[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"getGlobalData":3,"i-es:search":215,"i-es:arrow_forward_ios":219,"i-es:arrow_forward":221,"i-es:language":225,"getHomePageData":227},{"header":4,"footer":99},{"article":5,"aside":88},{"default":6,"header":9},{"slug":7,"title":8},"test","測試",{"cta_link":10,"list":13},{"name":11,"url":12},"Start Trial","https:\u002F\u002Fteamt5.org\u002Fen\u002Fcontact-us\u002F",[14,52,60,76,80,84],{"key":15,"name":16,"sec_sub_list":17,"url":51},"item_9f08648d-b439-4165-af32-40c1f8606856","Platforms",[18,24,29,34],{"3rd_sub_list":19,"description":20,"key":21,"name":22,"url":23},null,"Threat Forensic Analysis Platform","item_1c61aeb7-63df-4d3e-82c4-3db8b648ae38","ThreatSonar","https:\u002F\u002Fteamt5.e-s.tw\u002Fplatform\u002Fthreatsonar",{"3rd_sub_list":19,"description":25,"key":26,"name":27,"url":28},"Intelligence Reports","item_4a409709-a6ba-4486-bf5d-b1397cd67df1","ThreatSonar Plus","https:\u002F\u002Fteamt5.e-s.tw\u002Fplatform\u002Fthreatsonar-plus",{"3rd_sub_list":19,"description":30,"key":31,"name":32,"url":33},"Endpoint Detection & Response Platform","item_80652ac0-61aa-499b-90b1-57b22861fd00","ThreatSonar Anti-Ransomware","https:\u002F\u002Fteamt5.e-s.tw\u002Fplatform\u002Fthreatsonar-anti-ransomware",{"3rd_sub_list":35,"description":47,"key":48,"name":49,"url":50},[36,39,43],{"key":37,"name":25,"url":38},"item_036e2dfa-a1b2-4b26-8fda-3c8163146d4a","https:\u002F\u002Fteam5.e-s.tw\u002Fplatform\u002Fthreatvision-intelligence-reports",{"key":40,"name":41,"url":42},"item_102d6852-b84e-4219-b6a4-a43ec3989c33","Cybercrime Intelligence","https:\u002F\u002Fteam5.e-s.tw\u002Fplatform\u002Fthreatvision-cybercrime-intelligence",{"key":44,"name":45,"url":46},"item_5860583b-74fc-402a-835f-5cf9b6f51469","Deep & Dark Web Intelligece","https:\u002F\u002Fteam5.e-s.tw\u002Fplatform\u002Fthreatvision-deep-dark-web-intelligence","Threat Intelligence Platform","item_f9df2cc9-9235-4af9-a9d9-07668c8c3aab","ThreatVision","https:\u002F\u002Fteamt5.e-s.tw\u002Fplatform\u002Fthreatvision","",{"key":53,"name":54,"sec_sub_list":55,"url":51},"item_0a07ce84-4832-41d2-a64f-4f9115be30d6","Services",[56],{"3rd_sub_list":19,"description":51,"key":57,"name":58,"url":59},"item_185e7d8d-96d6-439e-81ae-b689da411842","Incident Response","https:\u002F\u002Fteamt5.org\u002Fen\u002Fservice\u002Fir\u002F",{"key":61,"name":62,"sec_sub_list":63,"url":51},"item_009736ed-9cd2-4dde-ab32-7371617b1494","Solutions",[64],{"3rd_sub_list":65,"description":25,"key":74,"name":75,"url":51},[66,70],{"key":67,"name":68,"url":69},"item_7894e88b-5096-47d4-8faa-e2100ff60c5d","Threat Hunting Case 1","https:\u002F\u002Fteamt5.org\u002Fen\u002Fposts\u002Fextend-threat-hunting-services-to-overseas-bases-by-itochu-csirt\u002F",{"key":71,"name":72,"url":73},"item_15913399-2c53-42a3-a493-3e30dde56829","Threat Hunting Case 2","https:\u002F\u002Fteamt5.org\u002Fen\u002Fposts\u002Fteamt5-s-threat-sonar-enhances-ctc-mss-s-incident-handling-service-with-advanced-threat-hunting-capabilities\u002F","item_166a1420-1fd8-45c6-a82e-722eae095b0c","By Use Case",{"key":77,"name":78,"sec_sub_list":19,"url":79},"item_3cbf0b18-15b8-45a8-8f10-88a923c1567e","Why