Want to try #Mastodon on a security and privacy focused instance? https://defcon.social/ now is also available on #Tor as an .onion site - our servers, our moderators, and our Code of conduct.
About us
Computer Hacking Conference
- Website
-
https://defcon.org/
External link for DEF CON
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- Seattle, Washington
- Type
- Privately Held
- Founded
- 1992
Locations
-
Primary
Seattle, Washington 98121, US
-
Seattle, US
Employees at DEF CON
-
Jeff Moss
-
Taylor Banks
Hacker | Firefighter | Mentor | GTM @ GroupSense | Built DC404 | 27 Years in Cyber Offense + Defense | Threat Intel & Public Service
-
Marcos Della
Distinguished Technologist - Cloud Architect (DevOps, Security, Networking)
-
Greg Conti
Principal at Kopidion Cybersecurity
Updates
-
DEF CON reposted this
If you're looking to level up your Ghidra skills - this is a great course for all skill levels! Josh is the real deal
#DEFCONTraining Las Vegas Spotlight Alert 🚨 : On August 11-12, John McIntosh will be leading “Everyday Ghidra: Practical Windows Reverse Engineering.” In this course, you will learn how to use Ghidra effectively to reverse engineer Windows binaries. While Ghidra is at the heart of our curriculum, we go far beyond a simple user manual. This course is designed to help you master Windows reverse engineering techniques by using Ghidra as your primary tool. You will start with the basics of Ghidra, such as creating projects, importing and analyzing binaries, and using Ghidra’s native tools. You will then learn how to customize Ghidra to suit your needs, such as building custom data types and configuring optimal analysis. From there, you will complete progressive labs that will teach you to apply both static and dynamic analysis techniques to dive deep into Windows application behavior using Ghidra’s Windows-specific features and scripts. Sign up today or browse the course offerings at https://lnkd.in/e6Kf3WGe #defcon #defcon33 #cyber #cybersecurity #training #cybertraining #infosec #cyberdefense #hacking #ghidra #reverseengineering #windows
-
-
DEF CON reposted this
DEF CON legal update: Truth is a complete defense against defamation. The Christopher Hadnagy lawsuit against us is over. Summary judgement. Dismissed, with prejudice. We look forward to returning our full attention to the community and conference we love. We also thank everyone who came forward to help keep our community safe. We know it’s not an easy choice, but the world is better for it. This victory is encouraging. We hope it makes attendees feel safe reporting CoC violations . We hope it demonstrates our commitment to protecting attendees from misconduct. Mostly, we hope our amazing community will continue looking out for each other. We will always have your back. You can read the judgment here https://lnkd.in/eK_xBTjK . Stay tuned for a more detailed report. #defcon #legalupdate https://lnkd.in/ecXYUKpk
-
DEF CON reposted this
We've raised over $25,000 in just the first week thanks to your support and the matching funds from the Friends of Tor! 👏👏 Let's keep the momentum going and reach our goal. Share the news and spread the word to help us get there! Our Friends of Tor are still matching each donation 1:1, up to $5,000. That means if you donate $25 now, the Friends of Tor will match your gift by donating $25, doubling your impact to a total of $50. https://lnkd.in/gj62yQ_h
-
-
DEF CON reposted this
We sense a disturbance in the force…registration is open for #DEFCONTraining Las Vegas 2025! Whether you are a Red (lightsaber) Teamer, Blue (lightsaber) Teamer, resisting the Empire (APTs), or learning to channel the Force to attack and defend IoT devices, there is something for anyone, from any planet in the galaxy! Pack up your droids and join us in Vegas! Register today and take advantage of this opportunity to train with our Jedi Masters - uh, we mean instructors. Sign up here: https://lnkd.in/e6Kf3WGe #training #cyber #cybersecurity #infosec #cybertraining #cyberdefense #defcon33 #defcon #maythe4th #may4 #starwarsday #starwars #jedi #sith #darkside #lightsaber
-
-
DEF CON reposted this
This year we’ve expanded our offerings to include 4-day courses and Saturday-Sunday options. Considering attending your first #DEFCON? All 4-day and weekend courses include entry into DEF CON on Friday. Check out the options and take advantage of the limited-time #earlybird $200 discount today: training.defcon.org #training #cyber #cybersecurity #infosec #cybertraining #hacking #AI #cyberdefense #coding #IT #defcon33
-
DEF CON reposted this
#DEFCONTraining Las Vegas Registration is officially open! Expanded menu with dozens of course options, new 4-day trainings and a $200 #earlybird discount. Join us in August for #DEFCON style hands-on technical training from our world-class trainers. Information and signup at http://training.defcon.org. Reserve your spot now!
