# About Vincent Yiu

## Social Profiles

* Twitter: [@vysecurity](https://www.twitter.com/vysecurity)
* LinkedIn: [/in/vincent-yiu](https://www.linkedin.com/in/vincent-yiu)
* YouTube: [/c/VincentYiu](https://www.youtube.com/c/VincentYiu)

‌Vincent is a Director of Red Team Operations. Vincent manages services driven by the adversary mindset and practically executes and demonstrates the impact of security vulnerabilities and attack paths.

## Conference Speaking

I am always open to speaking about interesting topics at different conferences ranging from business audiences to pure technical audiences. Get in touch, and I'll try to submit for the CFP or consider the event!

* 2018 DragonCon, Hong Kong

  Not recorded
* 2018 Fintech Security Conference, Hong kong

  Not recorded
* 2018 SSC Security Conference, Xi'An, China\
  Not recorded
* 2018 Hack In The Box GSEC, Singapore\
  <https://www.youtube.com/watch?v=w1fNGOKkeSg>
* 2017 Jingdong Annual Security Conference, Beijing, China\
  Not recorded
* 2017 Hack In the Box GSEC, Singapore\
  <https://www.youtube.com/watch?v=vdFbqG1aDh8>
* 2017 SteelCon, United Kingdom\
  <https://www.youtube.com/watch?v=SO5VLbLu9uE>
* 2017 BSides Manchester, United Kingdom\
  <https://www.youtube.com/watch?v=-FQgWGktYtw>
* 2017 SnoopCon, United Kingdom Private, for British Telecommunications
* 2016 SnoopCon, United Kingdom Private, for British Telecommunications

## Key Certifications

* MEng Computer Science, University of Warwick
* Offensive Security Certified Professional, Offensive Security
* Offensive Security Certified Expert, Offensive Security
* CREST Certified Infrastructure Tester, CREST
* CREST Registered Tester, CREST
* Certified Security Testing Associate, 7Safe

## Courses Undertaken

* RastaLabs
* Penetration Testing with Kali Linux
* Cracking the Perimeter
* Web Application Hackers Handbook - Live Edition
* Mobile Application Hackers Handbook - Live Edition
* Advanced Threat Tactics - Videos
* CSTA 3 day course that was held in Cambridge

## Other

* Reverse engineering since the age of 10
* UK National Cyber Security Championship Masterclass Finalist 2015\
  [Telegraph: UKs Largest Cyber Terror Attack Simulation on HMS Belfast](https://www.telegraph.co.uk/technology/internet-security/11467748/UKs-largest-cyber-terror-attack-simulation-gets-underway-on-HMS-Belfast.html)\
  [Independent: Cyber Security Challenge Hack into HMS Belfast and Blow up London Wired: A Cyber War is being staged in central London](https://www.independent.co.uk/life-style/gadgets-and-tech/news/cyber-security-challenge-hack-into-hms-belfast-and-blow-up-the-mayor-10104947.html)\
  [BBC News UK: Computer terror simulation used to recruit 'cyber defenders'](https://www.bbc.com/news/uk-31875832)
* USBNinja - Bad USB charging cable projects for offensive operations and simulations:\
  [BleepingComputer: USBHarpoo (Old Name) is a BadUSB Attack with a twist](https://www.bleepingcomputer.com/news/security/usbharpoon-is-a-badusb-attack-with-a-twist/)

## Responsible Disclosures

Riot Games, Xiaomi, General Motors, Adobe, Barclays, Iqiyi, VIPSHOP, Didichuxing, Alibaba, Airbus, FBI, US DoD, UK Gov via. NCSC, DigitalOcean, Vultr, ElasticSearch, Intel, China Mobile via. CNCERT.<br>

Bwg Aff: <https://bandwagonhost.com/aff.php?aff=67638>

Cloud Aff: <https://www.cubecloud.net/aff.php?aff=2341>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.vincentyiu.com/about.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
