# Wayne Huang, PhD

[LinkedIn](https://www.linkedin.com/in/armorizewayne/) | [Twitter](https://twitter.com/waynehuang) | [Telegram](https://t.me/huangwayne) | [Linktree](https://linktr.ee/huangwayne) | [GoodReads](https://www.goodreads.com/user/show/101044659-wayne-huang)

## ABOUT

Dr. Wayne Huang 黃耀文博士 is a Co-Founder and Board Member of Unitas Foundation. He is also the Co-Founder and Group CEO of [XREX](https://xrex.io/) Inc.

Wayne is an internationally-recognized cybersecurity expert instrumental in developing innovative blockchain-based solutions currently used in several emerging markets.\
\
Before XREX, Wayne served as VP Engineering to [Proofpoint](https://www.proofpoint.com/us) (NASDAQ: PFPT), where he spent five years building and growing TAP (Targeted Attack Protection) from 0 to $400M+ in ARR (annual recurring revenue), servicing 9 of the top 10 US banks, and 56 of Fortune 100.\
\
Prior to Proofpoint, Wayne was Co-Founder and CEO of Armorize Technologies, which was acquired by Proofpoint in 2013.\
\
A diligent blogger about cyber threats, Wayne’s cybersecurity research has received worldwide media coverage, including reports in Reuters, Forbes, IDG, USA Today, Wired, Dark Reading, The Register, The Hacker News, SC Magazine, eWeek, Threat Post, CSO, and Krebs on Security.

Wayne first-authored 5 well-cited, peer-reviewed papers published by ACM and IEEE, and 3 US-issued patents.\
\
Wayne received a Ph.D. in Electrical Engineering, Computer Science Group from National Taiwan University, and a BS and an MS in Computer Science from National Chiao Tung University.\
\
In his spare time, Wayne enjoys mountaineering, trekking, and studying history and economics.

## EXPERIENCE

* **Unitas Foundation**\
  Aug 2022 - present\
  **Co-Founder & Board Member**<br>
* **XREX**

  Aug 2018 - present | Taipei

  **Co-Founder & CEO**\
  \
  [XREX](https://xrex.io/) is a blockchain-enabled financial institution working with banks, regulators, and users to redefine banking together. We provide enterprise-grade banking services to small to medium-sized businesses (SMBs) in or dealing with emerging markets, and novice-friendly financial services to individuals worldwide.<br>

  Founded in 2018 and operating a Monetary Authority of Singapore's Major Payment Institution license and a Taiwan Financial Supervisory Commission's Registered VASP status, XREX offers a full suite of services such as digital asset custody, wallet, cross-border payment, fiat-crypto conversion, cryptocurrency exchange, asset management, and fiat currency on-off ramps.

  XREX is backed by public companies, banks, and prominent VCs, including:

  * Taiwan National Development Fund
  * Tether
  * SBI Investment (TYO:8473)
  * CDIB Capital Group (TWSE:2883)
  * E.Sun Financial Holding (TWSE:2884)
  * ThreeD Capital (CSE:IDK)
  * Systex (TWSE:6214)
  * Global Founders Capital
  * Metaplanet Holdings
  * Seraph Group
  * AppWorks
  * WI Harper Group
  * Black Marble Capital Management
  * New Economy Ventures
  * BitoEx
  * Toivo Annus<br>
* **Proofpoint (NASDAQ: PFPT)**\
  Aug 2013 - Jun 2018 | Sunnyvale CA

  **VP Engineering**

  \
  [Proofpoint](https://www.proofpoint.com/us) is a leading cybersecurity company that provides the most effective cybersecurity and compliance solutions to protect people on every channel, including email, the web, the cloud, social media, and mobile messaging.<br>
* **Armorize Technologies**

  Jan 2006 - Aug 2013 | San Francisco & Taipei

  **Co-Founder & CEO / CTO**

  Armorize Technologies (acquired by Proofpoint (NASDAQ: PFPT)) is a leading cybersecurity company offering Web application security and malware detection solutions. Armorize specializes in the detection and prevention of advanced, targeted threats.<br>
* [**Institute of Information Science**](https://www.iis.sinica.edu.tw/en/index.html)**, Academia Sinica**

  1999 - 2005 | Taipei

  **Research Engineer**

  As a part of a 4-year mandatory military service term.