TeamT5","https:\u002F\u002Fteamt5.org\u002Fen\u002Fabout-us\u002F",{"key":81,"name":82,"sec_sub_list":19,"url":83},"item_df950d76-e51c-44f2-b539-b0c77f3a206d","Resources","https:\u002F\u002Fteamt5.org\u002Fen\u002Fblog\u002F",{"key":85,"name":86,"sec_sub_list":19,"url":87},"item_7ba57673-d409-4010-a566-5b18ebbfe911","Partners","https:\u002F\u002Fteamt5.org\u002Fen\u002Fpartners\u002F",{"icon":89,"post_meta":91,"seo":95,"show_default_fields":97},{"icon":90},"build",{"id":92,"name":93,"prefix":94},"header","網站選單設定","https:\u002F\u002Ftest.com\u002Fworks\u002F",{"og_description":51,"og_image":96,"og_title":51},[],{"display_fields":98},true,{"article":100,"aside":205},{"default":101,"footer":102,"other_info":131},{"slug":51,"title":51},{"list":103},[104,115,121],{"key":105,"sub_list":106,"title":114},"item_fb74ae30-b276-4523-8f79-741eb8a7dcd5",[107,111],{"is_external":51,"key":108,"name":109,"url":110},"item_7a9ec0e5-00cb-48ca-8f65-22552742ed2c","Careers","https:\u002F\u002Fteamt5.org\u002Fen\u002Fcareers\u002F",{"is_external":51,"key":112,"name":113,"url":12},"item_4fdfd21b-f10f-4cef-863e-ec53faf6e75f","Contact Us","About us",{"key":116,"sub_list":117,"title":86},"item_75614ea0-0935-405e-99e0-c04893deaf1e",[118],{"is_external":51,"key":119,"name":120,"url":87},"item_08d8429d-b7db-4d54-b2b7-c059559d52cb","Distribution Partner",{"key":122,"sub_list":123,"title":130},"item_c62b323b-872e-4d58-ba2b-2c56bd840beb",[124],{"is_external":125,"key":127,"name":128,"url":129},{"true":126},false,"item_2cd4c922-ddfb-4eb5-84f1-51dbf4b2a872","Vulnerability Disclosure","https:\u002F\u002Fteamt5.org\u002Fen\u002Fvulnerability-disclosure\u002F","Support",{"cert_img":132,"copyright":143,"email_content":144,"legal_list":147,"social_list":159},[133],{"_id":134,"alt":51,"dimensions":135,"ext":136,"name":137,"path":138,"size":139,"thumbnail_path":140,"upload_time":141,"upload_user":142},"ISOimg.png","120x60",".png","ISOimg","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FISOimg.png",5341,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FISOimg.png","2026-04-17T11:15:17.277Z","developer","© 2026 TEAM T5, Inc. All Rights Reserved.",{"content":145,"title":146},"Get the latest information delivered to your inbox.","Stay connected",[148,152,156],{"is_external":51,"key":149,"name":150,"url":151},"item_e775a11d-05ce-4ebd-b14d-b9459d3fb854","User Agreement","https:\u002F\u002Fteamt5.org\u002Fen\u002Fterms-of-service\u002F",{"is_external":51,"key":153,"name":154,"url":155},"item_313056fb-dc9b-4275-8a9c-abc7f5a7f873","Privacy Policy","https:\u002F\u002Fteamt5.org\u002Fen\u002Fprivacy-and-cookies-policy\u002F",{"is_external":51,"key":157,"name":158,"url":155},"item_1b98f172-dcc8-4629-89cb-6737b86d8a4d","Cookies Policy",[160,172,183,194],{"icon_img":161,"key":170,"url":171},[162],{"_id":163,"alt":51,"dimensions":164,"ext":136,"name":165,"path":166,"size":167,"thumbnail_path":168,"upload_time":169,"upload_user":142},"in.png","28x28","in","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fin.png",571,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fin.png","2026-04-17T11:21:55.779Z","item_f41c823b-03c5-47bd-bac2-094d96736844","https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fteamt5\u002F",{"icon_img":173,"key":181,"url":182},[174],{"_id":175,"alt":51,"dimensions":164,"ext":136,"name":176,"path":177,"size":178,"thumbnail_path":179,"upload_time":180,"upload_user":142},"x.png","x","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