NorthSec

A community-run cybersecurity event offering world-class talks, trainings & a 48-hour, on-site capture-the-flag competition. Every May in MontrĂ©al since 2013 🇹🇩 Publications en français et en anglais.

Location
MontrĂ©al, QC 🇹🇩
Trainings
May 11-13, 2026
Conference
May 14-15, 2026
Competition
May 15-17, 2026
2026-03-11

🟣 đ—„đ—Čđ—»đ—±đ—Œđ—»đ˜€ đ—»đ—Œđ˜đ—żđ—Č đ—°đ—Œđ—șđ—șđ˜‚đ—»đ—źđ˜‚đ˜Ă© đ—œđ—č𝘂𝘀 đ—¶đ—»đ—°đ—čđ˜‚đ˜€đ—¶đ˜ƒđ—Č! ‱ 𝗟đ—Č𝘁'𝘀 đ—ș𝗼𝗾đ—Č đ—Œđ˜‚đ—ż đ—°đ—Œđ—șđ—șđ˜‚đ—»đ—¶đ˜đ˜† đ—șđ—Œđ—żđ—Č đ—¶đ—»đ—°đ—čđ˜‚đ˜€đ—¶đ˜ƒđ—Č!

Tu fais partie d'un groupe sous-reprĂ©sentĂ© et tu rĂȘves de participer Ă  un CTF enivrant? NorthSec te donne ta chance!

Ce que tu peux gagner: 1 billet CTF à gagner (jusqu'à 8 personnes seront sélectionnées)

👉 Date limite: 13 mars

Envoie ta lettre de motivation et ton CV. Partage cette initiative avec toutes les personnes qui pourraient ĂȘtre intĂ©ressĂ©es! nsec.io/fr/diversity/

Are you part of an underrepresented group and dream of participating in an exciting CTF? NorthSec is giving you the chance!

What you can win: 1 CTF ticket (up to 8 people will be chosen)

👉 Deadline: March 13

Send your cover letter and resume. Share this initiative with anyone who might be interested! nsec.io/diversity/

#womenintech #cybersecurity #infosec #NorthSec

2026-02-18

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (12/12): "Adversary Perspectives: Azure" đ—œđ—źđ—ż/𝗯𝘆 Hope Walker (SpecterOps)

📅 Dates: May 10-13, 2026 (4 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: Remote

Description:
"𝘖𝘳𝘹𝘱𝘯đ˜Șđ˜»đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 đ˜©đ˜ąđ˜·đ˜Š đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜©đ˜Šđ˜ąđ˜„đ˜Ž đ˜Ș𝘯 đ˜”đ˜©đ˜Š đ˜€đ˜­đ˜°đ˜¶đ˜„đ˜Ž, 𝘰𝘳 đ˜ąđ˜” đ˜­đ˜Šđ˜ąđ˜Žđ˜” đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜Șđ˜Żđ˜§đ˜łđ˜ąđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Š. 𝘎𝘰𝘯𝘩 𝘱𝘳𝘩 đ˜”đ˜©đ˜Š đ˜„đ˜ąđ˜ș𝘮 𝘰𝘧 𝘰𝘯-đ˜±đ˜łđ˜Šđ˜ź đ˜„đ˜°đ˜źđ˜ąđ˜Ș𝘯 đ˜€đ˜°đ˜Żđ˜”đ˜łđ˜°đ˜­đ˜­đ˜Šđ˜łđ˜Ž đ˜ąđ˜Żđ˜„ 𝘌đ˜čđ˜€đ˜©đ˜ąđ˜Żđ˜šđ˜Š đ˜Žđ˜Šđ˜łđ˜·đ˜Šđ˜łđ˜Ž. 𝘔đ˜Șđ˜€đ˜łđ˜°đ˜Žđ˜°đ˜§đ˜”â€™đ˜Ž đ˜ˆđ˜»đ˜¶đ˜łđ˜Š đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Šđ˜Ž 𝘰𝘳𝘹𝘱𝘯đ˜Șđ˜»đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 𝘾đ˜Șđ˜”đ˜© đ˜”đ˜©đ˜Š 𝘱𝘣đ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜”đ˜° đ˜„đ˜Šđ˜±đ˜­đ˜°đ˜ș đ˜€đ˜­đ˜°đ˜¶đ˜„ đ˜©đ˜°đ˜Žđ˜”đ˜Ž đ˜ąđ˜Żđ˜„ đ˜Žđ˜Šđ˜łđ˜·đ˜Șđ˜€đ˜Šđ˜Ž đ˜”đ˜° đ˜ąđ˜¶đ˜šđ˜źđ˜Šđ˜Żđ˜”, 𝘰𝘳 đ˜Ș𝘯 𝘮𝘰𝘼𝘩 đ˜€đ˜ąđ˜Žđ˜Šđ˜Ž, đ˜łđ˜Šđ˜±đ˜­đ˜ąđ˜€đ˜Š 𝘩đ˜čđ˜Șđ˜Žđ˜”đ˜Ș𝘯𝘹 đ˜§đ˜¶đ˜Żđ˜€đ˜”đ˜Ș𝘰𝘯𝘱𝘭đ˜Șđ˜”đ˜ș đ˜€đ˜°đ˜źđ˜±đ˜­đ˜Šđ˜”đ˜Šđ˜­đ˜ș. 𝘈𝘭𝘭 𝘰𝘧 đ˜”đ˜©đ˜Šđ˜Žđ˜Š 𝘯𝘩𝘾 đ˜€đ˜­đ˜°đ˜¶đ˜„ đ˜ąđ˜Žđ˜Žđ˜Šđ˜”đ˜Ž đ˜Żđ˜Šđ˜Šđ˜„ đ˜±đ˜łđ˜°đ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯, đ˜Łđ˜°đ˜”đ˜© đ˜”đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© đ˜”đ˜łđ˜ąđ˜„đ˜Șđ˜”đ˜Ș𝘰𝘯𝘱𝘭 đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Șđ˜·đ˜Š đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜źđ˜Šđ˜ąđ˜Žđ˜¶đ˜łđ˜Šđ˜Ž, đ˜ąđ˜Żđ˜„ 𝘰𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜ąđ˜Žđ˜Žđ˜Šđ˜Žđ˜Žđ˜źđ˜Šđ˜Żđ˜”đ˜Ž. 𝘍𝘰𝘳 𝘯𝘩𝘾 đ˜ąđ˜Żđ˜„ đ˜·đ˜Šđ˜”đ˜Šđ˜łđ˜ąđ˜Ż đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜±đ˜łđ˜°đ˜§đ˜Šđ˜Žđ˜Žđ˜Ș𝘰𝘯𝘱𝘭𝘮 𝘱𝘭đ˜Ș𝘬𝘩, đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„đ˜Ș𝘯𝘹 đ˜©đ˜°đ˜ž đ˜”đ˜©đ˜Šđ˜Žđ˜Š 𝘯𝘩𝘾 đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜°đ˜­đ˜°đ˜šđ˜Ș𝘩𝘮 𝘾𝘰𝘳𝘬 đ˜ąđ˜Żđ˜„ đ˜”đ˜©đ˜Š đ˜Żđ˜¶đ˜ąđ˜Żđ˜€đ˜Šđ˜Ž 𝘰𝘧 đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Šđ˜ź đ˜€đ˜ąđ˜Ż đ˜Čđ˜¶đ˜Șđ˜€đ˜Źđ˜­đ˜ș đ˜Łđ˜Šđ˜€đ˜°đ˜źđ˜Š đ˜€đ˜°đ˜źđ˜±đ˜­đ˜Șđ˜€đ˜ąđ˜”đ˜Šđ˜„. đ˜ˆđ˜„đ˜·đ˜Šđ˜łđ˜Žđ˜ąđ˜łđ˜ș đ˜—đ˜Šđ˜łđ˜Žđ˜±đ˜Šđ˜€đ˜”đ˜Șđ˜·đ˜Šđ˜Ž: đ˜ˆđ˜»đ˜¶đ˜łđ˜Š 𝘱đ˜Ș𝘼𝘮 đ˜”đ˜° đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Š đ˜±đ˜ąđ˜łđ˜”đ˜Șđ˜€đ˜Șđ˜±đ˜ąđ˜Żđ˜”đ˜Ž 𝘾đ˜Șđ˜”đ˜©đ˜°đ˜¶đ˜” đ˜±đ˜łđ˜Šđ˜·đ˜Șđ˜°đ˜¶đ˜Ž đ˜ˆđ˜»đ˜¶đ˜łđ˜Š 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Š 𝘾đ˜Șđ˜”đ˜© 𝘱 𝘮𝘰𝘭đ˜Șđ˜„ đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„đ˜Ș𝘯𝘹 𝘰𝘧 đ˜©đ˜°đ˜ž đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜łđ˜Ž 𝘭𝘰𝘰𝘬 đ˜ąđ˜” 𝘔đ˜Șđ˜€đ˜łđ˜°đ˜Žđ˜°đ˜§đ˜” đ˜ˆđ˜»đ˜¶đ˜łđ˜Š, đ˜Șđ˜”đ˜Ž đ˜ąđ˜¶đ˜”đ˜©đ˜Šđ˜Żđ˜”đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜źđ˜Šđ˜€đ˜©đ˜ąđ˜Żđ˜Ș𝘮𝘼𝘮, đ˜ąđ˜Żđ˜„ đ˜©đ˜°đ˜ž đ˜”đ˜©đ˜Šđ˜ș đ˜€đ˜°đ˜źđ˜źđ˜°đ˜Żđ˜­đ˜ș đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜ˆđ˜»đ˜¶đ˜łđ˜Š-đ˜Łđ˜ąđ˜Žđ˜Šđ˜„ đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž."

About the trainer:
Hope Walker (@icemoonhsv) is a Principal Consultant at SpecterOps with experience in conducting and leading red team operations. Prior to joining SpecterOps, she conducted research, led red team process improvement efforts, trained new operators, and managed the operations floor for a DoD Red Team. Hope holds four degrees from the University of Alabama in Huntsville including a master’s in cyber security and was a recipient of the National Science Foundation Cyber Corps scholarship.

🔗 Training details: nsec.io/training/2026-adversar

#NorthSec #cybersecurity #Azure #cloudsecurity #offensivesecurity

2026-02-18

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (11/12): "Practical AI Security - Go Beyond Theory: Build, Break, and Defend" đ—œđ—źđ—ż/𝗯𝘆 Harish Ramadoss

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: On-Site

Description: Learn AI security from first principles with a Build, Break, Defend approach. Build production-grade GenAI applications using LLM APIs, embeddings, RAG pipelines, agentic systems, and MCPs. Attack real applications through prompt injection, sensitive data disclosure, and MCP exploitation. Implement guardrails, MCP gateways for observability, and agentic security patterns. Integrate AI security tooling into your SDLC.

About the trainer:
Harish Ramadoss has several years of expertise in Product Security, Red Teaming, and Security Research. Previously, he was a Principal at Trustwave Spiderlabs, where he led their Application Security efforts. He joined Rippling as a founding member of the Security Engineering team and leads their AI Security and Appsec efforts. Harish built DejaVu, an open-source deception platform. He has presented at Black Hat, DEFCON, HITB, and other conferences globally.