  &#x20;

  Researched and developed defense technologies against advanced persistent threats (APTs) against Taiwan's government, military, and intelligence infrastructure.

  &#x20;

  First-authored multiple peer-reviewed papers that each has 750+ citations according to Google Scholar. Acquired 2 US patents.

## EDUCATION

* **National Taiwan University NTU**\
  2004 - 2012\
  Ph.D., Electrical Engineering, Computer Science Group\
  First-authored multiple peer-reviewed cybersecurity papers that each have 750+ citations according to Google Scholar.
* **National Chiao-Tung University NCTU**\
  1997 - 1999\
  Master, Computer Science
* **National Chiao-Tung University NCTU**\
  1993 - 1997\
  Bachelor, Computer Science

## KEYNOTES

Wayne frequently speaks at cybersecurity and blockchain conferences, including Chain-in 2018, BLOCKConscious Summit 2018, SecTor 2018, Blockchain Technology Conference 2018, Swiss Cyber Storm 2018, BlackHat US 2010, BlackHat APAC 2017, DEFCON 2010, RSA USA 2007, 2010, 2015, 2016, RSA APAC 2015, Hack in Paris 2017, Troopers 2016, AusCERT 2016, Virus Bulletin 2016, SteelCon 2016, Hack.lu 2016, HackFest 2016, SyScan Taiwan 2008, 2009, OWASP Asia 2007, 2008, Hacks in Taiwan 2006, 2007, WWW 2003, 2004, and PHP 2007.

## PAPERS & PATENTS

***First-authored, peer-reviewed academic papers***

* [**"Web application security assessment by fault injection and behavior monitoring."**](https://dl.acm.org/doi/abs/10.1145/775152.775174)\
  Yao-Wen (Wayne) Huang, Shih-Kun Huang, Tsung-Po Lin, Chung-Hung Tsai.\
  In Proceedings of the 2003 ACM International Conference on the World Wide Web, 2003, . pp. 148-159.
* [**"Securing web application code by static analysis and runtime protection."**](https://dl.acm.org/doi/abs/10.1145/988672.988679)\
  Yao-Wen (Wayne) Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai (D.T.) Lee, Sy-Yen Kuo.\
  In Proceedings of the 2004 ACM International Conference on the World Wide Web, 2004, . pp. 40-52.
* [**"Verifying Web Applications Using Bounded Model Checking."**](https://ieeexplore.ieee.org/abstract/document/1311890)\
  Yao-Wen (Wayne) Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai (D.T.) Lee, Sy-Yen Kuo.\
  In Proceedings of the IEEE 2004 International Conference on Dependable Systems and Networks (IEEE DSN 2004), pages 199-208, Florence, Italy, Jun 28-Jul 1, 2004.
* [**"Non-detrimental Web application security scanning."**](https://ieeexplore.ieee.org/document/1383120)\
  Yao-Wen (Wayne) Huang, Chung-Hung Tsai, Der-Tsai (D.T.) Lee, Sy-Yen Kuo.\
  In 15th IEEE International Symposium on Software Reliability Engineering (ISSRE 2004), Saint-Malo, France, Nov 2-5, 2004.
* [**"A testing framework for Web application security assessment."**](https://www.researchgate.net/publication/222822326_A_testing_framework_for_Web_application_security_assessment)\
  Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang, D.T. Lee, Sy-Yen Kuo.\
  Journal of Computer Networks 48(5), pp. 739-761, Feb 12, 2005.

