#purpleteam — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #purpleteam, aggregated by home.social.
-
CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
Submit your research here: https://adversaryvillage.org/call-for-papers/
CFP Closes on: 31st May 2026
#DEFCON34 #AdversaryVillage
#OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON -
CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
Submit your research here: https://adversaryvillage.org/call-for-papers/
CFP Closes on: 31st May 2026
#DEFCON34 #AdversaryVillage
#OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON -
CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
Submit your research here: https://adversaryvillage.org/call-for-papers/
CFP Closes on: 31st May 2026
#DEFCON34 #AdversaryVillage
#OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON -
CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
Submit your research here: https://adversaryvillage.org/call-for-papers/
CFP Closes on: 31st May 2026
#DEFCON34 #AdversaryVillage
#OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON -
CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
Submit your research here: https://adversaryvillage.org/call-for-papers/
CFP Closes on: 31st May 2026
#DEFCON34 #AdversaryVillage
#OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON -
Join Joel Correa, CTO & Co-Founder of Glipto, at Adversary Village during @onersac 2026 for an interactive hands-on session focused on Adversary Simulation.
Hands-on Activity: Adversary Simulation Hands-on Exercises Adversary Village, Room 204, Moscone South | March 25, 1:30 PM - 2:30 PM
More info on Adversary Village at
RSAC 2026: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/
Checkout the full village schedule for more cool hands-on activities:
https://adversaryvillage.org/adversary-events/ RSA-Conference-2026/schedule
#RSAC2026 #PowerOfCommunity
#RSAC
#AdversaryVillage #PurpleTeam
#AdversarySimulation
#CyberSecurity #InfoSec
#SanFrancisco #onersac_community -
Hands-on session: Be The Threat: Threat Emulation Exercises
Join Trey Bilbrey, Lead Adversary Emulation Engineer at SCYTHE, at Adversary Village during @onersac 2026.
Adversary Village - Room 204, Moscone South | March 25th, 03:30 - 04:30 PM
More info on Adversary Village at RSAC 2026: https:// adversaryvillage.org/adversary-events/RSA-
Conference-2026/
Checkout the full village schedule for more cool hands-on activities: https://adversaryvillage.org/adversary-events/
RSA-Conference-2026/schedule
#RSAC2026 #PowerOfCommunity #RSAC
#AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco #onersac_community -
Join Jonathan Baker from AttackIQ at Adversary Village for a hands-on activity at @onersac 2026.
Hands-on Activity: Threat-INFORM your defenses
Adversary Village, Room 204, Moscone South | March 24th, 11:30 AM - 12:30 PM | March 25th, 02:30 - 03:30 PM
Get hands-on with Threat-INFORM to explore how adversary simulation can help strengthen and validate your defenses.
Seats are limited, and do not worry about bringing a laptop, we got you covered.More info on Adversary Village at RSAC 2026: https:// adversaryvillage.org/adversary-events/RSA-
Conference-2026/
Checkout the full village schedule for more cool hands-on activities: https://adversaryvillage.org/adversary-events/
RSA-Conference-2026/schedule
#RSAC2026 #PowerOfCommunity #RSAC
#AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco #onersac_community -
Join Sarah Hume from Security Risk Advisors (SRA) at Adversary Village for a hands-on interactive session on purple teaming at RSAC 2026.
𝗜𝗻𝘁𝗲𝗿𝗮𝗰𝘁𝗶𝘃𝗲 𝗦𝗲𝘀𝘀𝗶𝗼𝗻: Running Point - How to Execute and Track Purple Team Exercises
📅 Adversary Village, Room 204, Moscone South | March 24th, 1:30 - 2:30 PM | March 25th, 11:30 AM - 12:30 PM
📅 Connection Hub, Moscone West | March 25th, 09:30 - 10:30 AMGet hands-on with real-world purple teaming, detection validation, and building a purple team workflow that actually holds up in production.
Seats are limited, and do not worry about bringing a laptop, we got you covered.More info on Adversary Village at RSAC 2026: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/
Checkout the full village schedule for more cool hands-on activities: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/schedule
#RSAC2026 #PowerOfCommunity #RSAC #AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco @onersac_community
-
Adversary Village is proud to have Security Risk Advisors (SRA) as a Gold Sponsor for our presence at RSAC 2026.
