home.social

#purpleteam — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #purpleteam, aggregated by home.social.

  1. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  2. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  3. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  4. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  5. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  6. Join Joel Correa, CTO & Co-Founder of Glipto, at Adversary Village during @onersac 2026 for an interactive hands-on session focused on Adversary Simulation.
    Hands-on Activity: Adversary Simulation Hands-on Exercises Adversary Village, Room 204, Moscone South | March 25, 1:30 PM - 2:30 PM
    More info on Adversary Village at
    RSAC 2026: adversaryvillage.org/adversary
    Checkout the full village schedule for more cool hands-on activities:
    adversaryvillage.org/adversary RSA-Conference-2026/schedule
    #RSAC2026 #PowerOfCommunity
    #RSAC
    #AdversaryVillage #PurpleTeam
    #AdversarySimulation
    #CyberSecurity #InfoSec
    #SanFrancisco #onersac_community

  7. Hands-on session: Be The Threat: Threat Emulation Exercises

    Join Trey Bilbrey, Lead Adversary Emulation Engineer at SCYTHE, at Adversary Village during @onersac 2026.
    Adversary Village - Room 204, Moscone South | March 25th, 03:30 - 04:30 PM
    More info on Adversary Village at RSAC 2026: https:// adversaryvillage.org/adversary-events/RSA-
    Conference-2026/
    Checkout the full village schedule for more cool hands-on activities: adversaryvillage.org/adversary
    RSA-Conference-2026/schedule
    #RSAC2026 #PowerOfCommunity #RSAC
    #AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco #onersac_community

  8. Join Jonathan Baker from AttackIQ at Adversary Village for a hands-on activity at @onersac 2026.
    Hands-on Activity: Threat-INFORM your defenses
    Adversary Village, Room 204, Moscone South | March 24th, 11:30 AM - 12:30 PM | March 25th, 02:30 - 03:30 PM
    Get hands-on with Threat-INFORM to explore how adversary simulation can help strengthen and validate your defenses.
    Seats are limited, and do not worry about bringing a laptop, we got you covered.

    More info on Adversary Village at RSAC 2026: https:// adversaryvillage.org/adversary-events/RSA-
    Conference-2026/
    Checkout the full village schedule for more cool hands-on activities: adversaryvillage.org/adversary
    RSA-Conference-2026/schedule
    #RSAC2026 #PowerOfCommunity #RSAC
    #AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco #onersac_community

  9. Join Sarah Hume from Security Risk Advisors (SRA) at Adversary Village for a hands-on interactive session on purple teaming at RSAC 2026.

    𝗜𝗻𝘁𝗲𝗿𝗮𝗰𝘁𝗶𝘃𝗲 𝗦𝗲𝘀𝘀𝗶𝗼𝗻: Running Point - How to Execute and Track Purple Team Exercises

    📅 Adversary Village, Room 204, Moscone South | March 24th, 1:30 - 2:30 PM | March 25th, 11:30 AM - 12:30 PM
    📅 Connection Hub, Moscone West | March 25th, 09:30 - 10:30 AM

    Get hands-on with real-world purple teaming, detection validation, and building a purple team workflow that actually holds up in production.
    Seats are limited, and do not worry about bringing a laptop, we got you covered.

    More info on Adversary Village at RSAC 2026: adversaryvillage.org/adversary

    Checkout the full village schedule for more cool hands-on activities: adversaryvillage.org/adversary

    #RSAC2026 #PowerOfCommunity #RSAC #AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco @onersac_community

  10. Adversary Village is proud to have Security Risk Advisors (SRA) as a Gold Sponsor for our presence at RSAC 2026.

    SRA is the team behind VECTR, the go-to platform for purple team reporting, collaboration, and tracking adversary emulation results. If you have run a purple team exercise, chances are you have crossed paths with VECTR.
    Their support helps make our hands-on activities, panels, and community-driven initiatives possible at one of the biggest stages in cyber security.