***First-authored, US-issued patents***

* [**"System and method for securing web application code and verifying correctness of software."**](https://patents.google.com/patent/US8555269B2/)\
  Yao-Wen Huang, Fang Yu, Chung-Hung Tsai, Christian Hang, Der-Tsai Lee, Sy-Yen Kuo\
  US Patent 8555269, Issued Oct 3, 2013
* [**"System and method for securing web application code and verifying correctness of software."**](http://www.google.com/patents/US7779399)\
  Yao-Wen Huang, Fang Yu, Chung-Hung Tsai, Christian Hang, Der-Tsai Lee, Sy-Yen Kuo\
  US Patent 7779399, Issued Aug 17, 2010
* [**"Behavior profiling for malware detection."**](https://patents.google.com/patent/US10102372B2/)\
  Wayne Huang, M. James Idle\
  US Patent 10102372, Issued Oct 16, 2018

## STABLECOIN-RELATED POSTS

* BlockTempo, 2020 Nov 28\
  [Sovereignty and the Right of Coinage: How CBDC will infringe on weak regimes](https://blog.xrex.io/sovereignty-and-the-right-of-coinage-how-cbdc-will-infringe-on-weak-regimes-982d4a94601a)
* Forkast News, 2022 Mar 31\
  [Should Tether’s shrinking cash reserves be cause for investor worry?](https://forkast.news/should-tethers-shrinking-cash-reserves-investor-worry/)
* XREX Medium, 2022 May 19\
  [Stablecoins: A take on their reserves, transparency, regulatory and operational risks](https://blog.xrex.io/stablecoins-a-take-on-their-reserves-transparency-regulatory-and-operational-risks-ecf338becf4e)
* XREX Medium, 2022 Sep 21\
  [Could Stablecoin UST have revived from the death spiral? Insights from an algorithmic stablecoin’s depeg](https://blog.xrex.io/could-stablecoin-ust-have-revived-from-the-death-spiral-insights-from-an-algo-stablecoins-depeg-3508e08427b7)
* XREX Medium, 2022 Oct 6\
  [Three Dimensions of Decentralization: Stablecoin and DAO as Examples](https://blog.xrex.io/three-dimensions-of-decentralization-using-stablecoins-and-dao-as-examples-3c1841aa2850)

## BLOCKCHAIN AML-RELATED POSTS

* XREX Medium, 2020 Oct 15\
  [First suspicious Bitcoin transaction series detected](https://research.xrex.io/first-suspicious-transaction-series-detected-99fa691b2916)
* HackerNoon, 2020 Nov 7\
  [Exposing the Nigerian Crypto Scam Group - "Operation N-Fiverr"](https://hackernoon.com/exposing-the-nigerian-crypto-scam-group-operation-n-fiverr-0g163zey)