SRA is the team behind VECTR, the go-to platform for purple team reporting, collaboration, and tracking adversary emulation results. If you have run a purple team exercise, chances are you have crossed paths with VECTR.
Their support helps make our hands-on activities, panels, and community-driven initiatives possible at one of the biggest stages in cyber security.📍 Adversary Village at #RSAC 2026 Conference | Moscone South, San Francisco 📅 March 24-26, 2026
Come find us at RSAC 2026, we are running our Adversary Simulator, breach and adversary emulation exercises, hands-on activities, and interactive sessions.
🔗 More about SRA: https://sra.io/
🔗 Learn more about Adversary Village at RSAC 2026: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/Thank you, SRA, for backing the community and continuing to build tools that make purple teaming accessible to everyone.
#RSAC2026 #PowerOfCommunity #RSAC #OffensiveCyberSecurity #VECTR #AdversaryVillage #GoldSponsor #SRA #VECTR #CyberSecurity #PurpleTeam #RedTeam #AdversarySimulation #AdversaryEmulation #InfoSec #SanFrancisco
-
Adversary Village is back at RSAC 2026, and we are discussing the biggest shift in AI offensive tradecraft.
𝗣𝗮𝗻𝗲𝗹 title: AI and the New Offensive Playbook of State-Sponsored Cyber Threat Actors [VLG-W02]
📍 RSAC 2026 Conference | Moscone Center, San Francisco
📅 Wednesday, March 25, 2026 | 9:40 AM - 10:30 AM PDT
🎟️ Reserve your seat here: https://lnkd.in/gSFvMykbOur panelists:
Abhijith B R, Founder and Lead of Adversary Village
Seeyew Mo, Director of Training at @defcon, Cyber Mary Land
Adam Pennington, ATT&CK Lead at MITRE Corporation
Paul McCarty, Head of Security Research at OpenSourceMalwareState-sponsored threat actors are no longer just experimenting with AI, they are operationalizing it. Nation-state adversaries are rewriting the offensive playbook with generative AI at its core.
🔗 View the full session and reserve your seat: https://lnkd.in/gSFvMykb
Adversary Village will also be running hands-on activities throughout RSAC 2026, including our Adversary Simulator, breach and adversary emulation exercises, and more.
We look forward to seeing you there: https://lnkd.in/gVa4E8bq#RSAC2026 #PowerOfCommunity #RSAC #AdversaryVillage #AI #CyberSecurity #StateSponsoredThreats #ThreatIntelligence #RedTeam #PurpleTeam #AdversarySimulation #InfoSec #AdversarySimulation #SanFrancisco
-
Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!
What (the F)?
Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTFGemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:
Sicherheitslücken auf Websiten finden (ethisches Hacken)?
Spielerisch in der Kommandozeile arbeiten und dazulernen?
Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!Wann?
Sa, 14. März ab 15 Uhr - FLINTA*-Edition
Sa, 11. April ab 15 Uhr - FLINTA*-Edition
Fr, 8. Mai ab 16 Uhr - open for all genders
Wo?
Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)Was bringst du mit?
Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!
Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)
https://metalab.at/wiki/Haecksen#C3WTF
Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:
Zusätzliche Termine
PS: Zusätzliche Termine für all genders gibt es auch im https://metalab.at/ (Rathausstraße 6, 1010 Wien)Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
Sa, 21. März ab 14 Uhr - open for all genders @ metalab
Sa, 18. April ab 14 Uhr - open for all genders @ metalab#wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen
-
Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!
What (the F)?
Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTFGemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:
Sicherheitslücken auf Websiten finden (ethisches Hacken)?
Spielerisch in der Kommandozeile arbeiten und dazulernen?
Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!Wann?
Sa, 14. März ab 15 Uhr - FLINTA*-Edition
Sa, 11. April ab 15 Uhr - FLINTA*-Edition
Fr, 8. Mai ab 16 Uhr - open for all genders
Wo?
Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)Was bringst du mit?
Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!
Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)
https://metalab.at/wiki/Haecksen#C3WTF
Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:
Zusätzliche Termine
PS: Zusätzliche Termine für all genders gibt es auch im https://metalab.at/ (Rathausstraße 6, 1010 Wien)Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
Sa, 21. März ab 14 Uhr - open for all genders @ metalab
Sa, 18. April ab 14 Uhr - open for all genders @ metalab#wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen
-
Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!
