• Topics
  • Artificial wisdom
  • Autopilot
  • network
  • Processor
  • 手機
  • exhibition activities
    • CES
      • CES 2014
      • CES 2015
      • CES 2016
      • CES 2017
      • CES 2018
      • CES 2019
      • CES 2020
    • MWC
      • MWC 2014
      • MWC 2015
      • MWC 2016
      • MWC 2017
      • MWC 2018
      • MWC 2019
    • Computex
      • Computex 2014
      • Computex 2015
      • Computex 2016
      • Computex 2017
      • Computex 2018
      • Computex 2019
    • E3
      • E3 2014
      • E3 2015
      • E3 2016
      • E3 2017
    • IFA
      • IFA 2014
      • IFA 2015
      • IFA 2016
      • IFA 2017
    • TGS
      • TGS 2016
  • About_us
    • About mashdigi
    • mashdigi website contact details
2026 / 02 / 08 00:28 Sunday
  • Login
mashdigi-Technology, new products, interesting news, trends
  • Topics
  • Artificial wisdom
  • Autopilot
  • network
  • Processor
  • 手機
  • exhibition activities
    • CES
      • CES 2014
      • CES 2015
      • CES 2016
      • CES 2017
      • CES 2018
      • CES 2019
      • CES 2020
    • MWC
      • MWC 2014
      • MWC 2015
      • MWC 2016
      • MWC 2017
      • MWC 2018
      • MWC 2019
    • Computex
      • Computex 2014
      • Computex 2015
      • Computex 2016
      • Computex 2017
      • Computex 2018
      • Computex 2019
    • E3
      • E3 2014
      • E3 2015
      • E3 2016
      • E3 2017
    • IFA
      • IFA 2014
      • IFA 2015
      • IFA 2016
      • IFA 2017
    • TGS
      • TGS 2016
  • About_us
    • About mashdigi
    • mashdigi website contact details
No Result
View All Result
  • Topics
  • Artificial wisdom
  • Autopilot
  • network
  • Processor
  • 手機
  • exhibition activities
    • CES
      • CES 2014
      • CES 2015
      • CES 2016
      • CES 2017
      • CES 2018
      • CES 2019
      • CES 2020
    • MWC
      • MWC 2014
      • MWC 2015
      • MWC 2016
      • MWC 2017
      • MWC 2018
      • MWC 2019
    • Computex
      • Computex 2014
      • Computex 2015
      • Computex 2016
      • Computex 2017
      • Computex 2018
      • Computex 2019
    • E3
      • E3 2014
      • E3 2015
      • E3 2016
      • E3 2017
    • IFA
      • IFA 2014
      • IFA 2015
      • IFA 2016
      • IFA 2017
    • TGS
      • TGS 2016
  • About_us
    • About mashdigi
    • mashdigi website contact details
No Result
View All Result
mashdigi-Technology, new products, interesting news, trends
No Result
View All Result
Home Market dynamics

DEVCORE uses hacker attack ideas to help companies establish system security protection mechanisms
They believe that only through continuous attacks and exploitation of vulnerabilities can they truly find security protection methods.

Author: Mash Yang
2022-01-12
in Market dynamics, network
A A
0
Share to FacebookShare on TwitterShare to LINE

Found last yearMicrosoft Exchange Server Vulnerabilities, and won the Pwnie Awards, known as the "Oscars of the Cybersecurity Industry"Best Server Vulnerability AwardAfterwards, DEVCORE shared its philosophy on establishing red team drills and other services today (1/12), and emphasized that it hopes to help companies establish adequate system security protection mechanisms through hacker attack ideas.

DEVCORE uses hacker attack ideas to help companies establish system security protection mechanisms

DEVCORE co-founder and CEO Weng Haozheng said that many companies' security protection concepts are often based on purchasing security protection solutions from outside, but they often ignore the vulnerabilities generated during the actual operation of the system, making it easy for external attacks to invade, leading to data theft or even greater damage.