    📍 Adversary Village at #RSAC 2026 Conference | Moscone South, San Francisco 📅 March 24-26, 2026

    Come find us at RSAC 2026, we are running our Adversary Simulator, breach and adversary emulation exercises, hands-on activities, and interactive sessions.
    🔗 More about SRA: sra.io/
    🔗 Learn more about Adversary Village at RSAC 2026: adversaryvillage.org/adversary

    Thank you, SRA, for backing the community and continuing to build tools that make purple teaming accessible to everyone.

    #RSAC2026 #PowerOfCommunity #RSAC #OffensiveCyberSecurity #VECTR #AdversaryVillage #GoldSponsor #SRA #VECTR #CyberSecurity #PurpleTeam #RedTeam #AdversarySimulation #AdversaryEmulation #InfoSec #SanFrancisco

  11. Adversary Village is back at RSAC 2026, and we are discussing the biggest shift in AI offensive tradecraft.
    𝗣𝗮𝗻𝗲𝗹 title: AI and the New Offensive Playbook of State-Sponsored Cyber Threat Actors [VLG-W02]
    📍 RSAC 2026 Conference | Moscone Center, San Francisco
    📅 Wednesday, March 25, 2026 | 9:40 AM - 10:30 AM PDT
    🎟️ Reserve your seat here: lnkd.in/gSFvMykb

    Our panelists:
    Abhijith B R, Founder and Lead of Adversary Village
    Seeyew Mo, Director of Training at @defcon, Cyber Mary Land
    Adam Pennington, ATT&CK Lead at MITRE Corporation
    Paul McCarty, Head of Security Research at OpenSourceMalware

    State-sponsored threat actors are no longer just experimenting with AI, they are operationalizing it. Nation-state adversaries are rewriting the offensive playbook with generative AI at its core.

    🔗 View the full session and reserve your seat: lnkd.in/gSFvMykb

    Adversary Village will also be running hands-on activities throughout RSAC 2026, including our Adversary Simulator, breach and adversary emulation exercises, and more.
    We look forward to seeing you there: lnkd.in/gVa4E8bq

    #RSAC2026 #PowerOfCommunity #RSAC #AdversaryVillage #AI #CyberSecurity #StateSponsoredThreats #ThreatIntelligence #RedTeam #PurpleTeam #AdversarySimulation #InfoSec #AdversarySimulation #SanFrancisco

  12. Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!

    What (the F)?
    Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTF

    Gemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:

    Sicherheitslücken auf Websiten finden (ethisches Hacken)?
    Spielerisch in der Kommandozeile arbeiten und dazulernen?
    Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
    Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
    Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!

    Wann?
    Sa, 14. März ab 15 Uhr - FLINTA*-Edition
    Sa, 11. April ab 15 Uhr - FLINTA*-Edition
    Fr, 8. Mai ab 16 Uhr - open for all genders
    Wo?
    Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
    Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)

    Was bringst du mit?
    Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
    Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)

    Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
    Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!

    Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!

    Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)

    metalab.at/wiki/Haecksen#C3WTF

    Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:

    Zusätzliche Termine
    PS: Zusätzliche Termine für all genders gibt es auch im metalab.at/ (Rathausstraße 6, 1010 Wien)

    Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
    Sa, 21. März ab 14 Uhr - open for all genders @ metalab
    Sa, 18. April ab 14 Uhr - open for all genders @ metalab

    #wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen

  13. Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!

    What (the F)?
    Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTF

    Gemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:

    Sicherheitslücken auf Websiten finden (ethisches Hacken)?
    Spielerisch in der Kommandozeile arbeiten und dazulernen?
    Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
    Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
    Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!

    Wann?
    Sa, 14. März ab 15 Uhr - FLINTA*-Edition
    Sa, 11. April ab 15 Uhr - FLINTA*-Edition
    Fr, 8. Mai ab 16 Uhr - open for all genders
    Wo?
    Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
    Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)

    Was bringst du mit?
    Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
    Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)

    Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
    Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!

    Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!

    Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)

    metalab.at/wiki/Haecksen#C3WTF

    Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:

    Zusätzliche Termine
    PS: Zusätzliche Termine für all genders gibt es auch im metalab.at/ (Rathausstraße 6, 1010 Wien)

    Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
    Sa, 21. März ab 14 Uhr - open for all genders @ metalab
    Sa, 18. April ab 14 Uhr - open for all genders @ metalab

    #wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen

  14. Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!

    What (the F)?
    Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTF

    Gemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:

    Sicherheitslücken auf Websiten finden (ethisches Hacken)?
    Spielerisch in der Kommandozeile arbeiten und dazulernen?
    Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
    Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
    Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!

    Wann?
    Sa, 14. März ab 15 Uhr - FLINTA*-Edition
    Sa, 11. April ab 15 Uhr - FLINTA*-Edition
    Fr, 8. Mai ab 16 Uhr - open for all genders
    Wo?
    Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
    Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)

    Was bringst du mit?
    Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
    Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)

    Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
    Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!

    Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!

    Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)

    metalab.at/wiki/Haecksen#C3WTF

    Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:

    Zusätzliche Termine
    PS: Zusätzliche Termine für all genders gibt es auch im metalab.at/ (Rathausstraße 6, 1010 Wien)

    Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
    Sa, 21. März ab 14 Uhr - open for all genders @ metalab
    Sa, 18. April ab 14 Uhr - open for all genders @ metalab

    #wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen

  15. Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!

    What (the F)?
    Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTF

    Gemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:

    Sicherheitslücken auf Websiten finden (ethisches Hacken)?
    Spielerisch in der Kommandozeile arbeiten und dazulernen?
    Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
    Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
    Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!

    Wann?
    Sa, 14. März ab 15 Uhr - FLINTA*-Edition
    Sa, 11. April ab 15 Uhr - FLINTA*-Edition
    Fr, 8. Mai ab 16 Uhr - open for all genders
    Wo?
    Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
    Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)

    Was bringst du mit?
    Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
    Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)

    Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
    Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!

    Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!

    Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)

    metalab.at/wiki/Haecksen#C3WTF

    Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:

    Zusätzliche Termine
    PS: Zusätzliche Termine für all genders gibt es auch im metalab.at/ (Rathausstraße 6, 1010 Wien)

    Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
    Sa, 21. März ab 14 Uhr - open for all genders @ metalab
    Sa, 18. April ab 14 Uhr - open for all genders @ metalab

    #wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen

  16. Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!

    What (the F)?
    Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTF

    Gemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:

    Sicherheitslücken auf Websiten finden (ethisches Hacken)?
    Spielerisch in der Kommandozeile arbeiten und dazulernen?
    Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
    Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
    Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!

    Wann?
    Sa, 14. März ab 15 Uhr - FLINTA*-Edition
    Sa, 11. April ab 15 Uhr - FLINTA*-Edition
    Fr, 8. Mai ab 16 Uhr - open for all genders
    Wo?
    Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
    Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)

    Was bringst du mit?
    Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
    Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)

    Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
    Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!

    Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!

    Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)

    metalab.at/wiki/Haecksen#C3WTF

    Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:

    Zusätzliche Termine
    PS: Zusätzliche Termine für all genders gibt es auch im metalab.at/ (Rathausstraße 6, 1010 Wien)

    Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
    Sa, 21. März ab 14 Uhr - open for all genders @ metalab
    Sa, 18. April ab 14 Uhr - open for all genders @ metalab

    #wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen

  17. #CallForSponsors
    We are currently open for sponsors and partners for Adversary Village at RSAC 2026, San Francisco.

    This is an opportunity to collaborate with one of the leading communities focused on #AdversarySimulation and #OffensiveSecurity, and to engage directly with practitioners, researchers, and industry leaders shaping modern security operations.
    If you are interested in partnering with us for RSAC 2026, feel free to reach out: adversaryvillage.org/sponsors/

    #AdversaryVillage #RSAConference #PurpleTeam

  18. #Introduction

    🚀 We're excited to announce Power of 2 - a cybersecurity startup dedicated to defending against today's evolving threats.