What (the F)?
Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTFGemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:
Sicherheitslücken auf Websiten finden (ethisches Hacken)?
Spielerisch in der Kommandozeile arbeiten und dazulernen?
Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!Wann?
Sa, 14. März ab 15 Uhr - FLINTA*-Edition
Sa, 11. April ab 15 Uhr - FLINTA*-Edition
Fr, 8. Mai ab 16 Uhr - open for all genders
Wo?
Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)Was bringst du mit?
Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!
Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)
https://metalab.at/wiki/Haecksen#C3WTF
Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:
Zusätzliche Termine
PS: Zusätzliche Termine für all genders gibt es auch im https://metalab.at/ (Rathausstraße 6, 1010 Wien)Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
Sa, 21. März ab 14 Uhr - open for all genders @ metalab
Sa, 18. April ab 14 Uhr - open for all genders @ metalab#wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen
-
Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!
What (the F)?
Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTFGemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:
Sicherheitslücken auf Websiten finden (ethisches Hacken)?
Spielerisch in der Kommandozeile arbeiten und dazulernen?
Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!Wann?
Sa, 14. März ab 15 Uhr - FLINTA*-Edition
Sa, 11. April ab 15 Uhr - FLINTA*-Edition
Fr, 8. Mai ab 16 Uhr - open for all genders
Wo?
Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)Was bringst du mit?
Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!
Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)
https://metalab.at/wiki/Haecksen#C3WTF
Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:
Zusätzliche Termine
PS: Zusätzliche Termine für all genders gibt es auch im https://metalab.at/ (Rathausstraße 6, 1010 Wien)Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
Sa, 21. März ab 14 Uhr - open for all genders @ metalab
Sa, 18. April ab 14 Uhr - open for all genders @ metalab#wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen
-
Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!
What (the F)?
Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTFGemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:
Sicherheitslücken auf Websiten finden (ethisches Hacken)?
Spielerisch in der Kommandozeile arbeiten und dazulernen?
Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!Wann?
Sa, 14. März ab 15 Uhr - FLINTA*-Edition
Sa, 11. April ab 15 Uhr - FLINTA*-Edition
Fr, 8. Mai ab 16 Uhr - open for all genders
Wo?
Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)Was bringst du mit?
Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!
Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)
https://metalab.at/wiki/Haecksen#C3WTF
Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:
Zusätzliche Termine
PS: Zusätzliche Termine für all genders gibt es auch im https://metalab.at/ (Rathausstraße 6, 1010 Wien)Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
Sa, 21. März ab 14 Uhr - open for all genders @ metalab
Sa, 18. April ab 14 Uhr - open for all genders @ metalab#wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen
-
#CallForSponsors
We are currently open for sponsors and partners for Adversary Village at RSAC 2026, San Francisco.This is an opportunity to collaborate with one of the leading communities focused on #AdversarySimulation and #OffensiveSecurity, and to engage directly with practitioners, researchers, and industry leaders shaping modern security operations.
If you are interested in partnering with us for RSAC 2026, feel free to reach out: https://adversaryvillage.org/sponsors/ -
🚀 We're excited to announce Power of 2 - a cybersecurity startup dedicated to defending against today's evolving threats.
Our focus:
➡️ DFIR - rapid response & forensic analysis
➡️ Purple Teaming - bridging red & blue to strengthen resilience
➡️ Pentesting - proactive offense to uncover real-world weaknessesWe believe security isn't just business - it's also about honesty, open source and being on a par with customers and employees alike.
Follow us for real stories and lessons from the field as well as howto startup. Let's raise the bar for cyber security, together. 💪
🛡️ Stay secure.
#CyberSecurity #DFIR #PurpleTeam #Pentesting #InfoSec #StartupLaunch #Startup #Pwr2
-
🛠️ Best Cybersecurity Tools for Every Role — From Blue Team to Red Team 🚀
Cybersecurity isn’t one-size-fits-all. Different roles require different tools, whether you’re defending networks, hunting threats, testing applications, or managing policies. Here’s a breakdown of the most valuable tools by role — all framed for authorized, ethical use.