DEVCORE believes that by using the same attack methods as hackers to penetrate corporate systems, they can more directly and effectively help companies identify security vulnerabilities and improve their protection capabilities without impacting business operations or data security. Therefore, through Red Team Assessments and Penetration Testing, companies can identify vulnerabilities early, preventing them from being overwhelmed in the event of an actual attack.

Weng Haozheng said that building defense through attack has always been the spirit of DEVCORE. He also believes that only through continuous attack and exploitation of loopholes can we truly find security protection methods.

DEVCORE uses hacker attack ideas to help companies establish system security protection mechanisms
▲From left: DEVCORE co-founder and Red Team Director Xu Fukai, DEVCORE co-founder and CEO Weng Haozheng, DEVCORE co-founder and Support Team Leader Lai Weiting, DEVCORE co-founder and Senior Project Manager Xu Nianen

Since its founding in November 2012, DEVCORE has provided high-quality penetration testing services to help companies in security-critical industries, including government, finance, semiconductors, e-commerce, and healthcare, verify their security protections. In 11, DEVCORE officially launched red team exercises, using real-world drills to further validate enterprise security capabilities and uncover potential vulnerabilities.

After winning numerous awards and helping to uncover various security vulnerabilities in enterprises, DEVCORE stated that over 9% of external enterprise systems can be directly penetrated and accessed, and over 7% of core enterprise systems can be breached and controlled, leading to service interruptions. This further highlights that enterprise information security must be verified through actual operations to ensure its actual security level.

However, as corporate security vulnerabilities continue to be discovered and fixed, does this mean that DEVCORE will no longer be able to play a role? DEVCORE co-founder and Red Team Director Xu Fukai believes that the continuous development of technology will indeed make the network environment more and more secure. At the same time, various anti-virus technologies and protection solutions will become smarter, and even new forms of application services and frameworks will be less likely to have vulnerabilities. However, in the process of system iteration and update, old program codes, usage permissions, and more complex system structures will still cause vulnerabilities. Therefore, DEVCORE can still continue to help companies discover vulnerabilities through hacker thinking.

Therefore, when it comes to cybersecurity, DEVCORE believes that companies should place greater emphasis on field drills and simulated penetration results, especially as some countries are beginning to use system vulnerabilities as digital weapons. Furthermore, more organizations are publicly or privately acquiring information on cybersecurity vulnerabilities. In the future, it may become even more difficult to imagine the potential impact of system vulnerabilities.

Tags: DEVCORERed Team AssessmentRed Team Exercises
ShareTweetShare
Mash Yang

Mash Yang

Founder and editor of mashdigi.com, and student of technology journalism.

Leave a Reply Cancel Reply

The email address that must be filled in to post a message will not be made public. Required fields are marked as *

This site uses Akismet service to reduce spam.Learn more about how Akismet processes website visitor comments.

Translation (Tanslate)

Recent updates:

Accelerating the crackdown on counterfeits! X Test lets AI write the first draft of "community notes," transforming Grok into an assistant to the watchdog.

Accelerating the crackdown on counterfeits! X Test lets AI write the first draft of "community notes," transforming Grok into an assistant to the watchdog.

2026-02-08
Porsche and Aston Martin showcased new CarPlay interfaces for 2024 models

Is Siri finally stepping aside? Rumors suggest Apple's CarPlay will allow third-party AI apps to join, but "usurping" its place won't be so easy.

2026-02-07
This time, no cryptocurrency sales! Crypto.com CEO buys AI.com domain name for a record price, planning to launch "personal AI agents" during the Super Bowl.

This time, no cryptocurrency sales! Crypto.com CEO buys AI.com domain name for a record price, planning to launch "personal AI agents" during the Super Bowl.

2026-02-07
mashdigi-Technology, new products, interesting news, trends

Copyright © 2017 mashdigi.com

  • About mashdigi.com
  • Place ads
  • Contact mashdigi.com

Follow us

Welcome back!

Login to your account below

Forgotten Password?

Retrieve your password

Hãy nhập tên người dùng hoặc địa chỉ email để mở mật khẩu

Log In
No Result
View All Result
  • About mashdigi.com
  • Place ads
  • Contact mashdigi.com

Copyright © 2017 mashdigi.com