We are putting the finishing touches on launching all the main stage presentations from #DefCon this year. They will launch on both YouTube and our media server at this week. While we were reviewing content we also found past Village presentations from DC 29, 30, 31, and 32 that we didn’t have on-line, over 200 more added to our archives! image
More #defcon in the news with @npub1klcn...h6ke ! Kudos to the team at #defconfranklin for hooking up talented volunteers with infrastructure projects that need attention. Nice to see hackers getting good attention for good reasons. If you're interested in learning more about the opportunities available, visit defconfranklin.com https://www.npr.org/2025/09/20/nx-s1-5525957/water-supply-hack
Today’s #DEFCONTraining Bahrain Spotlight is “AI SecureOps: Defending AI Applications and Services” with Abhinav Singh on November 3 & 4. Can prompt injections lead to complete infrastructure takeovers? Could AI applications be exploited to compromise backend services? Can data poisoning in AI copilots impact a company's stock? Can jailbreaks create false crisis alerts in security systems? This immersive, CTF-styled training in GenAI and LLM security dives into these pressing questions. Engage in realistic attack and defense scenarios focused on real-world threats, from prompt injection and remote code execution to backend compromise. Tackle hands-on challenges with actual AI applications to understand vulnerabilities and develop robust defenses. You’ll learn how to create a comprehensive security pipeline, mastering AI red and blue team strategies, building resilient defenses for LLMs, and handling incident response for AI-based threats. Additionally, implement a Responsible AI (RAI) program to enforce ethical AI standards across enterprise services, fortifying your organization’s AI security foundation. Review the full course description and sign up today: https://training.defcon.org/collections/arab-cybersecurity-2025/products/abhinav-singh-ai-secureops-defending-ai-applications-and-services-dctac2025 See the full list of courses offered here: #defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #AI #defendingAI image
#DEFCONTraining Bahrain Spotlight - “Advanced Cloud Incident Response” with Korstiaan Stam on November 3-4. This hands-on two-day training offers a comprehensive guide to incident response in the Microsoft cloud, covering various topics essential for handling threats and attacks. The best part of the training is that everything you learn, you'll apply with hands-on labs in a CTF like environment. Read the full description and register today: https://training.defcon.org/collections/arab-cybersecurity-2025/products/korstiaan-stam-advanced-cloud-incident-response-dctac2025 Explore the full list of offerings at @Arab International Cybersecurity Conference & Exhibition @National Cyber Security Center Bahrain. #defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #cloud #incidentresponse image
Today we have another #DEFCONTraining Bahrain Spotlight - “A Complete Practical Approach to Malware Analysis & Threat Hunting with Memory Forensics, Endpoint Telemetry, & AI-Driven Hunting” with Monnappa K A and Sajan Shetty on November 3-4. This 2-day intensive, hands-on training teaches the concepts, tools, and techniques required to analyze, investigate, and hunt malware by combining four powerful approaches: malware analysis, reverse engineering, memory forensics, and endpoint telemetry-based threat hunting. The course begins with the foundations of malware analysis, Windows internals, and memory forensics, before moving into advanced concepts of malware investigation and hunting adversary techniques. What makes this training unique and future-ready is the introduction to the concept of AI-powered autonomous hunting with the Garuda Threat Hunting Framework. Take a deeper look and register for this course today: https://training.defcon.org/collections/arab-cybersecurity-2025/products/monnappa-k-a-a-complete-practical-approach-to-malware-analysis-threat-hunting-using-memory-forensics-dctlv2025-copy Explore the full list of offerings in Bahrain at #defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #malwareanalysis #threathunting #memoryforensics #AI #endpointtelemetry image
We have a deep lineup of courses for #DEFCONTraining at the Arab International Cybersecurity Summit, covering topics including AI security, software supply chain, digital forensics, cryptography, telecom security and defense, incident response, and more. Training is less than two months away! Explore our full course list and secure your spot today for the chance to be part of DEF CON’s inaugural event in the Middle East! #defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #AI #cloud #incidentresponse #telecom #forensics #cryptography