🔵 Blue Team (Defense & Monitoring)
Defenders rely on visibility and rapid detection. Tools like Splunk, ELK, and Wazuh centralize logs, while Suricata and Zeek analyze traffic in depth. Endpoint tools like CrowdStrike or Microsoft Defender ATP provide EDR, and Security Onion ties it together for SOC workflows. 📊👀🔴 Red Team (Offense & Simulation)
In authorized engagements, red teams simulate adversaries to test resilience. Metasploit and Cobalt Strike (licensed) provide frameworks for controlled exploitation, while Impacket and BloodHound help map Active Directory environments. Tools like Burp Suite and OWASP ZAP uncover web flaws in safe labs. ⚡🧪🟣 Purple Team (Collaboration)
Purple teams blend red & blue to improve detection. Using MITRE ATT&CK Navigator, Atomic Red Team, and Caldera, they run adversary emulations while defenders fine-tune alerts. 🤝🛡️🔍 Threat Hunting & DFIR
Analysts use Volatility and Autopsy for forensics, YARA for malware hunting, and MISP or AlienVault OTX for threat intel sharing. Sandboxes like Cuckoo and platforms like Any.Run safely analyze suspicious files. ☣️🔎☁️ Cloud & DevSecOps
For cloud, Wiz, Prisma Cloud, and Trivy scan for misconfigs and vulnerabilities. Developers secure pipelines with Snyk, Checkov, and GitHub Advanced Security. 🐳☁️⚠️ Disclaimer:
For educational & defensive use only. Tools should only be used in labs, on your own systems, or under explicit written permission during authorized engagements. 🚫🔒#CyberSecurity #InfoSec #BlueTeam #RedTeam #PurpleTeam #SOC #DFIR #EthicalHacking #SecurityTools #CloudSecurity
-
The Schedule is Live!
Check out the full lineup of talks, workshops, panel discussions, and hands-on activities happening at Adversary Village at @defcon Hacking Conference 33!
Schedule webpage: https://adversaryvillage.org/adversary-events/DEFCON-33/
Mark your calendars - we can't wait to see you all at DEF CON!
#AdversaryVillage #DEFCON33 #AccessEverywhere #AdversarySimulation #Adversarial #Offensive #PurpleTeam -
Sponsor spots are closing in 5 days!
If you or your organization want to jump in and support Adversary Village at @defcon 33, now’s the time. It’s a way to show some love for the Adversary Village community and get your name out there. Curious or interested? Drop us an email and let’s chat! Don’t miss out.
https://adversaryvillage.org/sponsors/#Sponsorship #DEFCON33 #OffensiveCyberSecurity #AdversarySimulation #Adversary #PurpleTeam
-
Call for Papers/Workshops closes today!
Make sure to submit your talk or workshop before the CFP closes today: https://adversaryvillage.org/call-for-papers/
Adversary Village at @defcon 33#AdversaryVillage #DEFCON33 #CallForPapers #AdversarySimulation #PurpleTeam #OffensiveCyberSecurity
-
CALL FOR PAPERS CLOSES IN 5 DAYS!
Adversary Village CFP for @defcon 33 will be closing on 5th June 2025!
If you’re interested in sharing your work, ideas, or research, make sure to submit your proposal before the deadline. Don’t miss this opportunity to be a part of Adversary Village this year.
Submit your talk or workshop today: https://adversaryvillage.org/call-for-papers/
#AdversaryVillage #CallForPapers #AdversarySimulation #PurpleTeam #DEFCON33 -
If you’re #purpleteam ’ing without #OpenTIDE, why don’t you want your work to be actionable for your #SOC #DetectionEngineering :P
-
CALL FOR PAPERS OPEN for Adversary Village at DEF CON 33!
We are back in Vegas this year, and we are calling on all hackers, adversary simulation specialists, researchers and offensive security minded folks to bring their best to the stage. The selected talks will be hosted in the DEF CON Creator stage, and the workshops will be hosted in the Adversary Village stage.
CFP Closes on: June 5, 2025
Event Dates: August 7-10 | Las Vegas Convention Center
Submit your proposals here: https://adversaryvillage.org/call-for-papers/
We are a community-driven village focused on hands-on, technical content. No vendor pitches. Just pure adversarial research. We are looking for your amazing research and content for DEF CON this year!
