ThreatVision Cybercrime Intelligence: Revealing Threats from the Hacker’s Perspective

2025 Threat Analyst Summit Convenes Global Cybersecurity Leaders, Celebrates Record International Participation

2025.12.02TeamT5 Media Center
Share:
Top threat analysts from the Asia-Pacific region gathered to share practical experience and forward-looking strategies, focusing on three key issues and urging all sectors to pay attention to threat intelligence and strengthen defense gaps.
[Taipei, December 3, 2025] The 2025 Threat Analyst Summit (TAS), hosted by leading threat intelligence firm TeamT5, took place on December 3–4 in Taipei, Taiwan. This year’s summit surpassed previous editions in scale and international reach, with nearly two-thirds of participants traveling from abroad and representing more than 20 countries. Over 200 cybersecurity experts and practitioners attended the event, engaging in knowledge sharing, experience exchange, and in-depth discussions on the global threat landscape.
The forum boasted a strong lineup of speakers, bringing together leading international cybersecurity and technology companies, including ITOCHU, MACNICA, LAC, Constella Security Japan, The Korea Financial Security Institute, Team Cymru, Recorded Future, Shreshta, Meta, DarkLab, Microlab.red, and Trend Micro, whose industry authorities provided insightful perspectives.

Experts Highlight Persistent Security Gaps and Urge Stronger Commitment to Threat Intelligence

The summit continued the focus of the previous two TAS events, providing an in-depth look at the latest activities of APT groups across the Asia-Pacific region. This year’s program also expanded to key themes including cybercrime trends and the evolving landscape of information operation.
Looking back at the cybersecurity landscape in 2025, the year has been marked by a series of high-impact incidents, from the early-year CrazyHunter attack and the surge of APT campaigns exploiting VPN vulnerabilities, to the recent breach of a globally recognized beer manufacturer that forced a complete shutdown of its production lines. These events underscore that, despite rising cybersecurity awareness within enterprises, critical gaps in defense architectures persist, creating opportunities for attackers to exploit weaknesses. Strengthening these defenses proactively remains essential to mitigating future threats and reducing operational risk.

VPN Vulnerabilities Emerge as Key Intrusion Vectors; Supply Chain Security Becomes a Critical Challenge

In cybersecurity architecture, "threat intelligence collecting and application" has become a crucial area that enterprise cybersecurity personnel urgently need to strengthen. Only through systematic intelligence analysis and application can early warnings, rapid responses, and prevention be achieved before attacks occur, effectively reducing risks and operational damage.
TeamT5 CEO Tsai Sung-ting (TT) stated that the most frequent cybersecurity threat this year is network device intrusion. Therefore, several case studies on VPN device intrusion were arranged for presentations. Currently, cybercriminal ransomware groups do not initially target specific companies. Instead, they determine their targets after obtaining vulnerability information on the original equipment manufacturer's (OEM) devices, often choosing high-value companies, attempting to gain root access, and then launching encrypted ransomware attacks.
Tsai Sung-ting pointed out that in the past year, Chinese hacker activities have become increasingly rampant, frequently infiltrating enterprise network environments through hardware and software vulnerabilities. Many of these cases involve equipment hosted by external vendors, which can be categorized as supply chain intrusion. Even if enterprises have deployed numerous protective measures, they may still suffer losses if their hosting vendors are attacked.

Cybersecurity Remains a Complex Undertaking, Requiring Determination from Strategy to Execution

Tsai Sung-ting emphasized that in practice, even if the client company actively implements cybersecurity measures, if the vendor is negligent in management and lacks adequate protection, they are often unknowingly compromised by hackers, ultimately leading to serious losses. This shows that "supply chain cybersecurity management" is often the most easily overlooked aspect of corporate cybersecurity strategies, yet it is also a critical point with extremely high risks.
He added that large companies don't necessarily have good cybersecurity practices, especially in manufacturing or traditional industries. Willingness to invest resources, having the right strategies, and finding a professional team to assist are all challenges companies face in promoting cybersecurity. Cybersecurity is a long-term and continuous endeavor; however, the reality is that many companies are still at the stage of wanting to do it, and the journey from that to wanting to understand how to do it, and then to serious implementation, is long, testing the determination of business owners and management teams.

About TeamT5

Founded in 2017, TeamT5 is a leading provider of cybersecurity threat intelligence and endpoint security solutions in the Asia-Pacific region. Specializing in cyber threat research in the Asia-Pacific region, covering Advanced Persistent Threats (APTs) and ransomware, the company leverages precise threat intelligence and unique endpoint threat hunting technology to provide clients with comprehensive cybersecurity solutions for effectively countering cyber espionage and ransomware attacks. In 2022, it received joint investment from JAFCO, Japan's largest venture capital firm; ITOCHU, Japan's largest multinational corporation; and MACNICA, Japan's largest cybersecurity solutions provider, demonstrating its significant international potential. From 2023 to 2024, TeamT5 was consecutively recognized as Taiwan's Best Threat Intelligence Company by the international consulting firm Frost & Sullivan.
To promote cyber threat research and international cybersecurity cooperation in the Asia-Pacific region, the company piloted the Threat Analyst Summit (TAS) in 2022 and officially held its first TAS Threat Analyst Summit in 2023, successfully establishing an important platform for Asia-Pacific cybersecurity experts to share the latest threat dynamics and forward-looking strategies.

2025.12.02TeamT5 Media Center
Share:

Related Post

We use cookies to provide you with the best user experience. By continuing to use this website, you agree to ourPrivacy & Cookies Policy.