[{"data":1,"prerenderedAt":447},["ShallowReactive",2],{"getGlobalData":3,"getHomePageData":200},{"header":4,"footer":78},{"article":5,"aside":67},{"default":6,"header":9},{"slug":7,"title":8},"test","測試",{"cta_link":10,"list":13},{"name":11,"url":12},"Start Trial","https://holoface.e-s.tw/",[14,36,39,55,59,63],{"key":15,"name":16,"sec_sub_list":17,"url":23},"item_9f08648d-b439-4165-af32-40c1f8606856","Platforms",[18,24,28,32],{"3rd_sub_list":19,"description":20,"key":21,"name":22,"url":23},null,"Threat Forensic Analysis Platform","item_1c61aeb7-63df-4d3e-82c4-3db8b648ae38","ThreatSonar","",{"3rd_sub_list":19,"description":25,"key":26,"name":27,"url":23},"Intelligence Reports","item_4a409709-a6ba-4486-bf5d-b1397cd67df1","ThreatSonar Plus",{"3rd_sub_list":19,"description":29,"key":30,"name":31,"url":23},"Endpoint Detection & Response Platform","item_80652ac0-61aa-499b-90b1-57b22861fd00","ThreatSonar Anti-Ransomware",{"3rd_sub_list":19,"description":33,"key":34,"name":35,"url":23},"Threat Intelligence Platform","item_f9df2cc9-9235-4af9-a9d9-07668c8c3aab","ThreatVision",{"key":37,"name":38,"sec_sub_list":19,"url":12},"item_0a07ce84-4832-41d2-a64f-4f9115be30d6","Services",{"key":40,"name":41,"sec_sub_list":42,"url":23},"item_009736ed-9cd2-4dde-ab32-7371617b1494","Solutions",[43],{"3rd_sub_list":44,"description":25,"key":53,"name":54,"url":23},[45,49],{"key":46,"name":47,"url":48},"item_1fb90d70-ba49-43fc-8c5a-1f03f90c969b","Case 01","https://teamt5.org/en/posts/extend-threat-hunting-services-to-overseas-bases-by-itochu-csirt/",{"key":50,"name":51,"url":52},"item_e83b26fd-328e-446e-8ee0-fa034f420c96","Case 02","https://teamt5.org/en/posts/teamt5-s-threat-sonar-enhances-ctc-mss-s-incident-handling-service-with-advanced-threat-hunting-capabilities/","item_166a1420-1fd8-45c6-a82e-722eae095b0c","By Use Case",{"key":56,"name":57,"sec_sub_list":19,"url":58},"item_3cbf0b18-15b8-45a8-8f10-88a923c1567e","Why TeamT5","https://teamt5.org/en/about-us/",{"key":60,"name":61,"sec_sub_list":19,"url":62},"item_df950d76-e51c-44f2-b539-b0c77f3a206d","Resources","https://teamt5.org/en/blog/",{"key":64,"name":65,"sec_sub_list":19,"url":66},"item_7ba57673-d409-4010-a566-5b18ebbfe911","Partners","https://teamt5.org/en/partners/",{"icon":68,"post_meta":70,"seo":74,"show_default_fields":76},{"icon":69},"build",{"id":71,"name":72,"prefix":73},"header","網站選單設定","https://test.com/works/",{"og_description":23,"og_image":75,"og_title":23},[],{"display_fields":77},true,{"article":79,"aside":190},{"default":80,"footer":81,"other_info":122},{"slug":23,"title":23},{"list":82},[83,101,110],{"key":84,"sub_list":85,"title":100},"item_fb74ae30-b276-4523-8f79-741eb8a7dcd5",[86,90,94,97],{"is_external":23,"key":87,"name":88,"url":89},"item_7a9ec0e5-00cb-48ca-8f65-22552742ed2c","Careers","https://teamt5.org/tw/",{"is_external":91,"key":92,"name":93,"url":89},{"true":77},"item_fd182ae3-2108-4999-8e5e-e9879152846e","Investors",{"is_external":23,"key":95,"name":96,"url":89},"item_40ffd865-29b1-461e-9696-ed49c7ddcf15","Media Kits",{"is_external":23,"key":98,"name":99,"url":89},"item_4fdfd21b-f10f-4cef-863e-ec53faf6e75f","Contact Us","About us",{"key":102,"sub_list":103,"title":65},"item_75614ea0-0935-405e-99e0-c04893deaf1e",[104,107],{"is_external":23,"key":105,"name":106,"url":89},"item_969a247b-cea5-4d41-a571-1220ce72cc81","Technical Partner",{"is_external":23,"key":108,"name":109,"url":89},"item_08d8429d-b7db-4d54-b2b7-c059559d52cb","Distribution Partner",{"key":111,"sub_list":112,"title":121},"item_c62b323b-872e-4d58-ba2b-2c56bd840beb",[113,117],{"is_external":114,"key":115,"name":116,"url":89},{"true":77},"item_2cd4c922-ddfb-4eb5-84f1-51dbf4b2a872","Vulnerability