CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-vW3Ul1db-VneQTJMPbunZA' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:46:10 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Tue, 07 Oct 2025 16:30:12 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210029-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759854611.126603,VS0,VE1221
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8670
STC DFIR
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
STC DFIR
Team Information | |
---|---|
Team name | STC DFIR |
Official team name | Digital Forensic and Incident Response |
Member since | June 20, 2018 |
Host organization | Saudi Telecommunication Company |
Country of team | Saudi Arabia SA |
Other countries of team | Bahrain, Kuwait, Oman, United Arab Emirates (the) BH KW OM AE |
Date of establishment | 2016-11-01 |
Website | https://www.stc.com.sa/ |
Business Hours | |
---|---|
Timezone | +3 |
Description of business hours | 7 AM to 4:30 PM , Sunday to Thursday |
How to contact outside business hours | Email or Cellphone |
Constituency | |
---|---|
Type of Constituency | Other commercial |
Description of Constituency | STC, Saudi Telecommunication Company is a quadruple play telco whose a market leader in Saudi Arabia offering landline, mobile, internet services and IPTV. |
Internet Domain Address | www.stc.com.sa |
Country of Constituency | Bahrain, Kuwait, Oman, Saudi Arabia, United Arab Emirates (the) BH KW OM SA AE |
Cryptography | |
---|---|
PGP key id | 0x9F1CC6BCD1C4A12C |
PGP fingerprint | 6660D3E4257A5F797058A6F79F1CC6BCD1C4A12C |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----
mQENBFsFWsABCACyslcH2LMiBKvetlnpt5+qOOrxj+olghWuqTyRrsn1eDAsUHnv
1kDiuM74sdOjfQ0cwevIXPBbFsg/cG4/9kuLtbDXUTEUe7pdecQ6d+u+/xQMqnMH
i/S7iq4RCgP09UkzTBIKawEVtwCAEJxz6+r1N9MuAh/w1f8ALPRGbNMvqlwW39ie
WbbwUrCbxRyuR39rP5DTkmVapg1L54BADBfMstx5HErwaVHOStv/SpqllWuKSs+S
Vz5icvqgCVfPE3A9q/aHRHT1XyXvbKBU0mK9bQ9FK+F2ky+sozXT2aywM2ZdCr7T
5WKUifCZkUi++M0JHKxIo1HtsPv7l7nCvQlzABEBAAG0JFNUQyBGSVJTVCBSRVAg
PGZpcnN0LXJlcEBzdGMuY29tLnNhPokBcgQQAQIAXAUCWwVawDAUgAAAAAAgAAdw
cmVmZXJyZWQtZW1haWwtZW5jb2RpbmdAcGdwLmNvbXBncG1pbWUICwkIBwMCCgEC
GQEFGwMAAAAFFgADAgEFHgEAAAAGFQgJCgIDAAoJEJ8cxrzRxKEsd2wIAI9N5Om2
vl8cr9x//546AIW3CTFajkSRiPINZaJDsfHBIA9cr09nM1QIY/OFcOlTJow2jx7x
ZXZnhAxrP0kVD381E6r99VNmj7YetAoC1r9Kufs4sCiHng2HS/PSPL8kTiR3aEaY
r9acDFO+KPrEXklISOt/iCw4SGkQs9Rd2i2U+Ax4IBHFSTdksk5hGwFMAox0j5/O
yRQAbecASnSCivZXzPiOlxmEwBqsD+yZHe9QpIWsFseZZsewPhQoitvOm7Fvq2w/
hNJtCiHAEam2uW8gNhKGwr1D2VsbUIjNrqg3ZReEwdfNsULQlCUtgQyQlSdyvcxg
BMz68cR+et98Fma5AQ0EWwVawAEIANFETpm26g5cBvruhE371ylq5GysraR5RW4O
UcL9R+1ShmqW+QHsdJb5UVedIDul6poXUgNli7FtVA2Gl//sr2gD3bJMNpDHPAAu
2gz2izM2jHPy/E3wMXvysHN+MijlJgW79TjOvcpWjPRSiYkVb+S7tjBv84rl6Hyn
Y33mplQdcadelwbvhkHEyWPYIafNkwQaqqEthNmXD5PegJWH0aX4E9BvFgrLT+lC
UcNy5G8OS9aGCDKtRhryIEOuY7MtA1Cresjwn0zOgABKmKUSTteXeMqOE61LcRPT
N8kOJ4BcNNnbAS3yOVpKEAAPXKaed3ZKUbwiNbAQAWwQBhvPGqEAEQEAAYkCQQQY
AQIBKwUCWwVawQUbDAAAAMBdIAQZAQgABgUCWwVawAAKCRDJkok/M7APs46QB/4v
qslsgmwTOnGNlgmwSuXKnIH8fJxOqYEhre+JiByulR2mFflYgrwl7AT8tShM950N
0WZD7RcUheeJqEU/+bnvzXrwp5UoNdllYGjhyahu9o5pla/7RAiRmzG33iJM2Njp
mI7+kjK+rdg/G1I3nfw+Vv2aSjNsmVm+BWQ7pLeeigBi9feF/mI6lcXdJtvh62sY
CA05iuTalZXHUHWcjuXclkt0UmMPED1m9vS+i0czJ4NeSbMSjFWB0ECMSdhrwabH
02CoaZd+bzb//0PDMcRDRQEfV9NoKUIXpDw81f8J2Srsd9B+q1QxE0EZFfv7n2NL
nkYr0xwrwLHNKvc5q0qdAAoJEJ8cxrzRxKEsnhEH/1aDcoV5yWhaOAEfIk9MFiu9
GeerHObntsI2ZmH3njSJT6jAWNV6TAx3gaOG1sy4Rg8o0T5jvgecLXURAXxZNtkt
8/F6RO5VrHy54bCGkr3JxDVJOJukeNTejPLUeNY7TTwwXu6KQAjuofuESIqsI1kG
Yo6D7ObfHI811qUrbQLGEhjxMlyqmR0UpTE2YLQj6Tjlguo+RFtj/OFzIibSOpMq
q/Eovg0KAFQp+XQCKQn86d52XGFWYgmBlTbIZW+FP1j4EpuS74Sc/MdxO2G+D+8t
vyMuKLAltskPPlrvUhqSrlY5S/uU4d25APwP5ISG6D1iwMdfoiL9PTN00AoPQd4=
=xMFw
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.