🔗 Training details: nsec.io/training/2026-practica

#NorthSec #cybersecurity #AI #aisecurity #generativeai

2026-02-16

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (10/12): "Offensive GCP Operations & Tactics Certification (OGOTC)" đ—œđ—źđ—ż/𝗯𝘆 Chirag Savla & Jay Pandya

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: Hybrid (on-site & remote)

Description: "𝘖𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š 𝘎𝘊𝘗 đ˜–đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 & đ˜›đ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜Ž đ˜Šđ˜Šđ˜łđ˜”đ˜Ș𝘧đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯 (𝘖𝘎𝘖𝘛𝘊) đ˜Ș𝘮 𝘱𝘯 đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š đ˜„đ˜Šđ˜Žđ˜Șđ˜šđ˜Żđ˜Šđ˜„ đ˜”đ˜° 𝘩đ˜Čđ˜¶đ˜Șđ˜± đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜±đ˜łđ˜°đ˜§đ˜Šđ˜Žđ˜Žđ˜Ș𝘰𝘯𝘱𝘭𝘮 𝘾đ˜Șđ˜”đ˜© đ˜”đ˜©đ˜Š 𝘮𝘬đ˜Ș𝘭𝘭𝘮 đ˜”đ˜° 𝘱𝘮𝘮𝘩𝘮𝘮 đ˜ąđ˜Żđ˜„ 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜” đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜Ș𝘯 𝘎𝘰𝘰𝘹𝘭𝘩 đ˜Šđ˜­đ˜°đ˜¶đ˜„ đ˜—đ˜­đ˜ąđ˜”đ˜§đ˜°đ˜łđ˜ź (𝘎𝘊𝘗) đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž. đ˜›đ˜©đ˜Ș𝘮 đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š đ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Ž đ˜”đ˜©đ˜Š đ˜§đ˜¶đ˜­đ˜­ đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź 𝘭đ˜Șđ˜§đ˜Šđ˜€đ˜șđ˜€đ˜­đ˜Š, 𝘧𝘳𝘰𝘼 đ˜Ș𝘯đ˜Șđ˜”đ˜Ș𝘱𝘭 đ˜ąđ˜€đ˜€đ˜Šđ˜Žđ˜Ž đ˜ąđ˜Żđ˜„ đ˜Šđ˜Żđ˜¶đ˜źđ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜”đ˜° đ˜±đ˜łđ˜Șđ˜·đ˜Ș𝘭𝘩𝘹𝘩 đ˜Šđ˜Žđ˜€đ˜ąđ˜­đ˜ąđ˜”đ˜Ș𝘰𝘯, đ˜­đ˜ąđ˜”đ˜Šđ˜łđ˜ąđ˜­ đ˜źđ˜°đ˜·đ˜Šđ˜źđ˜Šđ˜Żđ˜”, đ˜ąđ˜Żđ˜„ đ˜±đ˜°đ˜Žđ˜”-𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Šđ˜Ž. đ˜—đ˜ąđ˜łđ˜”đ˜Șđ˜€đ˜Șđ˜±đ˜ąđ˜Żđ˜”đ˜Ž 𝘾đ˜Ș𝘭𝘭 𝘭𝘩𝘱𝘳𝘯 đ˜”đ˜° đ˜ąđ˜Łđ˜¶đ˜Žđ˜Š 𝘼đ˜Șđ˜Žđ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜šđ˜¶đ˜łđ˜Šđ˜„ 𝘐𝘈𝘔 𝘳𝘰𝘭𝘩𝘮, 𝘩đ˜čđ˜±đ˜°đ˜Žđ˜Šđ˜„ 𝘈𝘗𝘐𝘮, đ˜ąđ˜Żđ˜„ đ˜źđ˜Šđ˜”đ˜ąđ˜„đ˜ąđ˜”đ˜ą đ˜Žđ˜Šđ˜łđ˜·đ˜Șđ˜€đ˜Šđ˜Ž, 𝘱𝘮 𝘾𝘩𝘭𝘭 𝘱𝘮 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜” 𝘾𝘩𝘱𝘬 đ˜±đ˜Šđ˜łđ˜źđ˜Ș𝘮𝘮đ˜Ș𝘰𝘯𝘮 đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜§đ˜ąđ˜¶đ˜­đ˜” đ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜šđ˜¶đ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮. đ˜›đ˜©đ˜Š đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š 𝘱𝘭𝘮𝘰 đ˜Șđ˜Żđ˜€đ˜­đ˜¶đ˜„đ˜Šđ˜Ž 𝘱 đ˜„đ˜Šđ˜Šđ˜± đ˜„đ˜Șđ˜·đ˜Š đ˜Șđ˜Żđ˜”đ˜° đ˜’đ˜¶đ˜Łđ˜Šđ˜łđ˜Żđ˜Šđ˜”đ˜Šđ˜Ž đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Ž, đ˜©đ˜Șđ˜šđ˜©đ˜­đ˜Șđ˜šđ˜©đ˜”đ˜Ș𝘯𝘹 đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜€đ˜°đ˜źđ˜±đ˜łđ˜°đ˜źđ˜Ș𝘮𝘩 đ˜ąđ˜Żđ˜„ đ˜źđ˜°đ˜·đ˜Š 𝘾đ˜Șđ˜”đ˜©đ˜Ș𝘯 đ˜’đ˜¶đ˜Łđ˜Šđ˜łđ˜Żđ˜Šđ˜”đ˜Šđ˜Ž đ˜€đ˜­đ˜¶đ˜Žđ˜”đ˜Šđ˜łđ˜Ž. 𝘙𝘩𝘱𝘭-đ˜žđ˜°đ˜łđ˜­đ˜„ đ˜Žđ˜€đ˜Šđ˜Żđ˜ąđ˜łđ˜Ș𝘰𝘮, đ˜Șđ˜Żđ˜€đ˜­đ˜¶đ˜„đ˜Ș𝘯𝘹 đ˜€đ˜łđ˜Šđ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘱𝘭 đ˜”đ˜©đ˜Šđ˜§đ˜”, đ˜±đ˜©đ˜Șđ˜Žđ˜©đ˜Ș𝘯𝘹, đ˜ąđ˜Żđ˜„ đ˜Žđ˜Šđ˜łđ˜·đ˜Șđ˜€đ˜Š đ˜ąđ˜€đ˜€đ˜°đ˜¶đ˜Żđ˜” đ˜©đ˜Șđ˜«đ˜ąđ˜€đ˜Źđ˜Ș𝘯𝘹, 𝘾đ˜Ș𝘭𝘭 𝘣𝘩 𝘩đ˜čđ˜±đ˜­đ˜°đ˜łđ˜Šđ˜„. 𝘋𝘩𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Šđ˜šđ˜Ș𝘩𝘮 đ˜ąđ˜Żđ˜„ 𝘼đ˜Șđ˜”đ˜Șđ˜šđ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Šđ˜Ž 𝘾đ˜Ș𝘭𝘭 𝘣𝘩 đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Šđ˜„ đ˜”đ˜° đ˜©đ˜Šđ˜­đ˜± đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Š 𝘎𝘊𝘗 đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž 𝘱𝘹𝘱đ˜Șđ˜Żđ˜Žđ˜” đ˜”đ˜©đ˜Šđ˜Žđ˜Š đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜”đ˜Ž."

About the trainers:
Chirag Savla is a cyber security professional with 10+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. For fun, he enjoys creating open-source tools and exploring new attack methodologies in his leisure. Chirag has worked extensively on Azure, Active Directory attacks and defense, and bypassing detection mechanisms. He is the author of multiple open source tools such as Process Injection, Callidus, and others. He has presented at many conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, Wild West Hackin’ Fest, HackSpaceCon, VulnCon and NorthSec.

🔗 Training details: nsec.io/training/2026-offensiv

#NorthSec #cybersecurity #cloudsecurity #GCP #pentest

2026-02-13

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (9/12): "Advanced Detection Engineering in the Enterprise" đ—œđ—źđ—ż/𝗯𝘆 Olaf Hartong & Rogier Boon (FalconForce)

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: On-Site

Description: "đ˜đ˜ąđ˜­đ˜€đ˜°đ˜Żđ˜đ˜°đ˜łđ˜€đ˜Š đ˜„đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜±đ˜Šđ˜„ 𝘱 đ˜Žđ˜±đ˜Šđ˜€đ˜Ș𝘱𝘭đ˜Șđ˜Žđ˜” đ˜žđ˜°đ˜łđ˜Źđ˜Žđ˜©đ˜°đ˜± 𝘧𝘰𝘳 đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜±đ˜łđ˜°đ˜§đ˜Šđ˜Žđ˜Žđ˜Ș𝘰𝘯𝘱𝘭𝘮 đ˜”đ˜° đ˜©đ˜Šđ˜­đ˜± đ˜”đ˜ąđ˜Źđ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 𝘩𝘯𝘹đ˜Ș𝘯𝘩𝘩𝘳đ˜Ș𝘯𝘹 đ˜€đ˜ąđ˜±đ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜”đ˜° đ˜”đ˜©đ˜Š 𝘯𝘩đ˜čđ˜” đ˜­đ˜Šđ˜·đ˜Šđ˜­. 𝘈𝘯 đ˜¶đ˜­đ˜”đ˜Șđ˜źđ˜ąđ˜”đ˜Š đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 𝘩𝘯𝘹đ˜Ș𝘯𝘩𝘩𝘳đ˜Ș𝘯𝘹 𝘭𝘩𝘱𝘳𝘯đ˜Ș𝘯𝘹 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Š 𝘾đ˜Șđ˜”đ˜© đ˜”đ˜©đ˜Š đ˜°đ˜±đ˜±đ˜°đ˜łđ˜”đ˜¶đ˜Żđ˜Șđ˜”đ˜ș đ˜”đ˜° 𝘹𝘰 𝘱𝘭𝘭-đ˜Ș𝘯 𝘾đ˜Șđ˜”đ˜© 𝘳𝘩𝘱𝘭-𝘭đ˜Ș𝘧𝘩, đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 𝘭𝘱𝘣 𝘩đ˜čđ˜Šđ˜łđ˜€đ˜Ș𝘮𝘩𝘮. đ˜›đ˜©đ˜Š đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Ž 𝘱 đ˜§đ˜¶đ˜­đ˜­, 𝘳𝘩𝘱𝘭đ˜Șđ˜Žđ˜”đ˜Șđ˜€ đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜ł đ˜Žđ˜€đ˜Šđ˜Żđ˜ąđ˜łđ˜Ș𝘰 đ˜Ș𝘯 𝘱𝘯 đ˜Šđ˜Żđ˜”đ˜Šđ˜łđ˜±đ˜łđ˜Ș𝘮𝘩 đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”: 𝘧𝘳𝘰𝘼 đ˜”đ˜©đ˜Š đ˜Šđ˜Żđ˜„đ˜±đ˜°đ˜Șđ˜Żđ˜”, đ˜”đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© đ˜”đ˜©đ˜Š đ˜ˆđ˜€đ˜”đ˜Șđ˜·đ˜Š 𝘋đ˜Șđ˜łđ˜Šđ˜€đ˜”đ˜°đ˜łđ˜ș đ˜ąđ˜Żđ˜„ đ˜Șđ˜Żđ˜”đ˜° đ˜”đ˜©đ˜Š đ˜€đ˜­đ˜°đ˜¶đ˜„ đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”.