## CYBERSECURITY-RELATED COVERAGE

* Wired, 2010-12-10 by Kim Zetter\
  [Google DoubleClick Caught Serving Malicious Ad](https://www.wired.com/2010/12/doubleclick/)
* Forbes.com, 2010-08-16 by Andy Greenberg\
  [Record Five Million Sites Were Likely Infected By Hacked Web Widget](http://www.forbes.com/sites/andygreenberg/2010/08/16/record-five-million-sites-were-likely-infected-by-hacked-web-widget/)
* USA TODAY, 2011-08-11 by Byron Acohido\
  [Millions of Web pages are hacker landmines](http://usatoday30.usatoday.com/money/industries/technology/2011-08-11-mass-website-hacking_n.htm)
* The Verge, 2014-10-07 by Russel Brandom\
  [Inside a Russian malware scheme that hijacked 500,000 computers](https://www.theverge.com/2014/10/7/6937055/inside-a-russian-malware-scheme-that-owned-500000-computers)
* MIT Technology Review, 2014-10-15 by Mike Orcutt\
  [Windows XP Is Still a Favorite Among Hackers](https://www.technologyreview.com/2014/10/15/170946/windows-xp-is-still-a-favorite-among-hackers/)
* The Register, 2011-08-13 by Dan Goodin\
  [Attack targeting open-source web app keeps growing](http://www.theregister.co.uk/2011/08/13/oscommerce_infection_threatens_web/)
* The Register, 2011-08-02 by Dan Goodin\
  [Malware attack spreads to 5 million pages (and counting)](http://www.theregister.co.uk/2011/08/02/mass_injection_attack_goes_viral/)
* The Register, 2011-04-19 by John Leyden\
  [Flash cache exploit debuts in Amnesty attack](http://www.theregister.co.uk/2011/04/19/amnesty_drive_by_cache/)
* The Register, 2010-12-13 by Dan Goodin\
  [Ad networks owned by Google, Microsoft serve malware](http://www.theregister.co.uk/2010/12/13/doubleclick_msn_malware_attacks/)
* IDG News, 2010-12-11 by Robert McMillan\
  [Google, Microsoft Ad Networks Briefly Hit With Malware](http://www.pcworld.com/article/213336/ad_networks_hit_with_malware.html)
* IDG News, 2010-7-15 by Robert McMillan\
  [Talk on China Cyber Army pulled after pressure](https://www.computerworld.com/article/2519184/talk-on-china-cyber-army-pulled-after-pressure.html)
* IDG News, 2008-12-09 by Robert McMillan\
  [Update: New Web attack exploits unpatched IE flaw](https://www.infoworld.com/article/2654220/update--new-web-attack-exploits-unpatched-ie-flaw.html)
* IDG News, 2008-5-19 by Sumner Lemon\
  [Mass SQL Injection Attack Targets Chinese Web Sites](https://www.networkworld.com/article/2279668/mass-sql-injection-attack-targets-chinese-web-sites.html)
* IDG News, 2007-11-15 by Robert McMillan\
  [With Web 2.0, a New Breed of Malware Evolves](https://www.computerworld.com/article/2540133/with-web-2-0--a-new-breed-of-malware-evolves.html)
* BankInfoSecurity, 2014-10-9 by Mathew J. Schwartz\
  [Hackers Grab 800,000 Banking Credentials](https://www.bankinfosecurity.com/hackers-grab-800000-banking-credentials-a-7416)
* PYMNTS.com, 2014-10-10\
  [How Cyberthieves Were Able To Steal 500,000 Bank Credentials](https://www.pymnts.com/news/2014/how-cyberthieves-were-able-to-steal-500000-bank-credentials/)
* eWeek, 2010-12-10 by Brian Prince\
  [Google DoubleClick Found Serving Malicious Ad](https://www.eweek.com/security/google-doubleclick-found-serving-malicious-ad/)
* eWeek, 2010-08-16 by Brian Prince\
  [Infected Widget Compromises Parked Domains](http://www.eweek.com/c/a/Security/Infected-Widget-Compromises-Parked-Domains/)
* eWeek, 2009-09-22 by Jim Rapoza\
  [Live at DEMOfall 2009: Getting Secure and Getting Paid](https://www.eweek.com/reviews/live-at-demofall-2009-getting-secure-and-getting-paid/)
* CNET, 2011-09-26 by Elinor Mills\
  [Hacked MySQL.com used to serve Windows malware](http://news.cnet.com/8301-27080_3-20111943-245/hacked-mysql.com-used-to-serve-windows-malware/)
* CNET, 2010-05-26 by Elinor Mills\
  [Firms tackle virus-laden Web sites, ads](https://www.cnet.com/tech/services-and-software/firms-tackle-virus-laden-web-sites-ads/)
* Dark Reading, 2011-08-09 by Tim Wilson\
  ['Willysy' osCommerce Injection Attack Affects More Than 8 Million Pages](https://www.darkreading.com/risk/willysy-oscommerce-injection-attack-affects-more-than-8-million-pages/d/d-id/1136141)
