Currently serving as a Technical Consultant in the Incident Response Team at Trend Micro Incorporated. Specialties include cybersecurity incident investigation, information system architecture hardening, and Windows attack technique analysis.
After breaching the internal network, attackers exploit network devices as footholds to compromise switches, ultimately taking control of core network infrastructure to enable lateral movement. This presentation will analyze the attack chain and technical methodologies involved, while also exploring actionable strategies to prevent network devices from being weaponized by attackers.
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。