Notification​",{"is_external":118,"key":119,"name":120,"url":89},{"true":77},"item_c57d1737-9b7c-48b4-b9f3-52065a23d1a0","Vulnerability News Bulletin","Support",{"cert_img":123,"copyright":134,"email_content":135,"legal_list":138,"social_list":148},[124],{"_id":125,"alt":23,"dimensions":126,"ext":127,"name":128,"path":129,"size":130,"thumbnail_path":131,"upload_time":132,"upload_user":133},"ISOimg.png","120x60",".png","ISOimg","https://teamt5-back.e-s.tw/api/files/ISOimg.png",5341,"https://teamt5-back.e-s.tw/api/files/thumbnails/ISOimg.png","2026-04-17T11:15:17.277Z","developer","© 2026 TeamT5, Inc. All Rights Reserved.",{"content":136,"title":137},"Get the latest information delivered to your inbox.","Stay connected",[139,142,145],{"is_external":23,"key":140,"name":141,"url":89},"item_e775a11d-05ce-4ebd-b14d-b9459d3fb854","User Agreement",{"is_external":23,"key":143,"name":144,"url":89},"item_313056fb-dc9b-4275-8a9c-abc7f5a7f873","Privacy Policy",{"is_external":23,"key":146,"name":147,"url":89},"item_1b98f172-dcc8-4629-89cb-6737b86d8a4d","Cookies Policy",[149,160,170,180],{"icon_img":150,"key":159,"url":89},[151],{"_id":152,"alt":23,"dimensions":153,"ext":127,"name":154,"path":155,"size":156,"thumbnail_path":157,"upload_time":158,"upload_user":133},"in.png","28x28","in","https://teamt5-back.e-s.tw/api/files/in.png",571,"https://teamt5-back.e-s.tw/api/files/thumbnails/in.png","2026-04-17T11:21:55.779Z","item_f41c823b-03c5-47bd-bac2-094d96736844",{"icon_img":161,"key":169,"url":89},[162],{"_id":163,"alt":23,"dimensions":153,"ext":127,"name":164,"path":165,"size":166,"thumbnail_path":167,"upload_time":168,"upload_user":133},"x.png","x","https://teamt5-back.e-s.tw/api/files/x.png",415,"https://teamt5-back.e-s.tw/api/files/thumbnails/x.png","2026-04-17T11:21:55.776Z","item_f7ca5b3f-366c-4c1f-9bd1-7f3272091c47",{"icon_img":171,"key":179,"url":89},[172],{"_id":173,"alt":23,"dimensions":153,"ext":127,"name":174,"path":175,"size":176,"thumbnail_path":177,"upload_time":178,"upload_user":133},"yt.png","yt","https://teamt5-back.e-s.tw/api/files/yt.png",408,"https://teamt5-back.e-s.tw/api/files/thumbnails/yt.png","2026-04-17T11:21:55.781Z","item_06113b37-c207-4506-94ce-9070a52f3a8f",{"icon_img":181,"key":189,"url":89},[182],{"_id":183,"alt":23,"dimensions":153,"ext":127,"name":184,"path":185,"size":186,"thumbnail_path":187,"upload_time":188,"upload_user":133},"mail.png","mail","https://teamt5-back.e-s.tw/api/files/mail.png",382,"https://teamt5-back.e-s.tw/api/files/thumbnails/mail.png","2026-04-17T11:21:55.784Z","item_cfbb487f-fac1-4647-818c-27197c347431",{"icon":191,"post_meta":192,"seo":196,"show_default_fields":198},{"icon":23},{"id":193,"name":194,"prefix":195},"footer","網站頁尾設定","https://teamt5.org/__/",{"og_description":23,"og_image":197,"og_title":23},[],{"display_fields":199},{"hide_default_fields":77},{"awards_section":201,"blog_section":243,"default":248,"features_section":249,"hero_section":291,"intro_section":314,"products_section":318,"stats_section":379,"stories_section":400,"video_cta_section":433},{"awards_list":202,"description":241,"title":242},[203,217,229],{"description":204,"img":205,"key":215,"title":216},"ThreatSonar Anti-Ransomware solution is awarded 2024 Computex Best Choice Award - Golden Award",[206],{"_id":207,"alt":23,"dimensions":208,"ext":209,"name":210,"path":211,"size":212,"thumbnail_path":213,"upload_time":214,"upload_user":133},"image 11.jpg","95x95",".jpg","image 11","https://teamt5-back.e-s.tw/api/files/image 11.jpg",17552,"https://teamt5-back.e-s.tw/api/files/thumbnails/image 11.jpg","2026-04-11T15:04:01.997Z","award_6c749ed2-20ee-4f10-b6cf-5703122160bd","BC Award",{"description":218,"img":219,"key":227,"title":228},"ThreatSonar