{"provider_name":"Hatena Blog","blog_url":"https://security-log.hatenablog.com/","provider_url":"https://hatena.blog","version":"1.0","url":"https://security-log.hatenablog.com/entry/2025/11/20/000000_1","categories":["IT\u4f01\u696d: KDDI","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d: NEC","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d: UCF / United Cyber Force"],"image_url":null,"title":"KDDI\u3068NEC\u3001\u5408\u5f01\u4f1a\u793e\u300cUCF\u300d\u8a2d\u7acb\u3000\u300c\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u300d\u95a2\u9023\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u624b\u639b\u3051\u308b","description":"\u3010\u8981\u70b9\u3011 \u25ceKDDI\u3068NEC\u304c\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u3092\u62c5\u3046\u5408\u5f01\u4f1a\u793eUCF\u3092\u8a2d\u7acb\u3002\u653f\u5e9c\u30fb\u6cd5\u4eba\u5411\u3051\u306b\u95a2\u9023\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u63d0\u4f9b\u3057\u3001\u7d14\u56fd\u7523\u306e\u5927\u898f\u6a21\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u76e4\u69cb\u7bc9\u3092\u76ee\u6307\u3059\u3002","type":"rich","published":"2025-11-20 00:00:00","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2025%2F11%2F20%2F000000_1\" title=\"KDDI\u3068NEC\u3001\u5408\u5f01\u4f1a\u793e\u300cUCF\u300d\u8a2d\u7acb\u3000\u300c\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u300d\u95a2\u9023\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u624b\u639b\u3051\u308b - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","author_url":"https://blog.hatena.ne.jp/tanigawa/","author_name":"tanigawa","height":"190","blog_title":"TT Security Log"}