CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=UTF-8
access-control-allow-origin: *
cache-control: private, no-cache, no-store, must-revalidate, max-age=0, s-maxage=0
content-encoding: gzip
content-security-policy: default-src 'none'; style-src 'self' 'unsafe-inline' https:; img-src 'self' https: data:; font-src 'self'; script-src 'nonce-QFAwtaRl7X-9l-o3qIq5YQ' 'strict-dynamic' 'self' 'unsafe-eval'; form-action 'self'; media-src 'self' *.first.org; connect-src 'self' *.first.org; object-src 'none'; frame-src https:; frame-ancestors 'self'; base-uri 'self'
last-modified: Sun, 05 Oct 2025 16:46:16 GMT
referrer-policy: same-origin
server: nginx
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
accept-ranges: bytes
date: Mon, 06 Oct 2025 10:20:05 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210066-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759746004.025801,VS0,VE1211
vary: accept-encoding, Accept-Encoding
strict-transport-security: max-age=31557600
alt-svc: h3=":443";ma=86400,h3-29=":443";ma=86400,h3-27=":443";ma=86400
content-length: 8854
Tencent Cloud
- About FIRST
- Mission Statement
- Strategy Framework
- History
- Sustainable Development Goals
- Organization
- FIRST Policies
- Anti-Corruption Policy
- Antitrust Policy
- Bylaws
- Board duties
- Bug Bounty Program
- Code of Conduct
- Conflict of Interest Policy
- Document Record Retention and Destruction Policy
- FIRST Press Policy
- General Event Registration Refund Policy
- Guidelines for Site Selection for all FIRST events
- Identity & Logo Usage
- Mailing List Policy
- Media Policy
- Privacy Policy
- Registration Terms & Conditions
- Services Terms of Use
- Standards Policy
- Statement on Diversity & Inclusion
- Translation Policy
- Travel Policy
- Uniform IPR Policy
- Whistleblower Protection Policy
- Partnerships
- Newsroom
- Procurement
- Jobs
- Contact
- Membership
- Initiatives
- Special Interest Groups (SIGs)
- SIGs Framework
- Academic Security SIG
- AI Security SIG
- Automation SIG
- Cybersecurity Communications SIG
- Common Vulnerability Scoring System (CVSS-SIG)
- CSIRT Framework Development SIG
- Cyber Insurance SIG
- Cyber Threat Intelligence SIG
- Curriculum
- Introduction
- Introduction to CTI as a General topic
- Methods and Methodology
- Priority Intelligence Requirement (PIR)
- Source Evaluation and Information Reliability
- Machine and Human Analysis Techniques (and Intelligence Cycle)
- Threat Modelling
- Training
- Standards
- Glossary
- Communicating Uncertainties in CTI Reporting
- Webinars and Online Training
- Building a CTI program and team
- Curriculum
- Detection Engineering & Threat Hunting SIG
- Digital Safety SIG
- DNS Abuse SIG
- Stakeholder Advice
- Detection
- Cache Poisoning
- Creation of Malicious Subdomains Under Dynamic DNS Providers
- DGA Domains
- DNS As a Vector for DoS
- DNS Beacons - C2 Communication
- DNS Rebinding
- DNS Server Compromise
- DNS Tunneling
- DoS Against the DNS
- Domain Name Compromise
- Dynamic DNS (as obfuscation technique)
- Fast Flux (as obfuscation technique)
- Infiltration and exfiltration via the DNS
- Lame Delegations
- Local Resolver Hijacking
- Malicious registration of (effective) second level domains
- On-path DNS Attack
- Stub Resolver Hijacking
- Detection
- Code of Conduct & Other Policies
- Examples of DNS Abuse
- Stakeholder Advice
- Ethics SIG
- Exploit Prediction Scoring System (EPSS)
- FIRST Multi-Stakeholder Ransomware SIG
- Human Factors in Security SIG
- Industrial Control Systems SIG (ICS-SIG)
- Information Exchange Policy SIG (IEP-SIG)
- Information Sharing SIG
- Law Enforcement SIG
- Malware Analysis SIG
- Metrics SIG
- NETSEC SIG
- Public Policy SIG
- PSIRT SIG
- Red Team SIG
- Security Lounge SIG
- Security Operations Center SIG
- Threat Intel Coalition SIG
- Traffic Light Protocol (TLP-SIG)
- Transportation and Mobility SIG
- Vulnerability Coordination
- Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)
- Women of FIRST
- CCB Initiatives
- FIRST CORE
- Internet Governance
- IR Database
- Fellowship Program
- Mentorship Program
- IR Hall of Fame
- Victim Notification
- Volunteers at FIRST
- Previous Activities
- Special Interest Groups (SIGs)
- Standards & Publications
- Events
- Education
- Blog
Tencent Cloud
Team Information | |
---|---|
Team name | Tencent Cloud |
Official team name | Tencent Cloud Computing (Beijing) Co., Ltd |
Member since | December 16, 2020 |
Host organization | Tencent Holdings Ltd |
Country of team | China CN |
Date of establishment | 2013-09-09 |
Website | https://cloud.tencent.com |
Business Hours | |
---|---|
Timezone | UTC/GMT +08:00 |
Description of business hours | 9:00AM - 19:00PM |
Constituency | |
---|---|
Type of Constituency | Other commercial |
Source of Constituency | Internal to host |
Description of Constituency | Tencent Cloud is one of China’s largest cloud service providers. which provides on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis. Tencent Cloud operates in more than 27 regions worldwide, whose customers include developers, mid-sized and enterprise clients across a range of industries, such as financial services, education, healthcare, retail, industry, transport, energy and radio & television. By offering reliable, scalable, and inexpensive cloud computing services, Tencent Cloud helped large amount of companise and users building their business easier and more efficiently. |
Internet Domain Address | https://intl.cloud.tencent.com/introduction |
Country of Constituency | China CN |
Cryptography | |
---|---|
PGP key id | 0xEBAFC2EEC4DFFDBA |
PGP fingerprint | 055A176D926A42F969257015EBAFC2EEC4DFFDBA |
Team PGP public key | -----BEGIN PGP PUBLIC KEY BLOCK-----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=RaC6
-----END PGP PUBLIC KEY BLOCK----- |
Team contact information provided for Incident Response purposes only. FIRST strictly prohibits the use of contact information for solicitation or marketing.
FIRST follows the ISO 3166-1 standard for country code and name listings.