@defcon #AdversaryVillage #CallForPapers #AdversarySimulation #PurpleTeam -
Hello San Francisco! Adversary Village will be there at @bsidessf this weekend!
Join us for hands-on activities, games, guided adversary simulation exercises and discussions on the adversarial side of cyber security.
BSides San Francisco tickets are still available. Register now:https://bsidessf.org/tickets
More info on Adversary Village at BSidesSF 2025: https://adversaryvillage.org/adversary-events/BSidesSF-2025/
#AdversaryVillage #BSidesSanFrancisco #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam -
Today a pentester asked me if attackers really use brute force.
Yes, they do, especially in cloud environments. That's why multi factor authentication (MFA) is so important there.
-
There so many trainings and certification out there in the infosec field. This one gives a good overview. With that you can make your own training plan.
#cybersecurity #trainings #blueteam #redteam #infosec #purpleteam #career
-
Pictures from Adversary Village at DEFCON 32
Julien Terriac delivering a workshop "Hands-on Kubernetes security with KubeHound (purple teaming)".
https://adversaryvillage.org/adversary-events/DEFCON-32/
#AdversaryVillage #DEFCON32 #WeEngage #PurpleTeam #OffensiveCyberSecurity -
Pictures from Adversary Village at DEFCON 32
Leonidas Tsaousis delivering a talk in the creator stage on "Kubernetes Attack Simulation: The Definitive Guide”.
https://adversaryvillage.org/adversary-events/DEFCON-32/
#AdversaryVillage #DEFCON32 #WeEngage #PurpleTeam #AttackSimulation #OffensiveCyberSecurity -
One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcatIf the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.
For more details and practical examples, see this blog post:
https://malwarelab.eu/posts/tryhackme-smb-decryption/
#networktrafficanalysis #networktraffic #encryption #netntlmv2 #netntlm #ntlm #windows #fileshare #pentesting #cybersecurity #hardening #password #cracking #offensivesecurity #offsec #blueteam #purpleteam
-
Happy to announce PlexTrac as our Bronze sponsor for Adversary Village at DEF CON 32 Hacker convention, Las Vegas!
Thanks to the PlexTrac team for the support and contribution towards the adversary village community.URL: https://plextrac.com/
For more information, visit: https://adversaryvillage.org/adversary-events/DEFCON-32/
Join our Discord server: https://adversaryvillage.org/discord#AdversaryVillage #DEFCON32 #AdversarySimulation
#PurpleTeam #AdversaryTradecraft #AdversaryTactics #AdversaryEmulation #plextrac #DEFCON #AttackSimulation -
Happy to announce google as our Gold sponsor for @AdversaryVillage at @defcon 32 Hacker convention, Las Vegas!
Thanks to Google team for the support and contribution towards the adversary village community.URL: https://cloud.google.com
For more information, visit: https://adversaryvillage.org/adversary-events/DEFCON-32/
Join our Discord server: https://adversaryvillage.org/discord#AdversaryVillage #DEFCON32 #AdversarySimulation
#PurpleTeam #AdversaryTradecraft #AdversaryTactics #AdversaryEmulation #google #DEFCON #AttackSimulation -
Happy to announce Fortra as our Bronze sponsor for Adversary Village at @defcon 32 Hacker convention, Las Vegas!
Thanks to the Fortra #CobaltStrike Outflank team for the support and contribution towards the adversary village community.Meet @fortraofficial your cybersecurity ally! Fortra is the leader in offensive cyber security tooling and security services.
URL: https://fortra.comFor more information, visit: https://adversaryvillage.org/adversary-events/DEFCON-32/
Join our Discord server: https://adversaryvillage.org/discord#AdversaryVillage #DEFCON32 #AdversarySimulation
#PurpleTeam #AdversaryTradecraft #AdversaryTactics #AdversaryEmulation #Fortra #CobaltStrike #OutFlank #DEFCON #AttackSimulation -
Here is the final score board of #AdversaryWars #AdversaryVillage #CTF at @defcon 31!
A CTF competition focused on #AdversaryEmulation #PurpleTeamingThe participants were required to emulate attacks against a city based on fictional threat-actor defined by us.
At closure, following teams occupied top three positions.