* Dark Reading, 2010-08-18 by Mathew J. Schwartz\
  [Malware Spewing Widget Hacks 500,000 Websites](https://www.darkreading.com/attacks-breaches/malware-spewing-widget-hacks-500-000-websites)
* Dark Reading, 2010-08-17 by Kelly Jackson Higgins\
  [Mass Drive-By Attack Used Web Widget](https://www.darkreading.com/attacks-breaches/mass-drive-by-attack-used-web-widget)
* Threat Post, 2014-10-23 by Chris Brook\
  [Malvertising Campaign on Yahoo, AOL, Triggers CryptoWall Infections](https://threatpost.com/malvertising-campaign-on-yahoo-aol-triggers-cryptowall-infections/108987/)
* Threat Post, 2011-08-04 by Brian Donohue\
  [Massive Injection Campaign Affecting More Than Six Million Pages](https://threatpost.com/iframe-campaign-affecting-more-6-million-pages-080111/75497/)
* Threat Post, 2011-07-26 by Brian Donohue\
  [Massive iFrame Attack Hits More than 90,000 Pages](https://threatpost.com/massive-iframe-attack-hits-more-90000-pages-072611/75475/)
* ThreatPost, 2010-12-12 by Dennis Fisher\
  [Major Ad Networks Found Serving Malicious Ads](https://threatpost.com/major-ad-networks-found-serving-malicious-ads-121210/74765/)
* ThreatPost, 2010-08-16 by Paul Roberts\
  [Network Solutions Malicious Widget May Date to January](https://threatpost.com/network-solutions-malicious-widget-may-date-january-081610/74338/)
* Krebs on Security, 2011-08-05 by Brian Krebs\
  [Is That a Virus in Your Shopping Cart?](http://krebsonsecurity.com/2011/08/is-that-a-virus-in-your-shopping-cart/)
* KrebsOnSecurity, 2010-08-16 by Brian Krebs\
  [NetworkSolutions Sites Hacked By Wicked Widget](https://krebsonsecurity.com/2010/08/networksolutions-sites-hacked-by-wicked-widget/)
* Slashdot, 2010-08-16\
  [5 Million Domains Serving Malware Via Network Solutions](http://news.slashdot.org/story/10/08/16/214228/5-million-domains-serving-malware-via-network-solutions)
* Mashable, 2009-09-22 by Ben Parr\
  [HackAlert: Web Apps Finally Get Secure](http://mashable.com/2009/09/22/hackalert/)\
  Venture Beat, 2009-09-22 by Dean Takahashi\
  [DEMO: Armorize’s HackAlert notifies you if your web site is under attack](http://venturebeat.com/2009/09/22/demo-armorizes-hackalert-notifies-you-if-your-web-site-is-under-attack/)
* TechCrunch, 2009-06-16\
  [Armorize Lands More Funding For Web App Security Technology](http://techcrunch.com/2009/06/16/armorize-lands-more-funding-for-web-app-security-technology/)
* CSO, 2014-10-08 by Antone Gonsalves\
  [An inside look at Russian cybercriminals](https://www.csoonline.com/article/2692415/an-inside-look-at-russian-cybercriminals.html)
* CSO, 2011-07-28 by Ellen Messmer\
  [E-Commerce Sites Based on Open Source Code Under Attack](http://www.csoonline.com/article/686829/e-commerce-sites-based-on-open-source-code-under-attack)
* CSO, 2011-07-26 by Bill Brenner\
  [Drive-by download infects more than 90,000 sites, Armorize warns](https://www.csoonline.com/article/2134789/drive-by-download-infects-more-than-90-000-sites--armorize-warns.html)
* PC Magazine, 2011-08-08\
  [Millions of e-commerce Sites Hacked to Serve Malware](https://www.pcmag.com/archive/millions-of-e-commerce-sites-hacked-to-serve-malware-285986)
* PC Magazine, 2010-08-16\
  [Innocuous Network Solutions Web Widget Served Malware](http://www.pcmag.com/article2/0,2817,2367935,00.asp)
* SC Media, 2014-10-07\
  [Group infects more than 500K systems, targets banking credentials in U.S.](https://www.scmagazine.com/news/cybercrime/group-infects-more-than-500k-systems-targets-banking-credentials-in-u-s)
* SC Media, 2011-08-01\
  [Mass injection campaign affects 3.8 million pages](https://www.scmagazine.com/brief/malware/mass-injection-campaign-affects-3-8-million-pages)
* SC Media, 2010-08-16\
  [Up to five million parked domains served malware widget](https://www.scmagazine.com/news/malware/up-to-five-million-parked-domains-served-malware-widget)
* CRN, 2011-07-29 by Stefanie Hoffman\
  [iFrame Attack Infects More Than 300,000 osCommerce Sites](https://www.crn.com/news/security/231002947/iframe-attack-infects-more-than-300000-oscommerce-sites.htm)
* PCWorld, 2011-08-06 by John P. Mello Jr.\