    Our focus:
    ➡️ DFIR - rapid response & forensic analysis
    ➡️ Purple Teaming - bridging red & blue to strengthen resilience
    ➡️ Pentesting - proactive offense to uncover real-world weaknesses

    We believe security isn't just business - it's also about honesty, open source and being on a par with customers and employees alike.

    Follow us for real stories and lessons from the field as well as howto startup. Let's raise the bar for cyber security, together. 💪

    🛡️ Stay secure.

    #CyberSecurity #DFIR #PurpleTeam #Pentesting #InfoSec #StartupLaunch #Startup #Pwr2

  19. 🛠️ Best Cybersecurity Tools for Every Role — From Blue Team to Red Team 🚀

    Cybersecurity isn’t one-size-fits-all. Different roles require different tools, whether you’re defending networks, hunting threats, testing applications, or managing policies. Here’s a breakdown of the most valuable tools by role — all framed for authorized, ethical use.

    🔵 Blue Team (Defense & Monitoring)
    Defenders rely on visibility and rapid detection. Tools like Splunk, ELK, and Wazuh centralize logs, while Suricata and Zeek analyze traffic in depth. Endpoint tools like CrowdStrike or Microsoft Defender ATP provide EDR, and Security Onion ties it together for SOC workflows. 📊👀

    🔴 Red Team (Offense & Simulation)
    In authorized engagements, red teams simulate adversaries to test resilience. Metasploit and Cobalt Strike (licensed) provide frameworks for controlled exploitation, while Impacket and BloodHound help map Active Directory environments. Tools like Burp Suite and OWASP ZAP uncover web flaws in safe labs. ⚡🧪

    🟣 Purple Team (Collaboration)
    Purple teams blend red & blue to improve detection. Using MITRE ATT&CK Navigator, Atomic Red Team, and Caldera, they run adversary emulations while defenders fine-tune alerts. 🤝🛡️

    🔍 Threat Hunting & DFIR
    Analysts use Volatility and Autopsy for forensics, YARA for malware hunting, and MISP or AlienVault OTX for threat intel sharing. Sandboxes like Cuckoo and platforms like Any.Run safely analyze suspicious files. ☣️🔎

    ☁️ Cloud & DevSecOps
    For cloud, Wiz, Prisma Cloud, and Trivy scan for misconfigs and vulnerabilities. Developers secure pipelines with Snyk, Checkov, and GitHub Advanced Security. 🐳☁️

    ⚠️ Disclaimer:
    For educational & defensive use only. Tools should only be used in labs, on your own systems, or under explicit written permission during authorized engagements. 🚫🔒

    #CyberSecurity #InfoSec #BlueTeam #RedTeam #PurpleTeam #SOC #DFIR #EthicalHacking #SecurityTools #CloudSecurity

  20. The Schedule is Live!
    Check out the full lineup of talks, workshops, panel discussions, and hands-on activities happening at Adversary Village at @defcon Hacking Conference 33!
    Schedule webpage: adversaryvillage.org/adversary
    Mark your calendars - we can't wait to see you all at DEF CON!
    #AdversaryVillage #DEFCON33 #AccessEverywhere #AdversarySimulation #Adversarial #Offensive #PurpleTeam

  21. Sponsor spots are closing in 5 days!
    If you or your organization want to jump in and support Adversary Village at @defcon 33, now’s the time. It’s a way to show some love for the Adversary Village community and get your name out there. Curious or interested? Drop us an email and let’s chat! Don’t miss out.
    adversaryvillage.org/sponsors/

    #Sponsorship #DEFCON33 #OffensiveCyberSecurity #AdversarySimulation #Adversary #PurpleTeam

  22. CALL FOR PAPERS CLOSES IN 5 DAYS!

    Adversary Village CFP for @defcon 33 will be closing on 5th June 2025!
    If you’re interested in sharing your work, ideas, or research, make sure to submit your proposal before the deadline. Don’t miss this opportunity to be a part of Adversary Village this year.
    Submit your talk or workshop today: adversaryvillage.org/call-for-
    #AdversaryVillage #CallForPapers #AdversarySimulation #PurpleTeam #DEFCON33

  23. If you’re #purpleteam ’ing without #OpenTIDE, why don’t you want your work to be actionable for your #SOC #DetectionEngineering :P

  24. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 33!

