Cycom Hacking Conference

[[{“value”:”

Name : Cycom Hacking Conference
Website: https://www.cycomhackingconference.com/
Date: April 23-24, 2026
Location: Montpellier, France
The CYCOM Hacking Conference is the annual cybersecurity event organized by Devensys Cybersecurity. A key event in Montpellier and Occitanie, CYCOM brings together the entire cybersecurity ecosystem for several days: professionals, technical experts, students, specialized schools, institutions, local authorities, technology partners, and industry associations.

Designed as a technical, educational, and community event, CYCOM highlights offensive, defensive, and operational cybersecurity practices through a packed program of conferences, demonstrations, feedback sessions, round tables, workshops, technical presentations, and professional meetings.
The event also includes highly anticipated highlights, such as its nighttime Capture The Flag (CTF), a hacking challenge lasting several hours that brings together enthusiasts, student teams, and experienced technical professionals.

Before the opening, a half-day event called EDUCYCOM is entirely dedicated to schools, students, and people undergoing retraining. It offers orientation workshops, introductions to major certifications (CCT, CEH, CISSP, OSCP), and an educational “hackathon” on cybersecurity.

CYCOM has two main goals:

  1. To share a high level of technical expertise in an accessible and practical way.
  2. To encourage networking and discussion between different players in the digital sector, both public and private.

Held at Kiasma in Castelnau-le-Lez (Montpellier Métropole), CYCOM welcomes several hundred participants each year and continues to expand its format with new activities, more conferences, and a growing partner village.

Book Your Seat

“}]] 

Total
0
Shares
Previous Post

Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

Next Post

Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

Related Posts

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization's network to other high-value assets. That said, the Microsoft Defender Security Research Team said it's not clear whether the activity weaponized recently
Read More

Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks

Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and SGLang. "These vulnerabilities all traced back to the same root cause: the overlooked unsafe use of ZeroMQ (ZMQ) and Python's pickle deserialization,"
Read More