fx.png",415,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fx.png","2026-04-17T11:21:55.776Z","item_f7ca5b3f-366c-4c1f-9bd1-7f3272091c47","https:\u002F\u002Fx.com\u002FTeamT5_Official",{"icon_img":184,"key":192,"url":193},[185],{"_id":186,"alt":51,"dimensions":164,"ext":136,"name":187,"path":188,"size":189,"thumbnail_path":190,"upload_time":191,"upload_user":142},"yt.png","yt","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fyt.png",408,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fyt.png","2026-04-17T11:21:55.781Z","item_06113b37-c207-4506-94ce-9070a52f3a8f","https:\u002F\u002Fwww.youtube.com\u002F@teamt5\u002Ffeatured",{"icon_img":195,"key":203,"url":204},[196],{"_id":197,"alt":51,"dimensions":164,"ext":136,"name":198,"path":199,"size":200,"thumbnail_path":201,"upload_time":202,"upload_user":142},"mail.png","mail","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fmail.png",382,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fmail.png","2026-04-17T11:21:55.784Z","item_cfbb487f-fac1-4647-818c-27197c347431","mailto: contact@teamt5.org",{"icon":206,"post_meta":207,"seo":211,"show_default_fields":213},{"icon":51},{"id":208,"name":209,"prefix":210},"footer","網站頁尾設定","https:\u002F\u002Fteamt5.org\u002F__\u002F",{"og_description":51,"og_image":212,"og_title":51},[],{"display_fields":214},{"hide_default_fields":98},{"left":216,"top":216,"width":217,"height":217,"rotate":216,"vFlip":126,"hFlip":126,"body":218},0,24,"\u003Cg fill=\"none\">\u003Cmask id=\"mask0_203_143\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"24\" height=\"24\">\n\u003Crect width=\"24\" height=\"24\" fill=\"#D9D9D9\"\u002F>\n\u003C\u002Fmask>\n\u003Cg mask=\"url(#mask0_203_143)\">\n\u003Cpath d=\"M19.4846 20.154L13.2231 13.8925C12.7231 14.3182 12.1481 14.6477 11.4981 14.881C10.8481 15.1144 10.1949 15.231 9.53861 15.231C7.93995 15.231 6.58511 14.6756 5.47411 13.5648C4.36328 12.4538 3.80786 11.0989 3.80786 9.50028C3.80786 7.90161 4.36328 6.54678 5.47411 5.43578C6.58511 4.32495 7.93995 3.76953 9.53861 3.76953C11.1373 3.76953 12.4921 4.32495 13.6031 5.43578C14.7139 6.54678 15.2694 7.90161 15.2694 9.50028C15.2694 10.1951 15.1463 10.8675 14.9001 11.5175C14.6539 12.1675 14.3309 12.7233 13.9309 13.1848L20.1924 19.4465L19.4846 20.154ZM9.53861 14.231C10.8654 14.231 11.9856 13.7743 12.8991 12.8608C13.8126 11.9474 14.2694 10.8273 14.2694 9.50028C14.2694 8.17328 13.8126 7.05311 12.8991 6.13978C11.9856 5.22628 10.8654 4.76953 9.53861 4.76953C8.21161 4.76953 7.09144 5.22628 6.17811 6.13978C5.26461 7.05311 4.80786 8.17328 4.80786 9.50028C4.80786 10.8273 5.26461 11.9474 6.17811 12.8608C7.09144 13.7743 8.21161 14.231 9.53861 14.231Z\" fill=\"#C6D1E3\"\u002F>\n\u003C\u002Fg>\u003C\u002Fg>",{"left":216,"top":216,"width":217,"height":217,"rotate":216,"vFlip":126,"hFlip":126,"body":220},"\u003Cg fill=\"none\">\u003Cmask id=\"a\" width=\"24\" height=\"24\" x=\"0\" y=\"0\" maskUnits=\"userSpaceOnUse\" style=\"mask-type:alpha\">\u003Cpath fill=\"#d9d9d9\" d=\"M0 0h24v24H0z\"\u002F>\u003C\u002Fmask>\u003Cg mask=\"url(#a)\">\u003Cpath fill=\"#c6d1e3\" d=\"M12 14.708 6.692 9.4l.708-.708 4.6 4.6 4.6-4.6.708.708z\"\u002F>\u003C\u002Fg>\u003C\u002Fg>",{"left":216,"top":216,"width":222,"height":223,"rotate":216,"vFlip":126,"hFlip":126,"body":224},21,20,"\u003Cdefs>\u003CclipPath