Team 1: CTF.SG, Team 2: Sleepy, Team 3: HicAutemYeehawsThanks a lot, to all CTF participants! All players did well, and we thank you for contributing to the success of the event.
#DEFCON31 #AdversarySimulation #PurpleTeam -
Tickets are available for #BSidesSTL, 14 October, and they're free!: https://www.tickettailor.com/events/bsidesstl/ It's also at a new venue this year. #BSides #InfoSec #RedTeam #BlueTeam #PurpleTeam #GetSmart
-
Tickets for #BSidesAugusta0xA OPENS TODAY AT NOON EST. BSidesAugusta.org/tickets (Get Tickets). #cyber #csra #AugustaGA #cybersecurity #InfoSec #blueteam #redteam #purpleteam
-
We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.For more information, please visit our webpage: https://adversaryvillage.org/adversary-events/DEFCON-31/
Learn more about Zero-Point Security training: https://training.zeropointsecurity.co.uk#PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON
-
We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.For more information, please visit our webpage: https://adversaryvillage.org/adversary-events/DEFCON-31/
Learn more about Zero-Point Security training: https://training.zeropointsecurity.co.uk#PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON
-
We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.For more information, please visit our webpage: https://adversaryvillage.org/adversary-events/DEFCON-31/
Learn more about Zero-Point Security training: https://training.zeropointsecurity.co.uk#PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON
-
We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.For more information, please visit our webpage: https://adversaryvillage.org/adversary-events/DEFCON-31/
Learn more about Zero-Point Security training: https://training.zeropointsecurity.co.uk#PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON
-
We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.For more information, please visit our webpage: https://adversaryvillage.org/adversary-events/DEFCON-31/
Learn more about Zero-Point Security training: https://training.zeropointsecurity.co.uk#PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON
-
Introducing the newest major @tidalcyber TTP intelligence content roundup, the Initial Access & Malware Delivery Landscape matrix, now live in our free Community Edition platform: https://app.tidalcyber.com/share/43836024-a194-4ac7-9659-b51e88632e7f
The matrix covers 25 major & emerging #malware typically used to gain early footholds in victim environments, often leading to ingress of more impactful threats, especially #ransomware, #infostealers, cryptominers, & more. It includes many recognizable names (#QakBot, #IcedID, #Emotet, #Bumblebee, #Gootloader) plus several newer and less-discussed threats
The matrix includes 13 custom Technique Sets for threats not currently tracked in the #mitreattack knowledge base. All technique references derive from a large volume of recent, public #threat reporting (click the labels in the ribbon at the top of the matrix to view relevant source URLs for each threat)
An interactive link analysis visualization of connections among these threats, also derived from public reports, is also available here: https://onodo.org/visualizations/235067/
Community Edition matrices support easy identification of shared (and outlier) techniques among multiple threats, and quick & easy overlay or pivoting to defensive & offensive security capabilities relevant to your own #security stack. We’ll have a blog out soon reviewing our analysis of top & trending techniques common among these initial access threats
Tidal’s #Adversary Intelligence team remains focused on providing up-to-date #TTPintelligence, especially around traditionally under-represented yet widely relevant threats like crimeware. Other popular matrices in this theme include our Ransomware & Data Extortion Landscape matrix (https://app.tidalcyber.com/share/9a0fd4e6-1daf-4f98-a91d-b73003eb2d6a) and Major & Emerging Infostealers matrix (https://app.tidalcyber.com/share/ec62f5e0-bd40-476b-a560-7ad2779ea9e3), which each cover 20+ threats
Financially motivated adversaries often display a rapid pace of #TTP evolution, and this is especially apparent for #initialaccess threats. Register for our webinar on May 31 dedicated to TTP evolution, its drivers, and discussion around what defenders can do to address it and its implications: https://hubs.la/Q01NC23k0
#SharedWithTidal #threatinformeddefense #malware #infostealer #cryptominer #IAB #blueteam #detectionengineering #purpleteam #cyber
-
OffSec (tidigare Offensive Security) har släppt en ny Linux-distribution vid namn Kali Purple, läs mer här: https://kryptera.se/kali-purple-fran-offsec/
#offensivesecurity #linux #offsec #kali #cybersecurity #purpleteam #blueteaming #blueteam