đ˜›đ˜©đ˜Ș𝘮 đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜Ș𝘮 đ˜­đ˜Šđ˜„ 𝘣đ˜ș 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Šđ˜„ đ˜Șđ˜Żđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜°đ˜łđ˜Ž đ˜”đ˜©đ˜ąđ˜” đ˜”đ˜Šđ˜ąđ˜€đ˜© đ˜Žđ˜”đ˜¶đ˜„đ˜Šđ˜Żđ˜”đ˜Ž đ˜”đ˜°:
đ˜œđ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„ đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜łđ˜Šđ˜Žđ˜Šđ˜ąđ˜łđ˜€đ˜© 𝘱𝘯 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜ł đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Š đ˜¶đ˜Žđ˜Šđ˜„ đ˜Ș𝘯 đ˜€đ˜°đ˜łđ˜±đ˜°đ˜łđ˜ąđ˜”đ˜Š đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž. đ˜‰đ˜¶đ˜Șđ˜­đ˜„ 𝘳𝘩𝘮đ˜Ș𝘭đ˜Șđ˜Šđ˜Żđ˜” đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯𝘮 đ˜”đ˜©đ˜ąđ˜” 𝘱𝘳𝘩 đ˜©đ˜ąđ˜łđ˜„đ˜Šđ˜ł đ˜”đ˜° đ˜Šđ˜·đ˜ąđ˜„đ˜Š 𝘣đ˜ș 𝘱𝘯 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜ł. 𝘝𝘱𝘭đ˜Șđ˜„đ˜ąđ˜”đ˜Š đ˜”đ˜©đ˜Šđ˜Ș𝘳 đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯𝘮 đ˜”đ˜° 𝘼𝘱𝘬𝘩 đ˜Žđ˜¶đ˜łđ˜Š đ˜”đ˜©đ˜Šđ˜ș đ˜Źđ˜Šđ˜Šđ˜± đ˜§đ˜¶đ˜Żđ˜€đ˜”đ˜Ș𝘰𝘯đ˜Ș𝘯𝘹 𝘱𝘮 đ˜Șđ˜Żđ˜”đ˜Šđ˜Żđ˜„đ˜Šđ˜„. đ˜›đ˜©đ˜Š đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜§đ˜°đ˜€đ˜¶đ˜Žđ˜Šđ˜Ž 𝘰𝘯 𝘔đ˜Șđ˜€đ˜łđ˜°đ˜Žđ˜°đ˜§đ˜” đ˜šđ˜Šđ˜Żđ˜”đ˜Ș𝘯𝘩𝘭 đ˜ąđ˜Żđ˜„ đ˜‹đ˜Šđ˜§đ˜Šđ˜Żđ˜„đ˜Šđ˜ł 𝘟𝘋𝘙, đ˜Łđ˜¶đ˜” đ˜€đ˜°đ˜Żđ˜€đ˜Šđ˜±đ˜”đ˜Ž đ˜€đ˜ąđ˜Ż 𝘣𝘩 đ˜ąđ˜±đ˜±đ˜­đ˜Șđ˜Šđ˜„ đ˜”đ˜° đ˜°đ˜”đ˜©đ˜Šđ˜ł đ˜Žđ˜”đ˜ąđ˜€đ˜Źđ˜Ž 𝘱𝘮 𝘾𝘩𝘭𝘭."

About the trainers:
Olaf Hartong has a vast experience in digital security, specialized in security operations, detection engineering and threat hunting. Olaf has extensive knowledge of different monitoring platforms, in particular the Microsoft Defender XDR and Sentinel stack. He presents on well-known security conferences, such as BlackHat, Defcon, WWHF, BRUcon, SOcon, NorthSec, Insomni'hack and MITRE ATT&CKcon. Olaf is the author of ThreatHunting for Splunk, ATTACK datamap, FalconHound, and Sysmon-modular tools.

Rogier Boon has over 20 years experience as both a security consultant and in-house technical specialist. Throughout his career, Rogier had roles as offensive specialist and blue teamer (TIER2/3 SOC, incident response, detection engineer). Rogier brings extensive experience working in various high-tech environments and researching a multitude of technologies. Rogier facilitated at Black Hat US and various private trainings sessions for in-house SOC teams.

🔗 Save Your Spot: nsec.io/training/2026-advanced

#NorthSec #cybersecurity #detectionengineering #infosec #blueeteam

2026-02-12

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ Formations/Trainings (8/12): "Attacking & Securing CI/CD Pipeline Certification (ASCPC)" đ—œđ—źđ—ż/𝗯𝘆 Raunak Parmar & Robert (Bobby) Schwass (White Knight Labs)

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: Hybrid (on-site & remote)

Description: Master CI/CD security through practical offense and defense. Explore GitHub Actions context injection, CircleCI misconfigurations, AWS CodeBuild exploitation, Docker registry attacks, Kubernetes risks, and Azure DevOps abuse. Learn to identify and exploit real vulnerabilities while gaining hands-on defensive engineering techniques. Work directly with modern tools including GitHub Actions, CircleCI, Docker, Kubernetes, and AWS CodeBuild.

About the trainers:
Raunak Parmar and Bobby Schwass are DevSecOps specialists with extensive experience securing CI/CD pipelines and understanding the threat landscape across modern development infrastructure.

🔗 Training details: nsec.io/training/2026-attackin

#NorthSec #cybersecurity #devsecops #cicd #cloudsecurity

2026-02-11

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜”đ—¶đ—Œđ—»đ˜Ž/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Ž (7/12): "Offensive Development Practitioner Certification (ODPC)" đ—œđ—źđ—ż/𝗯𝘆 Munaf Shariff (White Knight Labs)

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: Hybrid (on-site & remote)

Description: "đ˜›đ˜©đ˜Š 𝘖𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜‹đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜±đ˜źđ˜Šđ˜Żđ˜” đ˜—đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜”đ˜Ș𝘰𝘯𝘩𝘳 đ˜Šđ˜Šđ˜łđ˜”đ˜Ș𝘧đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯 (𝘖𝘋𝘗𝘊) đ˜Ș𝘮 đ˜„đ˜Šđ˜Žđ˜Șđ˜šđ˜Żđ˜Šđ˜„ đ˜”đ˜° đ˜”đ˜ąđ˜Źđ˜Š đ˜șđ˜°đ˜¶ đ˜„đ˜Šđ˜Šđ˜± đ˜Șđ˜Żđ˜”đ˜° đ˜”đ˜©đ˜Š 𝘳𝘩𝘱𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 𝘰𝘧 đ˜źđ˜°đ˜„đ˜Šđ˜łđ˜Ż đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Š đ˜Šđ˜·đ˜ąđ˜Žđ˜Ș𝘰𝘯 đ˜ąđ˜Żđ˜„ 𝘰𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜”đ˜°đ˜°đ˜­đ˜Ș𝘯𝘹, đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Ș𝘯𝘹 đ˜”đ˜©đ˜Š đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Š đ˜Żđ˜Šđ˜Šđ˜„đ˜Šđ˜„ đ˜”đ˜° đ˜°đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Š đ˜ąđ˜” 𝘱𝘯 đ˜ąđ˜„đ˜·đ˜ąđ˜Żđ˜€đ˜Šđ˜„ đ˜­đ˜Šđ˜·đ˜Šđ˜­. đ˜›đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© 𝘭đ˜Șđ˜·đ˜Š, đ˜Șđ˜Żđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜°đ˜ł-đ˜Žđ˜¶đ˜±đ˜±đ˜°đ˜łđ˜”đ˜Šđ˜„ 𝘭𝘱𝘣𝘮, đ˜șđ˜°đ˜¶â€™đ˜­đ˜­ 𝘭𝘩𝘱𝘳𝘯 đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜°đ˜·đ˜Šđ˜łđ˜€đ˜°đ˜źđ˜Š 𝘳𝘩𝘱𝘭-đ˜žđ˜°đ˜łđ˜­đ˜„ đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜źđ˜Šđ˜€đ˜©đ˜ąđ˜Żđ˜Ș𝘮𝘼𝘮 𝘣đ˜ș 𝘾𝘰𝘳𝘬đ˜Ș𝘯𝘹 đ˜„đ˜Șđ˜łđ˜Šđ˜€đ˜”đ˜­đ˜ș 𝘾đ˜Șđ˜”đ˜© 𝘛𝘩𝘳𝘳𝘱𝘧𝘰𝘳𝘼-đ˜„đ˜Šđ˜±đ˜­đ˜°đ˜șđ˜Šđ˜„ đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž, đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜źđ˜Ș𝘯𝘹 𝘗𝘌 𝘧đ˜Ș𝘭𝘩 đ˜€đ˜°đ˜Żđ˜·đ˜Šđ˜łđ˜Žđ˜Ș𝘰𝘯𝘮, đ˜ąđ˜Żđ˜„ 𝘩đ˜čđ˜Šđ˜€đ˜¶đ˜”đ˜Ș𝘯𝘹 đ˜ąđ˜„đ˜·đ˜ąđ˜Żđ˜€đ˜Šđ˜„ đ˜±đ˜łđ˜°đ˜€đ˜Šđ˜Žđ˜Ž-đ˜Șđ˜Żđ˜«đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 đ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Šđ˜šđ˜Ș𝘩𝘮.