id=\"clip0_3233_4975\">\n\u003Crect width=\"20\" height=\"20\" fill=\"white\" transform=\"translate(20.5) rotate(90)\"\u002F>\n\u003C\u002FclipPath>\u003C\u002Fdefs>\u003Cg fill=\"none\">\u003Cg clip-path=\"url(#clip0_3233_4975)\">\n\u003Cpath d=\"M17.1665 10.0002L15.9915 8.82516L11.3332 13.4752L11.3332 3.3335L9.6665 3.3335L9.6665 13.4752L5.00817 8.82516L3.83317 10.0002L10.4998 16.6668L17.1665 10.0002Z\" fill=\"#323232\"\u002F>\n\u003C\u002Fg>\u003C\u002Fg>",{"left":216,"top":216,"width":217,"height":217,"rotate":216,"vFlip":126,"hFlip":126,"body":226},"\u003Cg fill=\"none\">\u003Cmask id=\"mask0_203_150\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"24\" height=\"24\">\n\u003Crect width=\"24\" height=\"24\" fill=\"#D9D9D9\"\u002F>\n\u003C\u002Fmask>\n\u003Cg mask=\"url(#mask0_203_150)\">\n\u003Cpath d=\"M8.5 20.2895C7.40517 19.8157 6.45167 19.1727 5.6395 18.3605C4.82733 17.5483 4.18433 16.5948 3.7105 15.5C3.23683 14.4052 3 13.2375 3 11.997C3 10.7567 3.23683 9.59 3.7105 8.497C4.18433 7.40417 4.82733 6.45167 5.6395 5.6395C6.45167 4.82733 7.40517 4.18433 8.5 3.7105C9.59483 3.23683 10.7625 3 12.003 3C13.2433 3 14.41 3.23683 15.503 3.7105C16.5958 4.18433 17.5483 4.82733 18.3605 5.6395C19.1727 6.45167 19.8157 7.40417 20.2895 8.497C20.7632 9.59 21 10.7567 21 11.997C21 13.2375 20.7632 14.4052 20.2895 15.5C19.8157 16.5948 19.1727 17.5483 18.3605 18.3605C17.5483 19.1727 16.5958 19.8157 15.503 20.2895C14.41 20.7632 13.2433 21 12.003 21C10.7625 21 9.59483 20.7632 8.5 20.2895ZM12 20.0077C12.5872 19.2539 13.0712 18.5135 13.452 17.7865C13.8327 17.0597 14.1423 16.2463 14.3807 15.3463H9.61925C9.88342 16.2974 10.1994 17.1365 10.5673 17.8635C10.9353 18.5903 11.4128 19.3051 12 20.0077ZM10.727 19.8577C10.2603 19.3078 9.83433 18.6279 9.449 17.8182C9.06383 17.0086 8.777 16.1846 8.5885 15.3463H4.75375C5.32692 16.5898 6.13942 17.6096 7.19125 18.4057C8.24325 19.2019 9.42183 19.6859 10.727 19.8577ZM13.273 19.8577C14.5782 19.6859 15.7567 19.2019 16.8087 18.4057C17.8606 17.6096 18.6731 16.5898 19.2463 15.3463H15.4115C15.159 16.1974 14.8401 17.0278 14.4548 17.8375C14.0696 18.6472 13.6757 19.3206 13.273 19.8577ZM4.34625 14.3463H8.38075C8.30508 13.9359 8.25158 13.5362 8.22025 13.147C8.18875 12.758 8.173 12.3757 8.173 12C8.173 11.6243 8.18875 11.242 8.22025 10.853C8.25158 10.4638 8.30508 10.0641 8.38075 9.65375H4.34625C4.23725 9.99992 4.15225 10.3772 4.09125 10.7855C4.03042 11.1938 4 11.5987 4 12C4 12.4013 4.03042 12.8062 4.09125 13.2145C4.15225 13.6228 4.23725 14.0001 4.34625 14.3463ZM9.38075 14.3463H14.6193C14.6949 13.9359 14.7484 13.5426 14.7797 13.1663C14.8112 12.7901 14.827 12.4013 14.827 12C14.827 11.5987 14.8112 11.2099 14.7797 10.8337C14.7484 10.4574 14.6949 10.0641 14.6193 9.65375H9.38075C9.30508 10.0641 9.25158 10.4574 9.22025 10.8337C9.18875 11.2099 9.173 11.5987 9.173 12C9.173 12.4013 9.18875 12.7901 9.22025 13.1663C9.25158 13.5426 9.30508 13.9359 9.38075 14.3463ZM15.6193 14.3463H19.6538C19.7628 14.0001 19.8477 13.6228 19.9088 13.2145C19.9696 12.8062 20 12.4013 20 12C20 11.5987 19.9696 11.1938 19.9088 10.7855C19.8477 10.3772 19.7628 9.99992 19.6538 9.65375H15.6193C15.6949 10.0641 15.7484 10.4638 15.7797 10.853C15.8112 11.242 15.827 11.6243 15.827 12C15.827 12.3757 15.8112 12.758 15.7797 13.147C15.7484 13.5362 15.6949 13.9359 15.6193 14.3463ZM15.4115 8.65375H19.2463C18.6602 7.38458 