    We are back in Vegas this year, and we are calling on all hackers, adversary simulation specialists, researchers and offensive security minded folks to bring their best to the stage. The selected talks will be hosted in the DEF CON Creator stage, and the workshops will be hosted in the Adversary Village stage.
    CFP Closes on: June 5, 2025
    Event Dates: August 7-10 | Las Vegas Convention Center
    Submit your proposals here: adversaryvillage.org/call-for-
    We are a community-driven village focused on hands-on, technical content. No vendor pitches. Just pure adversarial research. We are looking for your amazing research and content for DEF CON this year!
    @defcon #AdversaryVillage #CallForPapers #AdversarySimulation #PurpleTeam

  25. Hello San Francisco! Adversary Village will be there at @bsidessf this weekend!
    Join us for hands-on activities, games, guided adversary simulation exercises and discussions on the adversarial side of cyber security.
    BSides San Francisco tickets are still available. Register now:bsidessf.org/tickets
    More info on Adversary Village at BSidesSF 2025: adversaryvillage.org/adversary
    #AdversaryVillage #BSidesSanFrancisco #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam

  26. Today a pentester asked me if attackers really use brute force.

    Yes, they do, especially in cloud environments. That's why multi factor authentication (MFA) is so important there.

    #knowledgedrop #purpleteam #cloud

  27. There so many trainings and certification out there in the infosec field. This one gives a good overview. With that you can make your own training plan.

    #cybersecurity #trainings #blueteam #redteam #infosec #purpleteam #career

    pauljerimy.com/security-certif

  28. One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
    If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
    The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcat

    If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.

    For more details and practical examples, see this blog post:

    malwarelab.eu/posts/tryhackme-

    #networktrafficanalysis #networktraffic #encryption #netntlmv2 #netntlm #ntlm #windows #fileshare #pentesting #cybersecurity #hardening #password #cracking #offensivesecurity #offsec #blueteam #purpleteam

  29. Happy to announce PlexTrac as our Bronze sponsor for Adversary Village at DEF CON 32 Hacker convention, Las Vegas!
    Thanks to the PlexTrac team for the support and contribution towards the adversary village community.

    URL: plextrac.com/
    For more information, visit: adversaryvillage.org/adversary
    Join our Discord server: adversaryvillage.org/discord

    #AdversaryVillage #DEFCON32 #AdversarySimulation
    #PurpleTeam #AdversaryTradecraft #AdversaryTactics #AdversaryEmulation #plextrac #DEFCON #AttackSimulation

  30. Happy to announce Fortra as our Bronze sponsor for Adversary Village at @defcon 32 Hacker convention, Las Vegas!
    Thanks to the Fortra #CobaltStrike Outflank team for the support and contribution towards the adversary village community.

    Meet @fortraofficial your cybersecurity ally! Fortra is the leader in offensive cyber security tooling and security services.
    URL: fortra.com

    For more information, visit: adversaryvillage.org/adversary
    Join our Discord server: adversaryvillage.org/discord

    #AdversaryVillage #DEFCON32 #AdversarySimulation
    #PurpleTeam #AdversaryTradecraft #AdversaryTactics #AdversaryEmulation #Fortra #CobaltStrike #OutFlank #DEFCON #AttackSimulation

  31. Here is the final score board of #AdversaryWars #AdversaryVillage #CTF at @defcon 31!
    A CTF competition focused on #AdversaryEmulation #PurpleTeaming

    The participants were required to emulate attacks against a city based on fictional threat-actor defined by us.
    At closure, following teams occupied top three positions.
    Team 1: CTF.SG, Team 2: Sleepy, Team 3: HicAutemYeehaws

    Thanks a lot, to all CTF participants! All players did well, and we thank you for contributing to the success of the event.
    #DEFCON31 #AdversarySimulation #PurpleTeam

  32. We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
    We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.

    For more information, please visit our webpage: adversaryvillage.org/adversary
    Learn more about Zero-Point Security training: training.zeropointsecurity.co.