-
-
A big Christopher Hadnagy vs. DEF CON Lawsuit update! With the discovery phase complete we have filed a motion for summary judgement. In it we reveal some of the identities of those who testified regarding their experiences with Chris, and I would like to personally thank them for standing up for our community when remaining silent would have been easier. The legal standard for evaluating a summary judgement motion means giving the benefit of the doubt to the nonmoving party (Hadnagy) on all disputed facts. Because of this we focused on the undisputed facts, including the documents and deposition testimony, that Chris can’t deny. Should this motion fail then we would start preparing for trial, and end up arguing over the disputed facts as well. Both sides will be done with briefing in approximately one month. After briefing is complete we expect the judge to rule on the motion within a couple weeks to a couple months. Thank you everyone for continuing to support DEF CON, and a special thank you to all those who came forward in the ongoing lawsuit. Jeff Moss, President, DEF CON Communications. Motion for Summary Judgement: https://lnkd.in/gZSGZeG5 Supporting depositions and records here: https://lnkd.in/gnn9ny_N
-
-
DEF CON reposted this
"Tor is safer because it serves everyone—from human rights defenders to military personnel, and everybody in between. "You can’t have an anonymity system only for cancer survivors, or everybody can guess why you’re using it." 🔖 Read the full interview with Roger Dingledine on the CloudFest blog: https://lnkd.in/grMcunJe
-
DEF CON reposted this
👾DEF CON is my favorite event every year—if you haven’t seen the Inaugural edition of their Hackers’ Almanack, check it out here: https://lnkd.in/eCKCPePw. I particularly enjoyed Sven Cattell’s discussion on AI red-teaming (aka “AI red-teaming is bulls**t”) as it aligns with the secure-by-design movement to ensure that the technology we rely on is built and delivered with security as a top priority: “As Al and Machine Learning are aggressively integrated into the products we rely on, companies and society must do a better job making models trustworthy and ensure they are deployed safely and securely. While policymakers are often told to focus on ‘red teaming’ Al, a collection of great hacks has not resulted in systems being made secure. “In order to engineer effective Al that protects against hallucination, bias, or prompt-injection, we need to think first about what these Al systems are supposed to do—or not—in a systematic way, which will require design, definition, and testing (including, but not limited to red-team sorts of attacks). This means improvements to "foundation models," complementing and backstopping the improvements hoped for in complete systems. “Al companies prefer focusing on systems, perhaps because they want to protect trade secrets in how foundation models are trained to resist, but many foundation models have public weights. This is sometimes inaccurately referred to as ‘open source’ models. Hackers know that published weights are more similar to compiled binary code than to source code. It's not easy to read the weights, and it's less easy to make changes, and those are fundamental freedoms we get with open source code…It’s time to move beyond siloed and flawed evaluation and ‘red team processes,’ and change the way that policy makers view Al red teaming. “Without this paradigm shift, we risk taking on a technological revolution without accounting for model trust and security. Thus, we must urgently bring together the Al and security community to develop security analysis methods, based on the intended use of a particular Al and knowledge of potential harms should that Al perform erroneously.” Kudos to Sven, Jeff Moss, Jake Braun, 😷 Adam Shostack, Policy @ DEF CON, & everyone who contributed to this effort.
-