Anti-Ransomware and ThreatVision solution is awarded 2026 Taiwan Excellence Award",[220],{"_id":221,"alt":23,"dimensions":208,"ext":209,"name":222,"path":223,"size":224,"thumbnail_path":225,"upload_time":226,"upload_user":133},"image 12.jpg","image 12","https://teamt5-back.e-s.tw/api/files/image 12.jpg",11361,"https://teamt5-back.e-s.tw/api/files/thumbnails/image 12.jpg","2026-04-11T15:04:02Z","award_8809f233-3a1c-4e94-8719-578e0fd5a5bc","Taiwan Excellence Award",{"description":230,"img":231,"key":239,"title":240},"TeamT5 Named as Taiwanese Threat Intelligence Company of the Year by Frost & Sullivan",[232],{"_id":233,"alt":23,"dimensions":208,"ext":209,"name":234,"path":235,"size":236,"thumbnail_path":237,"upload_time":238,"upload_user":133},"image 13.jpg","image 13","https://teamt5-back.e-s.tw/api/files/image 13.jpg",11964,"https://teamt5-back.e-s.tw/api/files/thumbnails/image 13.jpg","2026-04-11T15:04:02.003Z","award_2dfd6bdd-85c1-4654-92e0-33a5514793d2","F&S","Award-winning cybersecurity innovation recognized by global experts and international industry standards.","Industry Recognition & Global Trust",{"btn":244,"description":246,"title":247},{"text":245,"url":62},"More","Access expert perspectives, threat intelligence updates, and in-depth research to better understand today’s cyber threat landscape.","Discover the latest threat  trends in Asia Pacific",{"slug":23,"title":23},{"features_list":250},[251,264,277],{"description":252,"img":253,"key":262,"title":263},"TeamT5 turns threat intelligence into actionable security, helping organizations detect threats earlier, respond faster, and strengthen cyber resilience",[254],{"_id":255,"alt":23,"dimensions":256,"ext":209,"name":257,"path":258,"size":259,"thumbnail_path":260,"upload_time":261,"upload_user":133},"Frame 1010106922.jpg","761x550","Frame 1010106922","https://teamt5-back.e-s.tw/api/files/Frame 1010106922.jpg",96858,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010106922.jpg","2026-04-11T15:01:10.948Z","features_418e4c5e-cc1c-408e-9c2d-9482f1739620","Intelligence that Powers Proactive Defense",{"description":265,"img":266,"key":275,"title":276},"Unique intelligence on Asia-Pacific threat actors and campaigns to help organizations defend against targeted attacks.",[267],{"_id":268,"alt":23,"dimensions":269,"ext":209,"name":270,"path":271,"size":272,"thumbnail_path":273,"upload_time":274,"upload_user":133},"Frame 1010106889.jpg","300x200","Frame 1010106889","https://teamt5-back.e-s.tw/api/files/Frame 1010106889.jpg",56717,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010106889.jpg","2026-04-11T15:06:06.697Z","features_7ad251de-658a-49a8-a450-a84f3d06d043","Unmatched Asia-Pacific threat insights",{"description":278,"img":279,"key":289,"title":290},"In-depth research on cyber espionage and APTs, exposing attacker tactics to counter advanced threats.",[280],{"_id":281,"alt":23,"dimensions":282,"ext":209,"name":283,"path":284,"size":285,"thumbnail_path":286,"upload_time":287,"upload_user":288},"(可使用) getty-images-4OkY858eLVI-unsplash.jpg","3840x2160","(可使用) getty-images-4OkY858eLVI-unsplash","https://teamt5-back.e-s.tw/api/files/(可使用) getty-images-4OkY858eLVI-unsplash.jpg",1095570,"https://teamt5-back.e-s.tw/api/files/thumbnails/(可使用) getty-images-4OkY858eLVI-unsplash.jpg","2026-04-20T06:00:36.787Z","teamt5","features_5ac6f317-c511-4fac-97a5-951aea5b72b6","Deep expertise in advanced threats",{"hero":292,"slides":297},{"btn":293,"description":295,"title":296},{"URL":294,"text":99},"https://teamt5.org/en/contact-us/","Where threat intelligence meets decisive action. TeamT5 provides the visibility organizations need to minimize exposure and master cyber