17.8573 6.36475 16.8375 5.59425C15.8177 4.82375 14.6295 4.33333 13.273 4.123C13.7397 4.73717 14.1593 5.43942 14.5318 6.22975C14.9043 7.02025 15.1975 7.82825 15.4115 8.65375ZM9.61925 8.65375H14.3807C14.1166 7.71542 13.7909 6.86675 13.4038 6.10775C13.0166 5.34875 12.5487 4.64358 12 3.99225C11.4513 4.64358 10.9834 5.34875 10.5963 6.10775C10.2091 6.86675 9.88342 7.71542 9.61925 8.65375ZM4.75375 8.65375H8.5885C8.8025 7.82825 9.09575 7.02025 9.46825 6.22975C9.84075 5.43942 10.2603 4.73717 10.727 4.123C9.35767 4.33333 8.16633 4.82692 7.153 5.60375C6.1395 6.38075 5.33975 7.39742 4.75375 8.65375Z\" fill=\"#C6D1E3\"\u002F>\n\u003C\u002Fg>\u003C\u002Fg>",{"awards_section":228,"blog_section":270,"default":275,"features_section":276,"hero_section":318,"intro_section":340,"products_section":352,"stats_section":413,"stories_section":434,"video_cta_section":467},{"awards_list":229,"description":268,"title":269},[230,244,256],{"description":231,"img":232,"key":242,"title":243},"ThreatSonar Anti-Ransomware solution is awarded 2024 Computex Best Choice Award - Golden Award",[233],{"_id":234,"alt":51,"dimensions":235,"ext":236,"name":237,"path":238,"size":239,"thumbnail_path":240,"upload_time":241,"upload_user":142},"image 11.jpg","95x95",".jpg","image 11","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fimage 11.jpg",17552,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fimage 11.jpg","2026-04-11T15:04:01.997Z","award_6c749ed2-20ee-4f10-b6cf-5703122160bd","Best Choice Award",{"description":245,"img":246,"key":254,"title":255},"ThreatSonar Anti-Ransomware and ThreatVision solution is awarded 2026 Taiwan Excellence Award",[247],{"_id":248,"alt":51,"dimensions":235,"ext":236,"name":249,"path":250,"size":251,"thumbnail_path":252,"upload_time":253,"upload_user":142},"image 12.jpg","image 12","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fimage 12.jpg",11361,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fimage 12.jpg","2026-04-11T15:04:02Z","award_8809f233-3a1c-4e94-8719-578e0fd5a5bc","Taiwan Excellence Award",{"description":257,"img":258,"key":266,"title":267},"TeamT5 Named as Taiwanese Threat Intelligence Company of the Year by Frost & Sullivan",[259],{"_id":260,"alt":51,"dimensions":235,"ext":236,"name":261,"path":262,"size":263,"thumbnail_path":264,"upload_time":265,"upload_user":142},"image 13.jpg","image 13","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fimage 13.jpg",11964,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Fimage 13.jpg","2026-04-11T15:04:02.003Z","award_2dfd6bdd-85c1-4654-92e0-33a5514793d2","Frost & Sullivan Recognition","Award-winning cybersecurity innovation recognized by global experts and international industry standards.","Industry Recognition & Global Trust",{"btn":271,"description":273,"title":274},{"text":272,"url":83},"More","Access expert perspectives, threat intelligence updates, and in-depth research to better understand today’s cyber threat landscape.","Discover the latest threat  trends in Asia Pacific",{"slug":51,"title":51},{"features_list":277},[278,291,304],{"description":279,"img":280,"key":289,"title":290},"TeamT5 turns threat intelligence into actionable security, helping organizations detect threats earlier, respond faster, and strengthen cyber