회사소개

제품

안내

고객지원

Company

Product

Information

Support

Thông tin về công ty

Sản phẩm

Thông tin

Hỗ trợ chung

Notice

Title Date
CEO Interview: Mr.Han, Seung-chul (NPCore)
NPCore will start 2019 as a strategy to strengthen its recognition as an APT defense specialist and further expand its position in the EDR and SECaaS markets. In addition, the company plans to expand to the Southeast Asian market based on domestic reference, and acquire international CC certification to make a full-fledged entry into the US procurement market. The following is the contents of the question and answer with Mr. Han, Seung-chul. thumb-3416275915_yHLlfh8S_ED959CEC8AB9ECB2A0_EB8C80ED919C_28EC9794ED94BCECBD94EC96B429_600x406Q. What is the greatest achievement in 2018? -A: In Korea, we won some large-scale anti-APT system construction projects from public institutions. As a representative example, a public institution has built a new network, introducing NPCore's anti-APT solution to external network, e-mail, and PC. Additionally, NPCore provided this institution with the control tower that can centrally monitor and manage all these solutions.  The cornerstone in overseas business is that exports exceeded 1 million dollars. We expect to see a rise in overseas sales in 2019 further more. Q. What is the flagship solution in 2019? -A:  Our flagship solution is 'ZombieZERO EDR'. Existing signature-based security solutions, such as anti-virus, are unable to respond to new and variant malware and Ransomware such as WannaCry or Pettya. In addition, traditional sandboxing techniques are also vulnerable to attacks using virtual machine bypassing malware, variant Ransomware, and SSL. To overcome these limitations, EDR (Endpoint Detection & Response) technology is becoming more important. The IOC (Indicators of Compromise) method is a post-coping method that collects traces of malware that have already been infiltrated and analyzes the patterns in the analysis system. On the other hand, NPCore's EDR responds immediately to malware before infection via execution-holding function. It also minimizes the impact of existing systems on agent operation and does not use techniques such as hooking and dll injection which are highly likely to collide. In addition, for some foreign products, the virtual analysis environment has become standardized, on the other hand, NPCore's EDR configures a virtual environment with applications that is mainly used in the local area, so its detection rate is high. Q. What are the prospects for the security market in 2019? -A: As the APT and Ransomware damages increase year by year, we expect the security market to grow in 2019. In addition, the market has been expanding from the form of purchasing and using security products to the form of easy to use security services (SECaaS -Security as a Service). Q. What is your strategy for 2019? -A: In addition to strengthening awareness and positioning as an APT specialty brand, we have established a strategy to expand our target market to the EDR and SECaaS markets. In addition, the company plans to expand its brand awareness and local network in Southeast Asia market and to advance into the US procurement market after acquiring international CC certification based on the reference delivered to domestic leading organizations. Q. What do you want to tell public or corporate security practitioners? -A: I think that there are quite a lot of people who have the idea of "I do not think our organization will become a target" even though I encountered frequent hacking incidents. This 'lack of awareness of cybersecurity' becomes the biggest vulnerability, causing hackers to take an intelligent approach and repeat the vicious cycle of finding solutions after the damage. It is time to introduce a security system that can prevent intelligent continuous attacks in advance.NPCore has developed APT-compatible solutions with its own technology and has continuously updated its products and services over the last 10 years in response to security trend changes and customer needs. We will always do our best to provide solutions that customers feel comfortable every day, and solutions that can be relieved by unexpected cyber attacks. *Original Article(KR): https://www.dailysecu.com/?mod=news&act=articleView&idxno=44610
2019.01.25

Namyang Corporation's website was hacked, so its members' personal info was leaked!

Author
admin
Date
2017-09-01 11:43
Views
1405

Namyoung Corporation apologized the data leak on website's notice ...
Customers who joined in May 2011 ~ end of 2015
Some of the cases that Incheon Police Agency's E-Crime Unit are investigating ...
Only 6 of 20 damaged companies noticed the leak.



Namyang Corporation's website was hacked, so its members' personal information was leaked.

Namyang said, "We confirmed on the 28th that some of our website member's information was found on the hacker's PC recently arrested by the investigation agency."

The ID, name, email, date of birth, contact number and address of some of the members who joined from May 2011 to the end of 2015 were leaked.

The police are trying to figure out the exact amount of damage and estimate that about 1 million informations were leaked.

Namyang said on website's notice, "We apologize for the leak of some of our member's information, and we will establish security measures to prevent any unsavoury incident."

Namyang added that they don't collect resident registration numbers, and information of members who joined outside the period was not leaked.

The Incheon Police Agency's E-Crime Unit arrested A (28) on suspicion of hacking Eugene Investment's futures at the end of last month and stealing 300,000 personal informations.

The police found total 33 million personal informations on the laptop carried by A during the arrest, and information leaked from the Namyang's website is part of them.

In addition, several organizations and companies were reported to be hacked by A.

TOM N TOMS COFFEE also said on August 4 that they confirmed that part of the member's information on the website that was operated in the past was leaked by hacker.

[Source : Namyang Corporation's website]


[ Source : Won, Byung Chul reporter of Boannews | boanone@boannews.com | 2017-08-30 15:23 ]

News link : http://www.boannews.com/media/view.asp?idx=56717&kind=1&search=title&find=%B3%B2%BE%E7%C0%AF%BE%F7