đ˜›đ˜©đ˜Š đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š đ˜”đ˜©đ˜Šđ˜Ż 𝘩đ˜čđ˜±đ˜ąđ˜Żđ˜„đ˜Ž đ˜Șđ˜Żđ˜”đ˜° 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜”-đ˜­đ˜Šđ˜·đ˜Šđ˜­ 𝘰𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜„đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜±đ˜źđ˜Šđ˜Żđ˜”, đ˜Șđ˜Żđ˜€đ˜­đ˜¶đ˜„đ˜Ș𝘯𝘹 đ˜Ș𝘯-đ˜„đ˜Šđ˜±đ˜”đ˜© 𝘩đ˜čđ˜±đ˜­đ˜°đ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯 𝘰𝘧 đ˜Šđ˜°đ˜Łđ˜ąđ˜­đ˜” đ˜šđ˜”đ˜łđ˜Ș𝘬𝘩 đ˜€đ˜°đ˜źđ˜źđ˜ąđ˜Żđ˜„-đ˜ąđ˜Żđ˜„-đ˜€đ˜°đ˜Żđ˜”đ˜łđ˜°đ˜­ 𝘧𝘳𝘱𝘼𝘩𝘾𝘰𝘳𝘬𝘮, đ˜Žđ˜ąđ˜Żđ˜„đ˜Łđ˜°đ˜č đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 đ˜Šđ˜·đ˜ąđ˜Žđ˜Ș𝘰𝘯, đ˜ąđ˜Żđ˜„ đ˜Žđ˜°đ˜±đ˜©đ˜Șđ˜Žđ˜”đ˜Șđ˜€đ˜ąđ˜”đ˜Šđ˜„ 𝘌𝘋𝘙 𝘣đ˜șđ˜±đ˜ąđ˜Žđ˜Ž đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Šđ˜Ž. đ˜ đ˜°đ˜¶â€™đ˜­đ˜­ 𝘱𝘭𝘮𝘰 đ˜„đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜± đ˜”đ˜©đ˜Š 𝘱𝘣đ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜”đ˜° đ˜„đ˜Šđ˜Žđ˜Ș𝘹𝘯 đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜±đ˜­đ˜°đ˜ș đ˜€đ˜¶đ˜Žđ˜”đ˜°đ˜ź đ˜±đ˜ąđ˜șđ˜­đ˜°đ˜ąđ˜„đ˜Ž, đ˜Łđ˜¶đ˜Șđ˜­đ˜„đ˜Ș𝘯𝘹 đ˜łđ˜Šđ˜§đ˜­đ˜Šđ˜€đ˜”đ˜Șđ˜·đ˜Š 𝘋𝘓𝘓 đ˜­đ˜°đ˜ąđ˜„đ˜Šđ˜łđ˜Ž, 𝘩𝘯𝘹đ˜Ș𝘯𝘩𝘩𝘳đ˜Ș𝘯𝘹 𝘈𝘔𝘚𝘐 đ˜ąđ˜Żđ˜„ 𝘌𝘛𝘞 𝘣đ˜șđ˜±đ˜ąđ˜Žđ˜Žđ˜Šđ˜Ž, đ˜ąđ˜Żđ˜„ đ˜€đ˜łđ˜ąđ˜§đ˜”đ˜Ș𝘯𝘹 đ˜”đ˜ąđ˜Șđ˜­đ˜°đ˜łđ˜Šđ˜„ 𝘰𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜”đ˜°đ˜°đ˜­đ˜Ș𝘯𝘹 𝘧𝘳𝘰𝘼 đ˜”đ˜©đ˜Š đ˜šđ˜łđ˜°đ˜¶đ˜Żđ˜„ đ˜¶đ˜±. 𝘉đ˜ș đ˜Łđ˜­đ˜Šđ˜Żđ˜„đ˜Ș𝘯𝘹 đ˜„đ˜Šđ˜Šđ˜± đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜€đ˜ąđ˜­ đ˜Șđ˜Żđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜Ș𝘰𝘯 𝘾đ˜Șđ˜”đ˜© đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜ąđ˜­, đ˜Șđ˜Żđ˜”đ˜Šđ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜·đ˜Š 𝘭𝘱𝘣𝘮, 𝘖𝘋𝘗𝘊 𝘹đ˜Șđ˜·đ˜Šđ˜Ž đ˜șđ˜°đ˜¶ đ˜”đ˜©đ˜Š đ˜Źđ˜Żđ˜°đ˜žđ˜­đ˜Šđ˜„đ˜šđ˜Š, 𝘮𝘬đ˜Ș𝘭𝘭𝘮, đ˜ąđ˜Żđ˜„ đ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜„đ˜Šđ˜Żđ˜€đ˜Š đ˜”đ˜° đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„â€”đ˜ąđ˜Żđ˜„ đ˜°đ˜¶đ˜”đ˜źđ˜ąđ˜Żđ˜Šđ˜¶đ˜·đ˜Šđ˜łâ€”đ˜źđ˜°đ˜„đ˜Šđ˜łđ˜Ż đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Șđ˜·đ˜Š đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜°đ˜­đ˜°đ˜šđ˜Ș𝘩𝘮."

About the trainer:
Munaf Shariff is an offensive development specialist with deep expertise in bypassing modern security mechanisms and building custom offensive tooling that operates effectively in real-world environments.

🔗 Training details: nsec.io/training/2026-offensiv

#NorthSec #cybersecurity #offensivesecurity #malware #evasion

2026-02-10

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜”đ—¶đ—Œđ—»đ˜Ž/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜Ž (6/12): "Reverse, Bypass, Exploit: Mobile Hacking Workshop" đ—œđ—źđ—ż/𝗯𝘆 David Backer & Steven Smiley (Corellium)

📅 Date: May 11, 2026 (1 day)
📊 Difficulty: Medium
đŸ–„ïž Mode: On-Site

Description: Master mobile app security techniques covering iOS and Android platforms. Learn real-time network traffic analysis, reverse engineering, SSL pinning bypass, and security control bypasses including biometrics and jailbreak detection. Manipulate runtime behavior with Frida and tackle real-world mobile security challenges. Perfect for penetration testers and security professionals. Bonus: One week Corellium Viper trial and mobile CTF access.

About the trainers:
David Backer is a systems engineer focused on mobile application security testing. He works across various of layers of the Corellium tech stack to help customers adopt the platform's many features. Before Corellium, he fabricated cutting edge microprocessors in high-volume factories as well as designed, modeled, and fabricated novel silicon research devices. David also has experience with distributed systems, cryptography, data visualization, and business management.

Steven Smiley is a Senior Product Manager at MAST Solutions with over a decade of experience in mobile penetration testing and mobile application security. He holds a degree in Computer Security and Investigations from Fleming College and maintains two SANS certifications in mobile security and forensics (GMOB, GASF). Prior to joining the Corellium team, Steven worked as an independent consultant, leading mobile security assessments and penetration testing engagements for a wide range of organizations.

🔗 Training details: nsec.io/training/2026-reverse-

#NorthSec #cybersecurity #mobileappsecurity #penetrationtesting

2026-02-09

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (5/12): "Deconstructing Rust Binaries" đ—œđ—źđ—ż/𝗯𝘆 Cindy Xiao

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: Hybrid (on-site & remote)

Description:
"đ˜™đ˜¶đ˜Žđ˜”-đ˜Łđ˜ąđ˜Žđ˜Šđ˜„ 𝘼𝘱𝘭𝘾𝘱𝘳𝘩 đ˜Ș𝘮 𝘱 𝘹𝘳𝘰𝘾đ˜Ș𝘯𝘹 đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜”. đ˜‹đ˜Šđ˜€đ˜°đ˜Żđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜Ș𝘯𝘹 đ˜™đ˜¶đ˜Žđ˜” 𝘉đ˜Ș𝘯𝘱𝘳đ˜Ș𝘩𝘮 𝘩đ˜Čđ˜¶đ˜Șđ˜±đ˜Ž đ˜łđ˜Šđ˜·đ˜Šđ˜łđ˜Žđ˜Š 𝘩𝘯𝘹đ˜Ș𝘯𝘩𝘩𝘳𝘮 đ˜ąđ˜Żđ˜„ 𝘼𝘱𝘭𝘾𝘱𝘳𝘩 𝘱𝘯𝘱𝘭đ˜șđ˜Žđ˜”đ˜Ž 𝘾đ˜Șđ˜”đ˜© đ˜Šđ˜Žđ˜Žđ˜Šđ˜Żđ˜”đ˜Ș𝘱𝘭 𝘮𝘬đ˜Ș𝘭𝘭𝘮 𝘧𝘰𝘳 đ˜”đ˜ąđ˜€đ˜Źđ˜­đ˜Ș𝘯𝘹 𝘱 𝘯𝘩𝘾 đ˜€đ˜©đ˜ąđ˜­đ˜­đ˜Šđ˜Żđ˜šđ˜Š. 𝘋đ˜ș𝘯𝘱𝘼đ˜Șđ˜€ 𝘣đ˜Ș𝘯𝘱𝘳đ˜Ș𝘩𝘮 𝘱𝘳𝘩 đ˜Șđ˜Żđ˜€đ˜łđ˜Šđ˜ąđ˜Žđ˜Ș𝘯𝘹𝘭đ˜ș đ˜źđ˜°đ˜·đ˜Ș𝘯𝘹 đ˜”đ˜°đ˜žđ˜ąđ˜łđ˜„đ˜Ž đ˜™đ˜¶đ˜Žđ˜”, đ˜șđ˜Šđ˜” đ˜łđ˜Šđ˜·đ˜Šđ˜łđ˜Žđ˜Š 𝘩𝘯𝘹đ˜Ș𝘯𝘩𝘩𝘳𝘮 đ˜­đ˜ąđ˜€đ˜Ź đ˜”đ˜©đ˜Š đ˜Žđ˜±đ˜Šđ˜€đ˜Ș𝘱𝘭đ˜Șđ˜»đ˜Šđ˜„ đ˜Źđ˜Żđ˜°đ˜žđ˜­đ˜Šđ˜„đ˜šđ˜Š đ˜”đ˜° đ˜„đ˜Šđ˜€đ˜°đ˜„đ˜Š đ˜”đ˜©đ˜Šđ˜ź. đ˜›đ˜©đ˜Ș𝘮 𝘧đ˜Șđ˜łđ˜Žđ˜”-𝘰𝘧-đ˜Șđ˜”đ˜Ž-𝘬đ˜Șđ˜Żđ˜„ đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š 𝘣𝘳đ˜Șđ˜„đ˜šđ˜Šđ˜Ž đ˜”đ˜©đ˜ąđ˜” đ˜€đ˜łđ˜Șđ˜”đ˜Șđ˜€đ˜ąđ˜­ đ˜šđ˜ąđ˜±. đ˜›đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© 𝘱 đ˜­đ˜ąđ˜Żđ˜šđ˜¶đ˜ąđ˜šđ˜Š-đ˜€đ˜Šđ˜Żđ˜”đ˜łđ˜Șđ˜€ đ˜ąđ˜±đ˜±đ˜łđ˜°đ˜ąđ˜€đ˜©, đ˜șđ˜°đ˜¶'𝘭𝘭 𝘭𝘩𝘱𝘳𝘯 đ˜™đ˜¶đ˜Žđ˜” đ˜§đ˜¶đ˜Żđ˜„đ˜ąđ˜źđ˜Šđ˜Żđ˜”đ˜ąđ˜­đ˜Ž, đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„ đ˜©đ˜°đ˜ž đ˜™đ˜¶đ˜Žđ˜” đ˜€đ˜°đ˜Żđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜Ž đ˜”đ˜łđ˜ąđ˜Żđ˜Žđ˜­đ˜ąđ˜”đ˜Š đ˜”đ˜° 𝘱𝘮𝘮𝘩𝘼𝘣𝘭đ˜ș, đ˜ąđ˜Żđ˜„ đ˜źđ˜ąđ˜Žđ˜”đ˜Šđ˜ł đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜ąđ˜­ đ˜”đ˜łđ˜Ș𝘱𝘹𝘩 đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Šđ˜Ž. đ˜ đ˜°đ˜¶'𝘭𝘭 đ˜”đ˜łđ˜ąđ˜€đ˜Š đ˜„đ˜ąđ˜”đ˜ą 𝘧𝘭𝘰𝘾𝘮, đ˜Șđ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘧đ˜ș đ˜§đ˜¶đ˜Żđ˜€đ˜”đ˜Ș𝘰𝘯𝘱𝘭đ˜Șđ˜”đ˜ș, đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜€đ˜°đ˜Żđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜” 𝘳𝘩𝘱𝘭 đ˜™đ˜¶đ˜Žđ˜” 𝘼𝘱𝘭𝘾𝘱𝘳𝘩 đ˜Žđ˜ąđ˜źđ˜±đ˜­đ˜Šđ˜Ž đ˜Ș𝘯 𝘱 đ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Šđ˜„, 𝘩𝘧𝘧đ˜Șđ˜€đ˜Șđ˜Šđ˜Żđ˜” 𝘾𝘱đ˜ș. đ˜žđ˜©đ˜Šđ˜”đ˜©đ˜Šđ˜ł đ˜șđ˜°đ˜¶'𝘳𝘩 𝘱𝘯𝘱𝘭đ˜șđ˜»đ˜Ș𝘯𝘹 𝘳𝘱𝘯𝘮𝘰𝘼𝘾𝘱𝘳𝘩 𝘰𝘳 𝘱𝘯𝘱𝘭đ˜șđ˜»đ˜Ș𝘯𝘹 𝘭𝘩𝘹đ˜Șđ˜”đ˜Șđ˜źđ˜ąđ˜”đ˜Š đ˜™đ˜¶đ˜Žđ˜”-đ˜Łđ˜ąđ˜Žđ˜Šđ˜„ 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜źđ˜Ž, đ˜șđ˜°đ˜¶'𝘭𝘭 đ˜„đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜± đ˜”đ˜©đ˜Š đ˜”đ˜łđ˜ąđ˜„đ˜Šđ˜€đ˜łđ˜ąđ˜§đ˜” đ˜Żđ˜Šđ˜Šđ˜„đ˜Šđ˜„ đ˜”đ˜° đ˜Čđ˜¶đ˜Șđ˜€đ˜Źđ˜­đ˜ș đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„ đ˜ąđ˜Żđ˜„ 𝘣𝘳𝘩𝘱𝘬 đ˜„đ˜°đ˜žđ˜Ż đ˜™đ˜¶đ˜Žđ˜” 𝘣đ˜Ș𝘯𝘱𝘳đ˜Ș𝘩𝘮 𝘾đ˜Șđ˜”đ˜© đ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜„đ˜Šđ˜Żđ˜€đ˜Š."