resilience",[281],{"_id":282,"alt":51,"dimensions":283,"ext":236,"name":284,"path":285,"size":286,"thumbnail_path":287,"upload_time":288,"upload_user":142},"Frame 1010106922.jpg","761x550","Frame 1010106922","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010106922.jpg",96858,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010106922.jpg","2026-04-11T15:01:10.948Z","features_418e4c5e-cc1c-408e-9c2d-9482f1739620","Intelligence that Powers Proactive Defense",{"description":292,"img":293,"key":302,"title":303},"Unique intelligence on Asia-Pacific threat actors and campaigns to help organizations defend against targeted attacks.",[294],{"_id":295,"alt":51,"dimensions":296,"ext":236,"name":297,"path":298,"size":299,"thumbnail_path":300,"upload_time":301,"upload_user":142},"Frame 1010106889.jpg","300x200","Frame 1010106889","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010106889.jpg",56717,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010106889.jpg","2026-04-11T15:06:06.697Z","features_7ad251de-658a-49a8-a450-a84f3d06d043","Unmatched Asia-Pacific threat insights",{"description":305,"img":306,"key":316,"title":317},"In-depth research on cyber espionage and APTs, exposing attacker tactics to counter advanced threats.",[307],{"_id":308,"alt":51,"dimensions":309,"ext":236,"name":310,"path":311,"size":312,"thumbnail_path":313,"upload_time":314,"upload_user":315},"(可使用) getty-images-4OkY858eLVI-unsplash.jpg","3840x2160","(可使用) getty-images-4OkY858eLVI-unsplash","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002F(可使用) getty-images-4OkY858eLVI-unsplash.jpg",1095570,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002F(可使用) getty-images-4OkY858eLVI-unsplash.jpg","2026-04-20T06:00:36.787Z","teamt5","features_5ac6f317-c511-4fac-97a5-951aea5b72b6","Deep expertise in advanced threats",{"hero":319,"slides":323},{"btn":320,"description":321,"title":322},{"URL":12,"text":113},"Where threat intelligence meets decisive action. TeamT5 provides the visibility organizations need to minimize exposure and master cyber preparedness.","Threat Intelligence Pioneer, Born in Asia",[324],{"btn":325,"description":328,"img":329,"key":338,"title":339},{"text":326,"url":327},"Read Now","https:\u002F\u002Fteamt5.org\u002Fen\u002Fposts\u002Fapt-threat-landscape-in-apac-2025-industrialization-of-intrusions\u002F","With geopolitical tensions continuing to escalate across the APAC region, APT activities in the region are intensifying in both volume and sophistication. ",[330],{"_id":331,"alt":51,"dimensions":332,"ext":236,"name":333,"path":334,"size":335,"thumbnail_path":336,"upload_time":337,"upload_user":142},"test-2.jpg","937x680","test-2","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Ftest-2.jpg",817910,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Ftest-2.jpg","2026-04-29T08:10:12.331Z","slide_item_9c31f482-5436-4107-beed-e80b96f5b69d","APT Threat Landscape in APAC 2025: Industrialization of Intrusions",{"bg_img":341,"btn":350,"display_title":78,"title":351},[342],{"_id":343,"alt":51,"dimensions":344,"ext":236,"name":345,"path":346,"size":347,"thumbnail_path":348,"upload_time":349,"upload_user":142},"test4.jpg","1980x1076","test4","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Ftest4.jpg",547911,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Ftest4.jpg","2026-04-29T08:15:26.587Z",{"text":272,"url":79},"Stay