPTHound – Your Active Directory Security Assistant
2023
HITB Security Conference 2023 - Phuket
Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis
2023
Black Hat USA
IRonMAN: InterpRetable Incident Inspector Based ON Large-Scale Language Model and Association miNing
2023
SANS DFIR Summit
Incident Analysis Case Study Focusing on .NET Malware
2023
OWASP 2023 Global Appsec
Constructing a Precise Dynamic Control-flow Graph for EVM based Smart Contracts
2023
JSAC 2023
Demystifying China’s Supply Chain Attack Targeting Financial Sector