About the trainer:
Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.

🔗 Training details: nsec.io/training/2026-deconstr

#NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering

2026-02-06

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (𝟰/𝟭𝟼): "Offensive Active Directory Operations Certification (OADOC)" đ—œđ—źđ—ż/𝗯𝘆 Evan Hosinski (White Knight Labs)

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: Hybrid (on-site & remote)

Description: "đ˜›đ˜©đ˜Š 𝘖𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜ˆđ˜€đ˜”đ˜Șđ˜·đ˜Š 𝘋đ˜Șđ˜łđ˜Šđ˜€đ˜”đ˜°đ˜łđ˜ș đ˜–đ˜±đ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 đ˜Šđ˜Šđ˜łđ˜”đ˜Ș𝘧đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯 (𝘖𝘈𝘋𝘖𝘊) 𝘩đ˜Čđ˜¶đ˜Șđ˜±đ˜Ž đ˜Žđ˜”đ˜¶đ˜„đ˜Šđ˜Żđ˜”đ˜Ž 𝘾đ˜Șđ˜”đ˜© 𝘱 đ˜€đ˜°đ˜źđ˜±đ˜łđ˜Šđ˜©đ˜Šđ˜Żđ˜Žđ˜Șđ˜·đ˜Š, đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„đ˜Ș𝘯𝘹 𝘰𝘧 đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜Șđ˜„đ˜Šđ˜Żđ˜”đ˜Ș𝘧đ˜ș đ˜ąđ˜Żđ˜„ 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜” đ˜źđ˜°đ˜„đ˜Šđ˜łđ˜Ż đ˜ˆđ˜€đ˜”đ˜Șđ˜·đ˜Š 𝘋đ˜Șđ˜łđ˜Šđ˜€đ˜”đ˜°đ˜łđ˜ș 𝘼đ˜Șđ˜Žđ˜€đ˜°đ˜Żđ˜§đ˜Șđ˜šđ˜¶đ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 đ˜ąđ˜€đ˜łđ˜°đ˜Žđ˜Ž đ˜Łđ˜°đ˜”đ˜© 𝘞đ˜Șđ˜Żđ˜„đ˜°đ˜žđ˜Ž đ˜ąđ˜Żđ˜„ 𝘓đ˜Șđ˜Żđ˜¶đ˜č đ˜Šđ˜Żđ˜·đ˜Șđ˜łđ˜°đ˜Żđ˜źđ˜Šđ˜Żđ˜”đ˜Ž. 𝘋𝘩𝘮đ˜Șđ˜šđ˜Żđ˜Šđ˜„ 𝘧𝘰𝘳 đ˜”đ˜°đ˜„đ˜ąđ˜ș’𝘮 𝘼đ˜Șđ˜čđ˜Šđ˜„ đ˜ąđ˜Żđ˜„ đ˜Šđ˜·đ˜°đ˜­đ˜·đ˜Ș𝘯𝘹 đ˜Šđ˜Żđ˜”đ˜Šđ˜łđ˜±đ˜łđ˜Ș𝘮𝘩 đ˜Šđ˜€đ˜°đ˜Žđ˜șđ˜Žđ˜”đ˜Šđ˜źđ˜Ž, đ˜”đ˜©đ˜Š đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š đ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Ž đ˜§đ˜°đ˜łđ˜Šđ˜Žđ˜” đ˜§đ˜¶đ˜Żđ˜€đ˜”đ˜Ș𝘰𝘯𝘱𝘭 đ˜­đ˜Šđ˜·đ˜Šđ˜­đ˜Ž 𝘧𝘳𝘰𝘼 𝘞đ˜Șđ˜Żđ˜„đ˜°đ˜žđ˜Ž đ˜šđ˜Šđ˜łđ˜·đ˜Šđ˜ł 2016 đ˜”đ˜©đ˜łđ˜°đ˜¶đ˜šđ˜© đ˜šđ˜Šđ˜łđ˜·đ˜Šđ˜ł 2025, đ˜Šđ˜Żđ˜Žđ˜¶đ˜łđ˜Ș𝘯𝘹 đ˜Šđ˜·đ˜Šđ˜łđ˜ș đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Š đ˜șđ˜°đ˜¶ 𝘭𝘩𝘱𝘳𝘯 đ˜Ș𝘮 đ˜łđ˜Šđ˜­đ˜Šđ˜·đ˜ąđ˜Żđ˜”, đ˜€đ˜¶đ˜łđ˜łđ˜Šđ˜Żđ˜”, đ˜ąđ˜Żđ˜„ đ˜ąđ˜±đ˜±đ˜­đ˜Șđ˜€đ˜ąđ˜Łđ˜­đ˜Š đ˜ąđ˜€đ˜łđ˜°đ˜Žđ˜Ž 𝘳𝘩𝘱𝘭-đ˜žđ˜°đ˜łđ˜­đ˜„ đ˜Șđ˜Żđ˜§đ˜łđ˜ąđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Šđ˜Ž. đ˜ đ˜°đ˜¶â€™đ˜­đ˜­ đ˜„đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜± đ˜”đ˜©đ˜Š 𝘱𝘣đ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜”đ˜° 𝘩đ˜čđ˜Šđ˜€đ˜¶đ˜”đ˜Š đ˜źđ˜¶đ˜­đ˜”đ˜Ș-đ˜±đ˜­đ˜ąđ˜”đ˜§đ˜°đ˜łđ˜ź đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Ž, đ˜­đ˜Šđ˜·đ˜Šđ˜łđ˜ąđ˜šđ˜Š đ˜€đ˜¶đ˜”đ˜”đ˜Ș𝘯𝘹-đ˜Šđ˜„đ˜šđ˜Š 𝘈𝘋 đ˜ąđ˜Łđ˜¶đ˜Žđ˜Š đ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Šđ˜šđ˜Ș𝘩𝘮, đ˜ąđ˜Żđ˜„ đ˜€đ˜¶đ˜Žđ˜”đ˜°đ˜źđ˜Șđ˜»đ˜Š đ˜źđ˜°đ˜„đ˜Šđ˜łđ˜Ż, 𝘮đ˜Șđ˜šđ˜Żđ˜Šđ˜„, đ˜ąđ˜Żđ˜„ đ˜Žđ˜”đ˜Šđ˜ąđ˜­đ˜”đ˜©đ˜ș đ˜”đ˜°đ˜°đ˜­đ˜Ș𝘯𝘹 𝘧𝘰𝘳 đ˜Šđ˜Żđ˜¶đ˜źđ˜Šđ˜łđ˜ąđ˜”đ˜Ș𝘰𝘯 đ˜ąđ˜Żđ˜„ 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜ąđ˜”đ˜Ș𝘰𝘯."

About the trainer:
Evan Hosinski is an Offensive Security Professional and senior penetration tester who builds, breaks, and improves systems at scale. His work combines hands-on engineering with real-world attacker tradecraft, driving him to design tools and methodologies that hold up in live environments.

