x33fcon

Avatar

June 9-13, 2025
Location: Gdynia, Poland And Online
Website: https://x33fcon.com/#!index.md

Experience the Welcoming Spirit of x33fcon 2025 in Coastal Gdynia!

Discover x33fcon’s Unique Appeal

From June 9th–13th, 2025, Gdynia, Poland, hosts x33fcon, Europe’s top purple teaming conference. Set on the Baltic Sea, it draws cybersecurity professionals for its dynamic content and vibrant community.

Learn and Connect

x33fcon unites red and blue teams with expert-led talks, hands-on workshops, and a thrilling CTF. Kick off with pre-conference training (June 9th–11th), carefully curated to sharpen skills with cutting-edge red and blue team techniques, from AI security to operational purple teaming. The main event (June 12th –13th ) at Pomeranian Science and Technology Park offers innovative talks, tools and networking.

Celebrate at Unforgettable Social Events

The “Pirate Ship” afterparty on June 12th features a Baltic sunset sail, followed by stars and celebration. Miss the ship? Join the seaside restaurant afterparty. These moments highlight x33fcon’s mix of professional value and lasting bonds.

Experience Gdynia’s Coastal Charm

Gdynia’s beaches, eateries, and mild June weather enhance the modern venue’s accessibility, making x33fcon unforgettable.

Act Now to Join

Spots are limited—register today and seize an opportunity you’ll cherish!

Registration link for training – https://x33fcon.com/#!training.md#Training_Registration

Registration link for conference – https://x33fcon.com/#!conference.md#Conference_Registration

Stay Connected

https://www.x33fcon.com

https://www.twitter.com/x33fcon

https://youtube.com/c/x33fcon

https://linkedin.com/company/x33fcon

 

Total
0
Shares
Previous Post

Lab provider for Planned Parenthood discloses breach affecting 1.6 million people

Next Post

Ransomware disrupts some operations of kidney dialysis company DaVita

Related Posts

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

For many organizations, identity security appears to be under control. On paper, everything checks out. But new research from Cerby, based on insights from over 500 IT and security leaders, reveals a different reality: too much still depends on people—not systems—to function. In fact, fewer than 4% of security teams have fully automated their core identity workflows. Core workflows, like
Avatar
Read More

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and give attackers the access they need. Left undetected, these threats can lead to credential theft, unauthorized access, and even full-scale breaches. As phishing techniques become more evasive, they can no longer be reliably caught by automated solutions alone. Let’s take
Avatar
Read More