ahead of attackers with intelligence-driven cybersecurity from TeamT5",{"products_list":353,"title":412},[354,370,384,398],{"btn":355,"description":358,"img":359,"key":368,"title":369},{"text":356,"url":357},"See how it works","https:\u002F\u002Fhome.teamt5.org\u002Fen\u002Fthreatvision","ThreatVision delivers deep insights into APAC threat actors, their behavior patterns and attack techniques. Empower your team with intelligence that helps understand adversaries, anticipate attacks, and prepare in advance.",[360],{"_id":361,"alt":51,"dimensions":362,"ext":236,"name":363,"path":364,"size":365,"thumbnail_path":366,"upload_time":367,"upload_user":142},"Frame 1010107594.jpg","538x383","Frame 1010107594","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010107594.jpg",267082,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010107594.jpg","2026-04-11T15:02:38.806Z","products_9174bf4e-13ef-4a5f-a507-7d090517bd40","Turn global threat into actionable defense",{"btn":371,"description":373,"img":374,"key":382,"title":383},{"text":356,"url":372},"https:\u002F\u002Fhome.teamt5.org\u002Fen\u002Fthreatsonar","ThreatSonar proactively hunts hidden intruders using intelligence-driven endpoint forensics, enabling organizations to detect suspicious activity, uncover root causes, and stop threats early.",[375],{"_id":376,"alt":51,"dimensions":362,"ext":236,"name":377,"path":378,"size":379,"thumbnail_path":380,"upload_time":381,"upload_user":142},"Frame 1010107596.jpg","Frame 1010107596","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010107596.jpg",269327,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010107596.jpg","2026-04-11T15:02:38.889Z","products_b31eed0a-d02e-49af-bdbe-b3d5502ed3ba","Proactively Hunt for Advanced Threats",{"btn":385,"description":387,"img":388,"key":396,"title":397},{"text":356,"url":386},"https:\u002F\u002Fhome.teamt5.org\u002Fen\u002Fthreatsonar-plus","Quickly discover assets, detect vulnerabilities, and prioritize remediation. With intelligence-driven risk assessment, it enables faster mitigation of critical exposures and strengthens overall cyber resilience.",[389],{"_id":390,"alt":51,"dimensions":362,"ext":236,"name":391,"path":392,"size":393,"thumbnail_path":394,"upload_time":395,"upload_user":142},"Frame 1010107595.jpg","Frame 1010107595","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010107595.jpg",266139,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010107595.jpg","2026-04-11T15:02:38.846Z","products_c8a3d311-b224-4bc5-ba31-341177cf0a1a","Comprehensive Endpoint Risk Assessment",{"btn":399,"description":401,"img":402,"key":410,"title":411},{"text":356,"url":400},"https:\u002F\u002Fhome.teamt5.org\u002Fen\u002Fthreatsonar-anti-ransomware","Stop ransomware instantly. ThreatSonar Anti-Ransomware delivers precise detection and real-time response to block lateral movement and encryption.",[403],{"_id":404,"alt":51,"dimensions":362,"ext":236,"name":405,"path":406,"size":407,"thumbnail_path":408,"upload_time":409,"upload_user":142},"Frame 1010107593.jpg","Frame 1010107593","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010107593.jpg",284184,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010107593.jpg","2026-04-11T15:02:38.76Z","products_9455495c-6861-42b6-bea4-21357af4bf3f","Defense-in-Depth for Advanced