CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-0MaHrFCf8cpfl7SxAay7KA' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Mon, 06 Oct 2025 16:45:42 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 21:14:57 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210051-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759785297.612096,VS0,VE1379
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8720
FJC-CERT
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
FJC-CERT
Team Information | |
---|---|
Team name | FJC-CERT |
Official team name | Fujitsu Cloud CERT |
Member since | March 1, 2012 |
Host organization | Fujitsu Limited |
Country of team | Japan JP |
Date of establishment | 2010-09-01 |
Business Hours | |
---|---|
Timezone | UTC+0900 |
Description of business hours | 8:40-17:30(GMT+0900) |
How to contact outside business hours | Normal procedure: Send the email to our team. Emergency procedure: Send the email to our team and call to the emergency telephone |
Constituency | |
---|---|
Type of Constituency | ICT vendor customer base |
Description of Constituency | FJC-CERT covers IT information security to protect the Fujitsu Group company's assets and its customers in Fujitsu’s cloud computing services domain. |
Internet Domain Address | fujitsu.com |
Cryptography | |
---|---|
PGP key id | 0x6146D9D3B4F05DE7 |
PGP fingerprint | 101334C6FEDF5ECEF6F2AF376146D9D3B4F05DE7 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=29gm
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.