  [Speedy Malware Infects More than 6 Million Web Pages](http://www.pcworld.com/article/237457/speedy_malware_infects_more_than_6_million_web_pages.html)
* ZDNet, 2014-10-07 by Toby Wolpe\
  [Windows XP: Still big in botnets after all these years?](https://www.zdnet.com/article/windows-xp-still-big-in-botnets-after-all-these-years/)
* ZDNet, 2011-07-28 by Dancho Danchev\
  [90,000+ pages compromised in mass iFrame injection attack](https://www.zdnet.com/article/90000-pages-compromised-in-mass-iframe-injection-attack/)
* ZDNet UK, 2010-08-17 by Elinor Mills\
  [Malicious widget attacks compromise parked domains](http://www.zdnet.com/news/malicious-widget-attacks-compromise-parked-domains/457014)
* Computerworld, 2010-08-16 by Gregg Keizer\
  [Malicious widget hacked millions of Web sites](http://www.computerworld.com/s/article/9180783/Malicious_widget_hacked_millions_of_Web_sites)
* InfoWorld, 2010-12-10 by Robert Lemos\
  [The DoubleClick attack and the rise of malvertising](https://www.infoworld.com/article/2625124/the-doubleclick-attack-and-the-rise-of-malvertising.html)
* InfoWorld, 2010-08-17 by Robert Lemos\
  [Network Solutions versus the wily widget](https://www.infoworld.com/article/2625910/network-solutions-versus-the-wily-widget.html)
* Help Net Security, 2010-08-18 by Zeljka Zorz\
  [Mass injection attack compromised 20,000+ domains, delivers fake AV](http://www.net-security.org/secworld.php?id=11481)
* Help Net Security, 2011-08-01 by Zeljka Zorz,\
  [Mass iFrame injection attack now counts millions of compromised web pages](https://www.helpnetsecurity.com/2011/08/01/mass-iframe-injection-attack-now-counts-millions-of-compromised-web-pages/)
* Help Net Security, 2011-07-26 by Zeljka Zorz,\
  [90,000+ web pages compromised through iFrame injection](https://www.helpnetsecurity.com/2011/07/26/90000-web-pages-compromised-through-iframe-injection/)
* Help Net Security, 2010-12-13 by Zeljka Zorz,\
  [Malware spread via Google, Microsoft ad network](https://www.helpnetsecurity.com/2010/12/13/malware-spread-via-google-microsoft-ad-network/)
* Softpedia, 2011-08-17 by Lucian Constantin\
  [New Mass Injection Attack Infects over 20K Websites](http://news.softpedia.com/news/New-Mass-Injection-Attack-Infects-over-20K-Websites-217168.shtml)
* Softpedia, 2011-08-01 by Lucian Constantin\
  [Number of osCommerce Infected Pages Raises to Millions in Under a Week](http://news.softpedia.com/news/Number-of-osCommerce-Infected-Pages-Raises-to-Millions-in-Under-a-Week-214414.shtml)
* Softpedia, 2010-12-11 by Lucian Constantin\
  [Drive-By Scareware Malvertizements Served by Large Ad Networks](http://news.softpedia.com/news/Drive-By-Scareware-Malvertizements-Served-by-Large-Ad-Networks-172031.shtml)
* SPAMfighter News, 2011-08-05\
  [Armorize Unleash Massive Iframe Injection Assault](http://www.spamfighter.com/News-16557-Armorize-Unleash-Massive-Iframe-Injection-Assault.htm)
* SPAMfighter News, 2014-10-14\
  [Proofpoint Discovers Russian Cyber-Crime Gang, Attacker of Over 500K PCs](http://www.spamfighter.com/News-19242-Proofpoint-Discovers-Russian-Cyber-Crime-Gang-Attacker-of-Over-500K-PCs.htm)
* SPAMfighter News, 2011-07-16\
  [Armorize Unleash Massive Iframe Injection Assault](http://www.spamfighter.com/News-16557-Armorize-Unleash-Massive-Iframe-Injection-Assault.htm)
* SPAMfighter News, 2010-08-21,\
  [Millions of Web Websites Hacked by Malicious Widget](http://www.spamfighter.com/News-14975-Millions-of-Web-Websites-Hacked-by-Malicious-Widget.htm)
* SPAMfighter News, 2010-06-07\
  [Around 1000 US Websites Serve Malware](http://www.spamfighter.com/News-14517-Around-1000-US-Websites-Serve-Malware.htm)
* The H, 2011-08-03\
  [Millions of osCommerce stores hacked](http://www.h-online.com/open/news/item/Millions-of-osCommerce-stores-hacked-1317410.html)
* The H, 2011-04-20\
  [Exploit on Amnesty pages tricks AV software](http://www.h-online.com/security/news/item/Exploit-on-Amnesty-pages-tricks-AV-software-1230724.html)
* HK Cert, 2011-08-02\
  [Mass Injection Attacks Targeting osCommerce Vulnerabilities](https://www.hkcert.org/my_url/en/alert/11080201)