Threat Protection","Discover how TeamT5 transforms threat intelligence into powerful defense for your organization.",{"btn":414,"description":416,"stats_list":417,"title":433},{"text":272,"url":415},"https:\u002F\u002Fteamt5.org\u002Fen\u002F","Act faster. Stop threats before they impact the business.",[418,423,428],{"description":419,"key":420,"unit":421,"value":422},"Tracking advanced cyber threats and nation-state activities across APAC.","stat_452c6ff7-dcf8-4831-9551-40772a16a91d","years","20",{"description":424,"key":425,"unit":426,"value":427},"Analyze threats to identify emerging risks.","stat_a20a7c93-5ef6-4dde-9e13-061c90e165ae","malware families","3100",{"description":429,"key":430,"unit":431,"value":432},"Continuously tracking APT groups and their evolving tactics.","stat_98d49810-6c8f-4c90-abf7-d564945f5646","APT groups monitored","300","Turning threat intelligence into decisive action",{"description":435,"stories_list":436,"title":466},"Learn how TeamT5 helps 500+ organizations identify critical threats and respond with greater speed and confidence",[437,452],{"description":438,"icon":439,"img":448,"key":450,"title":451,"url":69},"Macnica’s ‘Mpression Service’ powers expert threat hunting with TeamT5 ThreatSonar, combining forensic precision with intelligence for superior detection.",[440],{"_id":441,"alt":51,"dimensions":442,"ext":136,"name":443,"path":444,"size":445,"thumbnail_path":446,"upload_time":447,"upload_user":142},"icon.png","36x36","icon","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Ficon.png",738,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Ficon.png","2026-04-11T15:05:52.948Z",[449],{"_id":282,"alt":51,"dimensions":283,"ext":236,"name":284,"path":285,"size":286,"thumbnail_path":287,"upload_time":288,"upload_user":142},"story_41f88e56-7f81-43cc-a044-8263bb911729","Extend threat hunting services to overseas bases",{"description":453,"icon":454,"img":462,"key":464,"title":465,"url":73},"Accelerate investigations with ThreatSonar. Featuring thousands of built-in APT signatures, our platform provides the deep endpoint visibility needed to uncover hidden threats instantly.",[455],{"_id":456,"alt":51,"dimensions":442,"ext":136,"name":457,"path":458,"size":459,"thumbnail_path":460,"upload_time":461,"upload_user":142},"icon-2.png","icon-2","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Ficon-2.png",960,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002Ficon-2.png","2026-04-11T15:05:52.943Z",[463],{"_id":295,"alt":51,"dimensions":296,"ext":236,"name":297,"path":298,"size":299,"thumbnail_path":300,"upload_time":301,"upload_user":142},"story_91a2fead-bad5-416e-826d-8307f5def1ef","Enhances incident handling service with advanced threat hunting capabilities","Security that delivers results",{"btn":468,"img":470,"title":480},{"text":469,"url":12},"Contact us",[471],{"_id":472,"alt":51,"dimensions":473,"ext":236,"name":474,"path":475,"size":476,"thumbnail_path":477,"upload_time":478,"upload_user":479},"Frame 1010107777.jpg","1980x600","Frame 1010107777","https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002FFrame 1010107777.jpg",1228994,"https:\u002F\u002Fteamt5-back.e-s.tw\u002Fapi\u002Ffiles\u002Fthumbnails\u002FFrame 1010107777.jpg","2026-04-20T10:27:17.308Z","eseditor","Stay ahead of cyber threats with TeamT5."]