    #PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON

  33. We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
    We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.

    For more information, please visit our webpage: adversaryvillage.org/adversary
    Learn more about Zero-Point Security training: training.zeropointsecurity.co.

    #PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON

  34. We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
    We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.

    For more information, please visit our webpage: adversaryvillage.org/adversary
    Learn more about Zero-Point Security training: training.zeropointsecurity.co.

    #PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON

  35. We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
    We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.

    For more information, please visit our webpage: adversaryvillage.org/adversary
    Learn more about Zero-Point Security training: training.zeropointsecurity.co.

    #PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON

  36. We are thrilled to announce that #AdversaryWars #AdversaryVillageCTF at @defcon 31 has secured a Gold sponsorship from Zero-Point Security and RastaMouse, the creator of the awesome #CRTO #RedTeamOps #AdversarySimulation course.
    We extend our heartfelt gratitude to #ZeroPointSecurity and Rasta for their unwavering support to the #AdversaryVillage community.

    For more information, please visit our webpage: adversaryvillage.org/adversary
    Learn more about Zero-Point Security training: training.zeropointsecurity.co.

    #PurpleTeam #BreachSimulation #BAS #AdversaryTactics #DEFCON31 #AdversaryEmulation #AdversaryMindset #AdversaryTradecraft #CTF #AdversaryWarsCTF #DEFCON

  37. Introducing the newest major @tidalcyber TTP intelligence content roundup, the Initial Access & Malware Delivery Landscape matrix, now live in our free Community Edition platform: app.tidalcyber.com/share/43836

    The matrix covers 25 major & emerging #malware typically used to gain early footholds in victim environments, often leading to ingress of more impactful threats, especially #ransomware, #infostealers, cryptominers, & more. It includes many recognizable names (#QakBot, #IcedID, #Emotet, #Bumblebee, #Gootloader) plus several newer and less-discussed threats

    The matrix includes 13 custom Technique Sets for threats not currently tracked in the #mitreattack knowledge base. All technique references derive from a large volume of recent, public #threat reporting (click the labels in the ribbon at the top of the matrix to view relevant source URLs for each threat)

    An interactive link analysis visualization of connections among these threats, also derived from public reports, is also available here: onodo.org/visualizations/23506

    Community Edition matrices support easy identification of shared (and outlier) techniques among multiple threats, and quick & easy overlay or pivoting to defensive & offensive security capabilities relevant to your own #security stack. We’ll have a blog out soon reviewing our analysis of top & trending techniques common among these initial access threats

    Tidal’s #Adversary Intelligence team remains focused on providing up-to-date #TTPintelligence, especially around traditionally under-represented yet widely relevant threats like crimeware. Other popular matrices in this theme include our Ransomware & Data Extortion Landscape matrix (app.tidalcyber.com/share/9a0fd) and Major & Emerging Infostealers matrix (app.tidalcyber.com/share/ec62f), which each cover 20+ threats

    Financially motivated adversaries often display a rapid pace of #TTP evolution, and this is especially apparent for #initialaccess threats. Register for our webinar on May 31 dedicated to TTP evolution, its drivers, and discussion around what defenders can do to address it and its implications: hubs.la/Q01NC23k0

    #SharedWithTidal #threatinformeddefense #malware #infostealer #cryptominer #IAB #blueteam #detectionengineering #purpleteam #cyber