🔗 Training details: nsec.io/training/2026-offensiv

#NorthSec #cybersecurity #infosec #redteam #offensivesecurity

2026-02-05

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (𝟯/𝟭𝟼): "AI SecureOps: Attacking & Defending GenAI Applications and Services" đ—œđ—źđ—ż/𝗯𝘆 Abhinav Singh

📅 Dates: May 12 and 13, 2026 (2 days)
🎯 Level: Medium

Description: "𝘊𝘱𝘯 đ˜±đ˜łđ˜°đ˜źđ˜±đ˜” đ˜Șđ˜Żđ˜«đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯𝘮 đ˜­đ˜Šđ˜ąđ˜„ đ˜”đ˜° đ˜€đ˜°đ˜źđ˜±đ˜­đ˜Šđ˜”đ˜Š đ˜Șđ˜Żđ˜§đ˜łđ˜ąđ˜Žđ˜”đ˜łđ˜¶đ˜€đ˜”đ˜¶đ˜łđ˜Š đ˜”đ˜ąđ˜Źđ˜Šđ˜°đ˜·đ˜Šđ˜łđ˜Ž? đ˜Šđ˜°đ˜¶đ˜­đ˜„ 𝘈𝘐 đ˜ąđ˜šđ˜Šđ˜Żđ˜”đ˜Ž 𝘣𝘩 𝘩đ˜čđ˜±đ˜­đ˜°đ˜Șđ˜”đ˜Šđ˜„ đ˜”đ˜° đ˜€đ˜°đ˜źđ˜±đ˜łđ˜°đ˜źđ˜Ș𝘮𝘩 đ˜Łđ˜ąđ˜€đ˜Źđ˜Šđ˜Żđ˜„ đ˜Žđ˜Šđ˜łđ˜·đ˜Șđ˜€đ˜Šđ˜Ž? 𝘊𝘱𝘯 đ˜«đ˜ąđ˜Ș𝘭𝘣𝘳𝘩𝘱𝘬𝘮 đ˜€đ˜łđ˜Šđ˜ąđ˜”đ˜Š 𝘧𝘱𝘭𝘮𝘩 đ˜€đ˜łđ˜Ș𝘮đ˜Ș𝘮 đ˜ąđ˜­đ˜Šđ˜łđ˜”đ˜Ž đ˜Ș𝘯 đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜źđ˜Ž? 𝘐𝘯 đ˜źđ˜¶đ˜­đ˜”đ˜Ș-đ˜ąđ˜šđ˜Šđ˜Żđ˜” 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜źđ˜Ž, đ˜žđ˜©đ˜ąđ˜” đ˜Ș𝘧 𝘱𝘯 đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Źđ˜Šđ˜ł đ˜”đ˜ąđ˜Źđ˜Šđ˜Ž đ˜°đ˜·đ˜Šđ˜ł 𝘱𝘯 đ˜ąđ˜šđ˜Šđ˜Żđ˜”â€™đ˜Ž 𝘹𝘰𝘱𝘭𝘮, đ˜”đ˜¶đ˜łđ˜Żđ˜Ș𝘯𝘹 đ˜°đ˜”đ˜©đ˜Šđ˜ł đ˜ąđ˜šđ˜Šđ˜Żđ˜”đ˜Ž đ˜Șđ˜Żđ˜”đ˜° đ˜€đ˜°đ˜°đ˜łđ˜„đ˜Șđ˜Żđ˜ąđ˜”đ˜Šđ˜„ đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜”đ˜Ž? đ˜›đ˜©đ˜Ș𝘮 đ˜Ș𝘼𝘼𝘩𝘳𝘮đ˜Șđ˜·đ˜Š, 𝘊𝘛𝘍-đ˜Žđ˜”đ˜șđ˜­đ˜Šđ˜„ đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜Ș𝘯 𝘈𝘐 đ˜ąđ˜Żđ˜„ 𝘓𝘓𝘔 đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜„đ˜Șđ˜·đ˜Šđ˜Ž đ˜Șđ˜Żđ˜”đ˜° đ˜”đ˜©đ˜Šđ˜Žđ˜Š đ˜±đ˜łđ˜Šđ˜Žđ˜Žđ˜Ș𝘯𝘹 đ˜Čđ˜¶đ˜Šđ˜Žđ˜”đ˜Ș𝘰𝘯𝘮. 𝘌𝘯𝘹𝘱𝘹𝘩 đ˜Ș𝘯 𝘳𝘩𝘱𝘭đ˜Șđ˜Žđ˜”đ˜Șđ˜€ đ˜ąđ˜”đ˜”đ˜ąđ˜€đ˜Ź đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Š đ˜Žđ˜€đ˜Šđ˜Żđ˜ąđ˜łđ˜Ș𝘰𝘮 đ˜§đ˜°đ˜€đ˜¶đ˜Žđ˜Šđ˜„ 𝘰𝘯 𝘳𝘩𝘱𝘭-đ˜žđ˜°đ˜łđ˜­đ˜„ đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜”đ˜Ž, 𝘧𝘳𝘰𝘼 đ˜±đ˜łđ˜°đ˜źđ˜±đ˜” đ˜Șđ˜Żđ˜«đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 đ˜ąđ˜Żđ˜„ đ˜łđ˜Šđ˜źđ˜°đ˜”đ˜Š đ˜€đ˜°đ˜„đ˜Š 𝘩đ˜čđ˜Šđ˜€đ˜¶đ˜”đ˜Ș𝘰𝘯 đ˜”đ˜° đ˜Łđ˜ąđ˜€đ˜Źđ˜Šđ˜Żđ˜„ đ˜€đ˜°đ˜źđ˜±đ˜łđ˜°đ˜źđ˜Ș𝘮𝘩. đ˜›đ˜ąđ˜€đ˜Źđ˜­đ˜Š đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 đ˜€đ˜©đ˜ąđ˜­đ˜­đ˜Šđ˜Żđ˜šđ˜Šđ˜Ž 𝘾đ˜Șđ˜”đ˜© đ˜ąđ˜€đ˜”đ˜¶đ˜ąđ˜­ 𝘈𝘐 đ˜ąđ˜±đ˜±đ˜­đ˜Șđ˜€đ˜ąđ˜”đ˜Ș𝘰𝘯𝘮 & đ˜ąđ˜šđ˜Šđ˜Żđ˜”đ˜Șđ˜€ 𝘮đ˜șđ˜Žđ˜”đ˜Šđ˜źđ˜Ž đ˜”đ˜° đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„ đ˜·đ˜¶đ˜­đ˜Żđ˜Šđ˜łđ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮 đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜·đ˜Šđ˜­đ˜°đ˜± đ˜łđ˜°đ˜Łđ˜¶đ˜Žđ˜” đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Šđ˜Ž. đ˜ đ˜°đ˜¶â€™đ˜­đ˜­ 𝘭𝘩𝘱𝘳𝘯 đ˜©đ˜°đ˜ž đ˜”đ˜° đ˜€đ˜łđ˜Šđ˜ąđ˜”đ˜Š 𝘱 đ˜€đ˜°đ˜źđ˜±đ˜łđ˜Šđ˜©đ˜Šđ˜Żđ˜Žđ˜Șđ˜·đ˜Š đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜±đ˜Șđ˜±đ˜Šđ˜­đ˜Ș𝘯𝘩, đ˜źđ˜ąđ˜Žđ˜”đ˜Šđ˜łđ˜Ș𝘯𝘹 𝘈𝘐 đ˜łđ˜Šđ˜„ đ˜ąđ˜Żđ˜„ đ˜Łđ˜­đ˜¶đ˜Š đ˜”đ˜Šđ˜ąđ˜ź đ˜Žđ˜”đ˜łđ˜ąđ˜”đ˜Šđ˜šđ˜Ș𝘩𝘮, đ˜Łđ˜¶đ˜Șđ˜­đ˜„đ˜Ș𝘯𝘹 𝘳𝘩𝘮đ˜Ș𝘭đ˜Șđ˜Šđ˜Żđ˜” đ˜„đ˜Šđ˜§đ˜Šđ˜Żđ˜Žđ˜Šđ˜Ž 𝘧𝘰𝘳 𝘈𝘐 đ˜ąđ˜±đ˜±đ˜Ž & đ˜ąđ˜šđ˜Šđ˜Żđ˜”đ˜Ž, đ˜ąđ˜Żđ˜„ đ˜©đ˜ąđ˜Żđ˜„đ˜­đ˜Ș𝘯𝘹 đ˜Șđ˜Żđ˜€đ˜Șđ˜„đ˜Šđ˜Żđ˜” đ˜łđ˜Šđ˜Žđ˜±đ˜°đ˜Żđ˜Žđ˜Š 𝘧𝘰𝘳 𝘈𝘐-đ˜Łđ˜ąđ˜Žđ˜Šđ˜„ đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜”đ˜Ž. đ˜ˆđ˜„đ˜„đ˜Șđ˜”đ˜Ș𝘰𝘯𝘱𝘭𝘭đ˜ș, đ˜Șđ˜źđ˜±đ˜­đ˜Šđ˜źđ˜Šđ˜Żđ˜” 𝘱 đ˜™đ˜Šđ˜Žđ˜±đ˜°đ˜Żđ˜Žđ˜Ș𝘣𝘭𝘩 𝘈𝘐 (𝘙𝘈𝘐) đ˜±đ˜łđ˜°đ˜šđ˜łđ˜ąđ˜ź đ˜”đ˜° đ˜Šđ˜Żđ˜§đ˜°đ˜łđ˜€đ˜Š đ˜Šđ˜”đ˜©đ˜Șđ˜€đ˜ąđ˜­ 𝘈𝘐 đ˜Žđ˜”đ˜ąđ˜Żđ˜„đ˜ąđ˜łđ˜„đ˜Ž đ˜ąđ˜€đ˜łđ˜°đ˜Žđ˜Ž đ˜Šđ˜Żđ˜”đ˜Šđ˜łđ˜±đ˜łđ˜Ș𝘮𝘩 đ˜Žđ˜Šđ˜łđ˜·đ˜Șđ˜€đ˜Šđ˜Ž, đ˜§đ˜°đ˜łđ˜”đ˜Ș𝘧đ˜șđ˜Ș𝘯𝘹 đ˜șđ˜°đ˜¶đ˜ł 𝘰𝘳𝘹𝘱𝘯đ˜Șđ˜»đ˜ąđ˜”đ˜Ș𝘰𝘯’𝘮 𝘈𝘐 đ˜Žđ˜Šđ˜€đ˜¶đ˜łđ˜Șđ˜”đ˜ș đ˜§đ˜°đ˜¶đ˜Żđ˜„đ˜ąđ˜”đ˜Ș𝘰𝘯."

About the trainer:
Abhinav Singh is a seasoned cybersecurity leader, researcher, and author with over 15 years of experience across global technology companies, startups, and financial institutions. A frequent speaker and trainer at international conferences including Black Hat, RSAC, and DEFCON, Abhinav is known for his ability to translate complex security concepts into practical, real-world strategies. His expertise spans AI, cloud, data, and enterprise security, with a strong focus on how emerging technologies are redefining both attack and defense.