## TALKS

(follow the links to watch talk videos)

* SecTor 2018, Toronto\
  [25 Techniques to Gather Threat Intel and Track Actors (with Sun Huang)](https://sector.ca/sessions/25-techniques-to-gather-threat-intel-and-track-actors/)
* BLOCKConscious 2018, Brisbane\
  [Hacking Blockchain for Fun and Real Profit (with Sun Huang)](https://www.youtube.com/watch?v=XMFMCjrGKsE)
* Chain-in 2018, Lisbon\
  [Hacking Blockchain for Fun and Real Profit (with Sun Huang)](https://www.youtube.com/watch?v=WbPtRiW1H0Q)
* Hack in Paris 2017, Paris\
  [25 Techniques to Gather Threat Intel & Track Actors (with Sun Huang)](https://www.youtube.com/watch?v=TgcqJqvEI-E)
* Black Hat APAC 2017, Singapore\
  [24 Techniques to Gather Threat Intel & Track Actors (with Sun Huang)](https://www.youtube.com/watch?v=beh5VUKc2EU)
* HackFest 2017, Quebec\
  [Unveiling One of the World’s Biggest and Oldest Cybercrime Gangs (with Sun Huang)](https://www.youtube.com/watch?v=iL9WpB6xvE8)
* Hack.lu 2016, Luxembourg\
  [Unveiling the Attack Chain of Russian-Speaking Cybercriminals (with Sun Huang)](https://www.youtube.com/watch?v=apOKU7j2XAY)
* SteelCon 2016, Sheffield, England\
  [Witness the Russian Attack: Live Demos of Their Steps, Tools, Techniques (with Sun Huang)](https://youtu.be/EHcHvTfHUMI)
* Virus Bulletin 2016, Denver\
  [Unveiling the Attack Chain of Russian-Speaking Cybercriminals](https://www.virusbulletin.com/conference/vb2016/abstracts/unveiling-attack-chain-russian-speaking-cybercriminals)
* Troopers 2016, Heidelberg\
  [Russian Attack: Live Demos of Their Steps, Tools, Techniques (with Sun Huang)](https://www.youtube.com/watch?v=wlAzRRIa2qw)
* RSA Conference 2016, San Francisco\
  Witness the Russian Attack: Live Demos of Their Steps, Tools, Techniques (with Sun Huang)
* RSA APAC & Japan Conference 2015, Singapore\
  New Ways of Emerging APT Actors: India, South Africa, Nigeria, and Indonesia (with Sun Huang)
* RSA Conference 2015, San Francisco\
  [Bitcoin’s Future Threats: Expert’s Roundtable based on 150 Case Studies (with Sun Huang)](https://medium.com/@wayne_huang/rsa-2015-panel-bitcoin-s-future-threats-expert-s-roundtable-based-on-150-case-studies-92cc35e68e30)
* DEF CON 2013, Las Vegas\
  [Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection (with Sun Huang)](https://www.youtube.com/watch?v=R0e6w0dOt-E)