preparedness.","Threat Intelligence Pioneer, Born in Asia ",[298],{"btn":299,"description":302,"img":303,"key":312,"title":313},{"text":300,"url":301},"Read Now","https://teamt5.org/en/posts/apt-threat-landscape-in-apac-2025-industrialization-of-intrusions/","With geopolitical tensions continuing to escalate across the APAC region, APT activities in the region are intensifying in both volume and sophistication. ",[304],{"_id":305,"alt":23,"dimensions":306,"ext":209,"name":307,"path":308,"size":309,"thumbnail_path":310,"upload_time":311,"upload_user":133},"Frame 1010107544 2.jpg","1100x799","Frame 1010107544 2","https://teamt5-back.e-s.tw/api/files/Frame 1010107544 2.jpg",1114505,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010107544 2.jpg","2026-04-11T15:00:35.828Z","slide_item_9c31f482-5436-4107-beed-e80b96f5b69d","APT Threat Landscape in APAC 2025: Industrialization of Intrusions",{"btn":315,"display_title":57,"title":317},{"text":316,"url":58},"Link","Stay ahead of attackers with intelligence-driven cybersecurity from TeamT5",{"products_list":319,"title":378},[320,336,350,364],{"btn":321,"description":324,"img":325,"key":334,"title":335},{"text":322,"url":323},"See how it works","https://home.teamt5.org/en/threatvision","ThreatVision delivers deep insights into APAC threat actors, their behavior patterns and attack techniques. Empower your team with intelligence that helps understand adversaries, anticipate attacks, and prepare in advance.",[326],{"_id":327,"alt":23,"dimensions":328,"ext":209,"name":329,"path":330,"size":331,"thumbnail_path":332,"upload_time":333,"upload_user":133},"Frame 1010107594.jpg","538x383","Frame 1010107594","https://teamt5-back.e-s.tw/api/files/Frame 1010107594.jpg",267082,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010107594.jpg","2026-04-11T15:02:38.806Z","products_9174bf4e-13ef-4a5f-a507-7d090517bd40","Turn global threat into actionable defense",{"btn":337,"description":339,"img":340,"key":348,"title":349},{"text":322,"url":338},"https://home.teamt5.org/en/threatsonar","ThreatSonar proactively hunts hidden intruders using intelligence-driven endpoint forensics, enabling organizations to detect suspicious activity, uncover root causes, and stop threats early.",[341],{"_id":342,"alt":23,"dimensions":328,"ext":209,"name":343,"path":344,"size":345,"thumbnail_path":346,"upload_time":347,"upload_user":133},"Frame 1010107596.jpg","Frame 1010107596","https://teamt5-back.e-s.tw/api/files/Frame 1010107596.jpg",269327,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010107596.jpg","2026-04-11T15:02:38.889Z","products_b31eed0a-d02e-49af-bdbe-b3d5502ed3ba","Proactively Hunt for Advanced Threats",{"btn":351,"description":353,"img":354,"key":362,"title":363},{"text":322,"url":352},"https://home.teamt5.org/en/threatsonar-plus","Quickly discover assets, detect vulnerabilities, and prioritize remediation. With intelligence-driven risk assessment, it enables faster mitigation of critical exposures and strengthens overall cyber resilience.",[355],{"_id":356,"alt":23,"dimensions":328,"ext":209,"name":357,"path":358,"size":359,"thumbnail_path":360,"upload_time":361,"upload_user":133},"Frame 1010107595.jpg","Frame 1010107595","https://teamt5-back.e-s.tw/api/files/Frame 1010107595.jpg",266139,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010107595.jpg","2026-04-11T15:02:38.846Z","products_c8a3d311-b224-4bc5-ba31-341177cf0a1a","Comprehensive Endpoint Risk Assessment",{"btn":365,"description":367,"img":368,"key":376,"title":377},{"text":322,"url":366},"https://home.teamt5.org/en/threatsonar-anti-ransomware","Stop ransomware instantly. ThreatSonar Anti-Ransomware delivers precise detection and