🔗 Save Your Spot Now:
nsec.io/training/2026-ai-secur

#NorthSec #cybersecurity #infosec #AIsecurity

2026-02-04

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (𝟼/𝟭𝟼): "Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling" đ—œđ—źđ—ż/𝗯𝘆 Steven Wierckx (Toreon)

📅 Dates: May 11 and 12, 2026 (2 days)
📊 Difficulty: Medium
đŸ–„ïž Mode: On-Site

Description: "đ˜›đ˜©đ˜Ș𝘮 đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜”đ˜ąđ˜Źđ˜Šđ˜Ž đ˜șđ˜°đ˜¶ đ˜„đ˜Šđ˜Šđ˜± đ˜Șđ˜Żđ˜”đ˜° đ˜”đ˜©đ˜Š đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜ąđ˜­ đ˜žđ˜°đ˜łđ˜­đ˜„ 𝘰𝘧 đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜” đ˜źđ˜°đ˜„đ˜Šđ˜­đ˜Ș𝘯𝘹, đ˜€đ˜°đ˜źđ˜Łđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 𝘩đ˜čđ˜Šđ˜łđ˜€đ˜Ș𝘮𝘩𝘮 đ˜ąđ˜Żđ˜„ 𝘳𝘩𝘱𝘭-đ˜žđ˜°đ˜łđ˜­đ˜„ đ˜Žđ˜€đ˜Šđ˜Żđ˜ąđ˜łđ˜Ș𝘰𝘮. đ˜›đ˜©đ˜Ș𝘮 đ˜©đ˜ąđ˜Żđ˜„đ˜Ž-𝘰𝘯 đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜” đ˜źđ˜°đ˜„đ˜Šđ˜­đ˜Ș𝘯𝘹 đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 𝘰𝘧𝘧𝘩𝘳𝘮 𝘱𝘯 đ˜Ș𝘼𝘼𝘩𝘳𝘮đ˜Șđ˜·đ˜Š 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜Șđ˜Šđ˜Żđ˜€đ˜Š, đ˜šđ˜łđ˜°đ˜¶đ˜Żđ˜„đ˜Šđ˜„ đ˜Ș𝘯 25 đ˜ș𝘩𝘱𝘳𝘮 𝘰𝘧 đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜ąđ˜­ 𝘩đ˜čđ˜±đ˜Šđ˜łđ˜”đ˜Ș𝘮𝘩, đ˜ąđ˜Żđ˜„ 𝘳𝘩𝘧đ˜Șđ˜Żđ˜Šđ˜„ 𝘧𝘰𝘳 đ˜°đ˜·đ˜Šđ˜ł 𝘱 đ˜„đ˜Šđ˜€đ˜ąđ˜„đ˜Š 𝘰𝘧 đ˜„đ˜Šđ˜­đ˜Șđ˜·đ˜Šđ˜łđ˜ș đ˜ąđ˜” đ˜‰đ˜­đ˜ąđ˜€đ˜Ź đ˜đ˜ąđ˜”, đ˜ąđ˜·đ˜°đ˜Șđ˜„đ˜Ș𝘯𝘹 𝘱 đ˜­đ˜Šđ˜€đ˜”đ˜¶đ˜łđ˜Š-đ˜©đ˜Šđ˜ąđ˜·đ˜ș đ˜ąđ˜±đ˜±đ˜łđ˜°đ˜ąđ˜€đ˜© (70% 𝘰𝘧 đ˜”đ˜©đ˜Š đ˜€đ˜°đ˜¶đ˜łđ˜Žđ˜Š đ˜Ș𝘮 đ˜§đ˜°đ˜€đ˜¶đ˜Žđ˜Šđ˜„ 𝘰𝘯 𝘩đ˜čđ˜Šđ˜łđ˜€đ˜Ș𝘮𝘩𝘮 đ˜”đ˜° 𝘳𝘩đ˜Șđ˜Żđ˜§đ˜°đ˜łđ˜€đ˜Š 𝘭𝘩𝘱𝘳𝘯đ˜Ș𝘯𝘹). 𝘉đ˜ș đ˜”đ˜©đ˜Š đ˜Šđ˜Żđ˜„ 𝘰𝘧 đ˜”đ˜©đ˜Ș𝘮 đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹, đ˜șđ˜°đ˜¶ 𝘾đ˜Ș𝘭𝘭 𝘾𝘱𝘭𝘬 𝘱𝘾𝘱đ˜ș đ˜Żđ˜°đ˜” đ˜«đ˜¶đ˜Žđ˜” 𝘾đ˜Șđ˜”đ˜© đ˜Źđ˜Żđ˜°đ˜žđ˜­đ˜Šđ˜„đ˜šđ˜Š, đ˜Łđ˜¶đ˜” đ˜”đ˜©đ˜Š 𝘱𝘣đ˜Ș𝘭đ˜Șđ˜”đ˜ș đ˜”đ˜° đ˜±đ˜łđ˜ąđ˜€đ˜”đ˜Șđ˜€đ˜Š đ˜”đ˜©đ˜łđ˜Šđ˜ąđ˜” đ˜źđ˜°đ˜„đ˜Šđ˜­đ˜Ș𝘯𝘹 đ˜Šđ˜§đ˜§đ˜Šđ˜€đ˜”đ˜Șđ˜·đ˜Šđ˜­đ˜ș đ˜Ș𝘯 đ˜șđ˜°đ˜¶đ˜ł 𝘰𝘳𝘹𝘱𝘯đ˜Șđ˜»đ˜ąđ˜”đ˜Ș𝘰𝘯. "
🔗 Full Training Details: nsec.io/training/2026-beyond-w

đŸ‘šâ€đŸ« About the trainer:
Steven Wierckx (Toreon) is a seasoned software and security tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development, and database design. Steven shares his web application security passion by writing about and through training on testing software for security problems, secure coding, security awareness, security testing, and threat modeling. He’s the OWASP Threat Modeling Project Lead and organises the BruCON student CTF. Last year, he spoke at Hack in the Box Amsterdam, hosted a workshop at BruCON, and provided threat modeling training at OWASP AppSec USA and O’Reilly Security New York.

#NorthSec #cybersecurity #threatmodeling #AIsecurity #LLM #DevOps #securitybydesign

2026-02-03

đŸ‹ïž đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€/đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Žđ˜€ (𝟭/𝟭𝟼) : "Red Team Training" đ—œđ—źđ—ż/𝗯𝘆 Charles F. Hamilton from CYPFER

📅 Dates: May 12 and 13 2025 (2 days)
🎯 Level: Medium

Description: "đ˜›đ˜©đ˜Š đ˜”đ˜łđ˜ąđ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜Ș𝘮 đ˜„đ˜Șđ˜·đ˜Șđ˜„đ˜Šđ˜„ đ˜Șđ˜Żđ˜”đ˜° 𝘧đ˜Șđ˜·đ˜Š đ˜Žđ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯𝘮: 𝘐𝘯đ˜Șđ˜”đ˜Ș𝘱𝘭 đ˜đ˜°đ˜°đ˜”đ˜©đ˜°đ˜­đ˜„, 𝘎𝘱đ˜Ș𝘯đ˜Ș𝘯𝘹 đ˜ˆđ˜€đ˜€đ˜Šđ˜Žđ˜Ž, 𝘖𝘧𝘧𝘩𝘯𝘮đ˜Șđ˜·đ˜Š đ˜Šđ˜°đ˜„đ˜Ș𝘯𝘹, đ˜đ˜Żđ˜”đ˜Šđ˜łđ˜Żđ˜ąđ˜­ đ˜™đ˜Šđ˜€đ˜°đ˜Żđ˜Żđ˜ąđ˜Șđ˜Žđ˜Žđ˜ąđ˜Żđ˜€đ˜Š, đ˜ąđ˜Żđ˜„ đ˜“đ˜ąđ˜”đ˜Šđ˜łđ˜ąđ˜­ đ˜”đ˜°đ˜·đ˜Šđ˜źđ˜Šđ˜Żđ˜”. đ˜Œđ˜ąđ˜€đ˜© đ˜Žđ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 𝘾đ˜Ș𝘭𝘭 𝘣𝘩 đ˜€đ˜°đ˜·đ˜Šđ˜łđ˜Šđ˜„ đ˜Ș𝘯 đ˜„đ˜Šđ˜±đ˜”đ˜©, đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Ș𝘯𝘹 đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜€đ˜ąđ˜­ đ˜Šđ˜·đ˜Șđ˜„đ˜Šđ˜Żđ˜€đ˜Š 𝘰𝘧 đ˜©đ˜°đ˜ž đ˜Šđ˜ąđ˜€đ˜© đ˜”đ˜Šđ˜€đ˜©đ˜Żđ˜Șđ˜Čđ˜¶đ˜Š 𝘾𝘰𝘳𝘬𝘮 đ˜Łđ˜Šđ˜©đ˜Șđ˜Żđ˜„ đ˜”đ˜©đ˜Š đ˜Žđ˜€đ˜Šđ˜Żđ˜Šđ˜Ž. đ˜™đ˜Šđ˜„ đ˜”đ˜Šđ˜ąđ˜ź 𝘩đ˜čđ˜Šđ˜łđ˜€đ˜Ș𝘮𝘩𝘮 𝘾đ˜Ș𝘭𝘭 𝘣𝘩 đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜źđ˜Šđ˜„ đ˜”đ˜° 𝘱𝘮𝘮𝘩𝘮𝘮 đ˜łđ˜Šđ˜Žđ˜±đ˜°đ˜Żđ˜Žđ˜Șđ˜·đ˜Šđ˜Żđ˜Šđ˜Žđ˜Ž đ˜ąđ˜Żđ˜„ đ˜„đ˜Šđ˜”đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 đ˜€đ˜ąđ˜±đ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮. 𝘈𝘮 𝘱 đ˜łđ˜Šđ˜„ đ˜”đ˜Šđ˜ąđ˜źđ˜Šđ˜ł, đ˜Șđ˜” đ˜Ș𝘮 đ˜Șđ˜źđ˜±đ˜°đ˜łđ˜”đ˜ąđ˜Żđ˜” đ˜”đ˜° đ˜¶đ˜Żđ˜„đ˜Šđ˜łđ˜Žđ˜”đ˜ąđ˜Żđ˜„ đ˜žđ˜©đ˜ąđ˜” đ˜Šđ˜ąđ˜€đ˜© đ˜”đ˜°đ˜°đ˜­ đ˜ąđ˜Żđ˜„ đ˜€đ˜°đ˜źđ˜źđ˜ąđ˜Żđ˜„ đ˜șđ˜°đ˜¶ đ˜¶đ˜Žđ˜Š đ˜Ș𝘮 đ˜„đ˜°đ˜Ș𝘯𝘹 đ˜Łđ˜Šđ˜©đ˜Șđ˜Żđ˜„ đ˜”đ˜©đ˜Š đ˜Žđ˜€đ˜Šđ˜Żđ˜Šđ˜Ž đ˜”đ˜° đ˜±đ˜łđ˜°đ˜·đ˜Șđ˜„đ˜Š đ˜±đ˜łđ˜°đ˜±đ˜Šđ˜ł đ˜šđ˜¶đ˜Șđ˜„đ˜ąđ˜Żđ˜€đ˜Š. 𝘌đ˜čđ˜±đ˜Šđ˜€đ˜” đ˜”đ˜° đ˜±đ˜Šđ˜łđ˜§đ˜°đ˜łđ˜ź đ˜€đ˜°đ˜„đ˜Š đ˜łđ˜Šđ˜·đ˜Ș𝘩𝘾𝘮, đ˜Żđ˜Šđ˜”đ˜žđ˜°đ˜łđ˜Ź 𝘱𝘯𝘱𝘭đ˜ș𝘮đ˜Ș𝘮, đ˜€đ˜°đ˜„đ˜Š đ˜Łđ˜Šđ˜©đ˜ąđ˜·đ˜Ș𝘰𝘳 𝘱𝘯𝘱𝘭đ˜ș𝘮đ˜Ș𝘮, đ˜ąđ˜Żđ˜„ 𝘾𝘳đ˜Șđ˜”đ˜Š đ˜€đ˜°đ˜„đ˜Š đ˜”đ˜° đ˜Šđ˜Żđ˜©đ˜ąđ˜Żđ˜€đ˜Š đ˜șđ˜°đ˜¶đ˜ł đ˜łđ˜Šđ˜„ đ˜”đ˜Šđ˜ąđ˜ź đ˜€đ˜ąđ˜±đ˜ąđ˜Łđ˜Ș𝘭đ˜Șđ˜”đ˜Ș𝘩𝘮."

