x33fcon

Avatar

June 9-13, 2025
Location: Gdynia, Poland And Online
Website: https://x33fcon.com/#!index.md

Experience the Welcoming Spirit of x33fcon 2025 in Coastal Gdynia!

Discover x33fcon’s Unique Appeal

From June 9th–13th, 2025, Gdynia, Poland, hosts x33fcon, Europe’s top purple teaming conference. Set on the Baltic Sea, it draws cybersecurity professionals for its dynamic content and vibrant community.

Learn and Connect

x33fcon unites red and blue teams with expert-led talks, hands-on workshops, and a thrilling CTF. Kick off with pre-conference training (June 9th–11th), carefully curated to sharpen skills with cutting-edge red and blue team techniques, from AI security to operational purple teaming. The main event (June 12th –13th ) at Pomeranian Science and Technology Park offers innovative talks, tools and networking.

Celebrate at Unforgettable Social Events

The “Pirate Ship” afterparty on June 12th features a Baltic sunset sail, followed by stars and celebration. Miss the ship? Join the seaside restaurant afterparty. These moments highlight x33fcon’s mix of professional value and lasting bonds.

Experience Gdynia’s Coastal Charm

Gdynia’s beaches, eateries, and mild June weather enhance the modern venue’s accessibility, making x33fcon unforgettable.

Act Now to Join

Spots are limited—register today and seize an opportunity you’ll cherish!

Registration link for training – https://x33fcon.com/#!training.md#Training_Registration

Registration link for conference – https://x33fcon.com/#!conference.md#Conference_Registration

Stay Connected

https://www.x33fcon.com

https://www.twitter.com/x33fcon

https://youtube.com/c/x33fcon

https://linkedin.com/company/x33fcon

 

Total
0
Shares
Previous Post

⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More

Next Post

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Related Posts

PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack

A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET. "The attackers replaced the legitimate installer with one that also deployed the group's signature implant that we have named SlowStepper – a
Avatar
Read More

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections

A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware. The flaw, CVE-2025-0411 (CVSS score: 7.0), allows remote attackers to circumvent mark-of-the-web (MotW) protections and execute arbitrary code in the context of the current user. It was addressed by 7-Zip in November 2024 with version 24.09. "The vulnerability was
Avatar
Read More