real-time response to block lateral movement and encryption.",[369],{"_id":370,"alt":23,"dimensions":328,"ext":209,"name":371,"path":372,"size":373,"thumbnail_path":374,"upload_time":375,"upload_user":133},"Frame 1010107593.jpg","Frame 1010107593","https://teamt5-back.e-s.tw/api/files/Frame 1010107593.jpg",284184,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010107593.jpg","2026-04-11T15:02:38.76Z","products_9455495c-6861-42b6-bea4-21357af4bf3f","Defense-in-Depth for Advanced Threat Protection","Discover how TeamT5 transforms threat intelligence into powerful defense for your organization.",{"btn":380,"description":382,"stats_list":383,"title":399},{"text":245,"url":381},"https://teamt5.org/en/","Act faster. Stop threats before they impact the business.",[384,389,394],{"description":385,"key":386,"unit":387,"value":388},"Tracking advanced cyber threats and nation-state activities across APAC.","stat_452c6ff7-dcf8-4831-9551-40772a16a91d","+years","20",{"description":390,"key":391,"unit":392,"value":393},"Analyze threats to identify emerging risks.","stat_a20a7c93-5ef6-4dde-9e13-061c90e165ae","malware Families","3100",{"description":395,"key":396,"unit":397,"value":398},"Continuously tracking APT groups and their evolving tactics.","stat_98d49810-6c8f-4c90-abf7-d564945f5646","+malware families","300","Turning threat intelligence into decisive action",{"description":401,"stories_list":402,"title":432},"Learn how TeamT5 helps 500+ organizations identify critical threats and respond with greater speed and confidence",[403,418],{"description":404,"icon":405,"img":414,"key":416,"title":417,"url":48},"Macnica’s ‘Mpression Service’ powers expert threat hunting with TeamT5 ThreatSonar, combining forensic precision with intelligence for superior detection.",[406],{"_id":407,"alt":23,"dimensions":408,"ext":127,"name":409,"path":410,"size":411,"thumbnail_path":412,"upload_time":413,"upload_user":133},"icon.png","36x36","icon","https://teamt5-back.e-s.tw/api/files/icon.png",738,"https://teamt5-back.e-s.tw/api/files/thumbnails/icon.png","2026-04-11T15:05:52.948Z",[415],{"_id":255,"alt":23,"dimensions":256,"ext":209,"name":257,"path":258,"size":259,"thumbnail_path":260,"upload_time":261,"upload_user":133},"story_41f88e56-7f81-43cc-a044-8263bb911729","Extend threat hunting services to overseas bases",{"description":419,"icon":420,"img":428,"key":430,"title":431,"url":52},"Accelerate investigations with ThreatSonar. Featuring thousands of built-in APT signatures, our platform provides the deep endpoint visibility needed to uncover hidden threats instantly.",[421],{"_id":422,"alt":23,"dimensions":408,"ext":127,"name":423,"path":424,"size":425,"thumbnail_path":426,"upload_time":427,"upload_user":133},"icon-2.png","icon-2","https://teamt5-back.e-s.tw/api/files/icon-2.png",960,"https://teamt5-back.e-s.tw/api/files/thumbnails/icon-2.png","2026-04-11T15:05:52.943Z",[429],{"_id":268,"alt":23,"dimensions":269,"ext":209,"name":270,"path":271,"size":272,"thumbnail_path":273,"upload_time":274,"upload_user":133},"story_91a2fead-bad5-416e-826d-8307f5def1ef","Enhances incident handling service with advanced threat hunting capabilities","Security that delivers results",{"btn":434,"img":436,"title":446},{"text":435,"url":294},"Contact us",[437],{"_id":438,"alt":23,"dimensions":439,"ext":209,"name":440,"path":441,"size":442,"thumbnail_path":443,"upload_time":444,"upload_user":445},"Frame 1010107777.jpg","1980x600","Frame 1010107777","https://teamt5-back.e-s.tw/api/files/Frame 1010107777.jpg",1228994,"https://teamt5-back.e-s.tw/api/files/thumbnails/Frame 1010107777.jpg","2026-04-20T10:27:17.308Z","eseditor","Stay ahead of cyber threats with TeamT5.",1776926881225]