CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-cTE-BQVKg1g_vOalNwvZ3Q' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Tue, 07 Oct 2025 16:46:25 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Wed, 08 Oct 2025 04:22:02 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210050-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759897321.495935,VS0,VE970
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8361
ShieldX PSIRT
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
ShieldX PSIRT
Team Information | |
---|---|
Team name | ShieldX PSIRT |
Official team name | Shield eXtreme Product Security Incident Response Team |
Member since | February 24, 2023 |
Host organization | Shield eXtreme Co., Ltd |
Country of team | Taiwan (Province of China) TW |
Date of establishment | 2022-03-03 |
Website | https://www.shieldx.io |
Business Hours | |
---|---|
Timezone | Asia/Taipei |
Description of business hours | Monday to Friday : 08:00 - 18:00 |
How to contact outside business hours | Send Email to service@shieldx.io |
Constituency | |
---|---|
Type of Constituency | Other commercial |
Source of Constituency | Both external and internal |
Description of Constituency | Shield eXtreme focused on becoming the leading cyber security exercising range that are both practical and enriched by the latest in attack threat intelligences and patterns, Shield eXtreme’s view from both state and global level of defensive protection and offensive prevention, it’s unique set of blue team tactics, as well as malicious activity prevention and research not only is high in standard |
Country of Constituency | Taiwan (Province of China) TW |
Cryptography | |
---|---|
PGP key id | 0xA388F446A06531A2 |
PGP fingerprint | 14B8AD4EDE7EAFBC36A70734A388F446A06531A2 |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=4JtO
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.