defcon Profile Banner
DEF CON Profile
DEF CON

@defcon

Followers
448K
Following
7K
Media
2K
Statuses
22K

Hacking Conference https://t.co/GhIrTjDOLO

Las Vegas, NV
Joined May 2008
Don't wanna be here? Send us removal request.
@defcon
DEF CON
3 days
Some more images from the calm before #defconbahrain - our demo labs prepped for demonstration and the info desk ready to inform. You can find out more #defcon at the #arabinternationalcybersecurityconference here: https://t.co/5kDiQOPL9D @NCSC_BH @AicsExpo
0
1
22
@defcon
DEF CON
8 days
#ICYMI: DEF CON Training is Coming to Singapore! Calling all security professionals and trainers: applications are still open for the inaugural DEF CON Training session in Singapore! DEF CON Singapore—co-hosted with HTX (Home Team Science & Technology Agency) and the Centre for
0
3
16
@elliotfleck
Elliot Fleck
9 days
If you run paid ads or have ever wanted to, watch AI speedrun cross-platform analytics in under 15 seconds. you're about 4 clicks away from never opening Meta/Google Ads Manager again
5
7
179
@defcon
DEF CON
23 days
(There is still time to register to join us for #DEFCONTraining at the Arab International Cybersecurity Conference & Exhibition (@aics.expo )hosted by the National Cyber Security Center Bahrain. (@ncsc_bh ) Still on the fence? Here’s what past students had to say: “My first DEF
1
3
9
@defcon
DEF CON
25 days
We are thrilled to be bringing our world-class, hands-on instruction to the Middle East for the first time ever! We are joining the @aics.expo , hosted by the @ncsc_bh Trainings will run November 3-4, leaving plenty of time to stick around for AICS and check out even more DEF
3
5
29
@defcon
DEF CON
1 month
Our #DEFCONTraining Bahrain Spotlight today is Madhu Akula’s “Securing the Future: Defending Kubernetes & Cloud-Native Infrastructure in the Age of AI” on November 3 & 4. Defending containerized workloads and cloud-native infrastructure is more critical than ever. Recent
0
1
8
@defcon
DEF CON
1 month
Today’s #DEFCONTraining Bahrain Spotlight is “Hacking Cryptography for Defenders” with Ruben Gonzalez and Aaron Kaiser on November 3 & 4.   This course will teach you how applied cryptography works, how it's commonly misused in the field and how this leads to exploitable bugs.
2
1
18
@defcon
DEF CON
1 month
#DEFCONTraining Bahrain Spotlight - Join us November 3-4 for “Wall of Sheep Hands-on Threat Hunting” with Brian Markus, Matt Tiner, Ian Foster, and Ernest Linchangco. This 2-day course will introduce students to the art of threat hunting, focusing on the use of packet analysis
0
4
8
@defcon
DEF CON
1 month
Scheduled for September 16 (9:15 am) #DEFCONTraining Bahrain Spotlight - Join Giovanni Rattaro and Marco Giorgi on November 3 & 4 for “Digital Forensics Investigations with the Tsurugi Linux Team.”   As cyber threats grow in scale and complexity, the ability to rapidly detect,
0
2
8
@defcon
DEF CON
1 month
We have a deep lineup of courses for #DEFCONTraining at the @AicsExpo, covering topics including AI security, software supply chain, digital forensics, cryptography, telecom security and defense, incident response, and more. Training is less than two months away! Explore our
0
6
24
@defcon
DEF CON
3 months
17
20
124
@BiaSciLab
Bia! Ⓥ
3 months
The leaders have spoken. I have officially become the newest member of the Cult of the Dead Cow May this group live on forever .ooM
32
29
493
@RachelTobac
Rachel Tobac
3 months
I can’t wait for you all to see the @socialproofsec @defcon 33 Clue Hunt tomorrow. Last year it was very long and challenging. This year it’s very short and only slightly challenging! 🤖🤘 The Top Prize is v cool in my opinion ◡̈
4
11
79
@defcon
DEF CON
4 months
#DEFCON Founder Jeff Moss is in Bahrain promoting our participation in the Arab International Cybersecurity Conference (AICS) and Exhibition November 5-6, 2025. We'll be working with @NCSC_BH to bring a sampling of our villages, workshops and contests to the cutting-edge
3
13
74
@defcon
DEF CON
4 months
More days. More hacking. More Vegas. Join us for our first-ever four-day courses this August 9-12. These longer courses will cover more ground, dive deeper, and push you further. Las Vegas awaits – sign up today! https://t.co/w6j7xHI8JE #defcon #defcon33 #defcontraining
8
14
61
@cloudvillage_dc
Cloud Village
5 months
🧠 Friday Cloud Quiz 🧠 You find credentials for an IAM user in a CI/CD system. The user can call sts:AssumeRole — but only if an External ID is provided. You don’t have the ID. 😈 How might you still exploit this? A) Brute force External ID B) Use access elsewhere to find logs
3
6
22
@MalwareVillage
Malware Village
5 months
Leigh Trinity (@LeighGi66657535) will be hosting the workshop “Binary Exploitation Basics” at #MalwareVillage @DEFCON 33! 📣 This workshop is a hands-on introduction to binary exploits used in malware! 👾 Sign-up: https://t.co/Mz6VpiaJss
5
20
80