About the trainer:
Charles F. Hamilton (Mr.Un1k0d3r) - Red Teamer with 10+ years experience delivering offensive testing services. Founder of RingZer0 Team website with 50,000+ members worldwide teaching hacking fundamentals. Prolific toolsmith and trainer who has delivered this training 20+ times. Specializes in covert Red Team operations in highly secured environments.

🔗 Get your ticket now to benefit from this world-class training: nsec.io/training-sessions/

#NorthSec #cybersecurity #infosec #redteam #activedirectory #EDR

2026-01-26

⏰ đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝗖𝗙𝗣 𝟼𝟬𝟼đŸČ: 𝗗đ—Čđ—żđ—»đ—¶Ăšđ—żđ—Č đ—°đ—”đ—źđ—»đ—°đ—Č đ—±'đ—Čđ—»đ˜ƒđ—Œđ˜†đ—Č𝗿 đ˜‚đ—»đ—Č đ—œđ—żđ—Œđ—œđ—Œđ˜€đ—¶đ˜đ—¶đ—Œđ—» ‱ 𝗟𝗼𝘀𝘁 đ—–đ—”đ—źđ—»đ—°đ—Č đ˜đ—Œ 𝗩𝘂𝗯đ—șđ—¶đ˜ 𝗼 đ—Łđ—żđ—Œđ—œđ—Œđ˜€đ—źđ—č (𝗧𝗼đ—č𝗾𝘀/đ—Șđ—Œđ—żđ—žđ˜€đ—”đ—Œđ—œđ˜€/đ—©đ—¶đ—čđ—č𝗼𝗮đ—Č𝘀)

👉 Submit your proposal at nsec.io/cfp before February 2nd, 2026 23:59 EST!

#NorthSec #cfp #cybersecurity #infosec

Reminder to submit a proposal for NorthSec's Call for Proposals (CfP)
NorthSec boosted:
Émilio Gonzalezres260@infosec.exchange
2026-01-23

Submitted a talk about detection-as-code to the @NorthSec Call for Papers! You have until feb 2nd if you’re interested in submitting :)

#CFP #conference #infosec

2026-01-20

👋 đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ: đ——Ă©đ—°đ—Œđ˜‚đ˜ƒđ—żđ—Č đ—čđ—Č đ—°đ—Œđ—șđ—¶đ˜Ă© đ—Œđ—żđ—Žđ—źđ—»đ—¶đ˜€đ—źđ˜đ—Č𝘂𝗿 ‱ 𝗠đ—Čđ—Č𝘁 đ˜đ—”đ—Č đ—ąđ—żđ—Žđ—źđ—»đ—¶đ˜‡đ—¶đ—»đ—Ž đ—–đ—Œđ—șđ—șđ—¶đ˜đ˜đ—Čđ—Č

Un événement exceptionnel ne serait pas possible sans une équipe exceptionnelle! NorthSec présente les 33 membres du comité organisateur 2026!

Bienvenue aux nouvelles personnes contributrices qui se sont jointes à l'aventure : Alexis Martin, Jessy Lavoie, Justin van den Hanenberg, Jordan Aralamon, Iman, Yamlal Gotame, Virginia Moussa Yaya et Vincent Drolet! Découvre toute l'équipe ici : nsec.io/team

𝘗.𝘚.: 𝘓𝘩𝘮 𝘣đ˜Șđ˜­đ˜­đ˜Šđ˜”đ˜Ž đ˜ąđ˜¶ đ˜”đ˜ąđ˜łđ˜Ș𝘧 đ˜±đ˜łĂ©đ˜·đ˜Šđ˜Żđ˜”đ˜Š 𝘩𝘯 đ˜Čđ˜¶đ˜ąđ˜Żđ˜”đ˜Șđ˜”Ă© 𝘭đ˜Ș𝘼đ˜Șđ˜”Ă©đ˜Š đ˜Žđ˜°đ˜Żđ˜” đ˜Šđ˜Żđ˜€đ˜°đ˜łđ˜Š đ˜„đ˜Șđ˜Žđ˜±đ˜°đ˜Żđ˜Ș𝘣𝘭𝘩𝘮 đ˜«đ˜¶đ˜Žđ˜Čđ˜¶'đ˜ąđ˜¶ 28 đ˜§Ă©đ˜·đ˜łđ˜Ș𝘩𝘳!
𝘗.𝘚. 2: 𝘓𝘱 đ˜Žđ˜°đ˜¶đ˜źđ˜Ș𝘮𝘮đ˜Ș𝘰𝘯 đ˜„đ˜Š đ˜±đ˜łđ˜°đ˜±đ˜°đ˜Žđ˜Șđ˜”đ˜Ș𝘰𝘯𝘮 (𝘊𝘧𝘗) 𝘮𝘩 đ˜”đ˜Šđ˜łđ˜źđ˜Ș𝘯𝘩 𝘣đ˜Șđ˜Šđ˜Żđ˜”ĂŽđ˜” — đ˜±đ˜łđ˜Šđ˜źđ˜Șù𝘳𝘩 đ˜ŽĂ©đ˜­đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 𝘭𝘩 2 đ˜§Ă©đ˜·đ˜łđ˜Ș𝘩𝘳!

An exceptional event wouldn't be possible without an exceptional team! NorthSec presents the 33 members of the 2026 organizing committee!

Welcome to the new contributors who joined the adventure: Alexis Martin, Jessy Lavoie, Justin van den Hanenberg, Jordan Aralamon, Iman, Yamlal Gotame, Virginia Moussa Yaya, and Vincent Drolet! Meet the full team here: nsec.io/team

𝘗.𝘚.: 𝘓đ˜Ș𝘼đ˜Șđ˜”đ˜Šđ˜„ đ˜Čđ˜¶đ˜ąđ˜Żđ˜”đ˜Șđ˜”đ˜ș 𝘩𝘱𝘳𝘭đ˜ș 𝘣đ˜Șđ˜łđ˜„ đ˜”đ˜Șđ˜€đ˜Źđ˜Šđ˜”đ˜Ž 𝘱𝘳𝘩 đ˜Žđ˜”đ˜Ș𝘭𝘭 đ˜ąđ˜·đ˜ąđ˜Ș𝘭𝘱𝘣𝘭𝘩 đ˜¶đ˜Żđ˜”đ˜Ș𝘭 đ˜đ˜Šđ˜Łđ˜łđ˜¶đ˜ąđ˜łđ˜ș 28!
𝘗.𝘚. 2: đ˜›đ˜©đ˜Š 𝘊𝘱𝘭𝘭 𝘧𝘰𝘳 đ˜—đ˜łđ˜°đ˜±đ˜°đ˜Žđ˜ąđ˜­đ˜Ž (𝘊𝘧𝘗) đ˜€đ˜­đ˜°đ˜Žđ˜Šđ˜Ž 𝘮𝘰𝘰𝘯 — 𝘧đ˜Șđ˜łđ˜Žđ˜” đ˜Žđ˜Šđ˜­đ˜Šđ˜€đ˜”đ˜Ș𝘰𝘯 𝘰𝘯 đ˜đ˜Šđ˜Łđ˜łđ˜¶đ˜ąđ˜łđ˜ș 2!

NorthSec boosted:
2026-01-20

📆 Are you looking to spend your training budget for 2026?
🩀 Are you struggling with reversing Rust binaries, and not even sure where to get started?
🇹🇩 Are you looking for high-quality technical training located in Canada?

Consider our 3-day training, "Deconstructing Rust Binaries", at @NorthSec from May 11-13 in Montréal: nsec.io/training/2026-deconstr

This is the first comprehensive training course focused solely on reverse engineering Rust binaries. You will learn how to effectively triage Rust binaries, how to trace data flow through Rust binaries, and how to tackle common techniques found in the Rust malware ecosystem. Real Rust malware samples are used in the course, ensuring that you have the practical skills to tackle your next Rust sample.

Early bird pricing is available now until Feb. 28th! registrations.nsec.io/northsec

#rust #rustlang #ReverseEngineering #reversing #infosec #MalwareAnalysis #malware #InfosecTraining

NorthSec boosted:
2026-01-06

After presenting "Exploiting the not so misuse-resistant AES-GCM API of OpenSSL" at @NorthSec in May 2025, I've finally finished writing a detailed blog post on the subject.

It covers how multiple languages/libraries (i.e. Ruby, PHP, Node.js, Rust's OpenSSL crate, Erlang, and possibly others) expose OpenSSL AEAD decryption functions in an easy-to-misuse way.

If misused, those can be exploited to forge arbitrary ciphertexts and decrypt legit ones.

You can find the blog post here: sideni.xyz/posts/exploiting_op

2026-01-05

🎆 đ—•đ—Œđ—»đ—»đ—Č đ—źđ—»đ—»đ—Č́đ—Č 𝟼𝟬𝟼đŸČ! ‱ đ—›đ—źđ—œđ—œđ˜† 𝗡đ—Č𝘄 𝗬đ—Č𝗼𝗿 𝟼𝟬𝟼đŸČ!

L'équipe NorthSec vous souhaite une année remplie de succcesss!

2025 fut une année incroyable : 1200 participant·e·s passionné·e·s, 30 conférences captivantes, des ateliers techniques pointus, et 37 tracks de défis CTF qui ont repoussé les limites.

L'Ă©dition 2026 est dĂ©jĂ  en pleine prĂ©paration: participez Ă  la construction d'une Ă©dition encore plus verte que jamais! đŸŒ±đŸ‘€

→ 𝗖𝗼đ—čđ—č đ—łđ—Œđ—ż đ—Łđ—żđ—Œđ—œđ—Œđ˜€đ—źđ—č𝘀 (dernier dĂ©lai : 2 fĂ©vrier) : Soumettez vos idĂ©es de confĂ©rences, ateliers ou villages : nsec.io/cfp

→ đ—™đ—Œđ—żđ—șđ—źđ˜đ—¶đ—Œđ—»đ˜€ đ—±đ—Č đ—”đ—źđ˜‚đ˜ 𝗰𝗼đ—čđ—¶đ—Żđ—żđ—Č : 10 formations professionnelles offertes : nsec.io/training-sessions

→ 𝗗đ—Č𝘃đ—Čđ—»đ—Č𝘇 đ—œđ—źđ—żđ˜đ—Čđ—»đ—źđ—¶đ—żđ—Č : Soutenez l'Ă©vĂ©nement et rejoignez notre communautĂ© : nsec.io/become-a-sponsor

→ đ—•đ—¶đ—čđ—čđ—Č𝘁𝘀 đ—Čđ—» đ—œđ—żđ—ČÌđ˜ƒđ—Čđ—»đ˜đ—Č (tarif limitĂ©!) : Profitez du tarif avantageux maintenant : registrations.nsec.io/northsec

📅 Save the Date : 11-17 Mai 2026

📾 Photo du party du jeudi durant NorthSec 2025

🎆 đ—›đ—źđ—œđ—œđ˜† 𝗡đ—Č𝘄 𝗬đ—Č𝗼𝗿 𝟼𝟬𝟼đŸČ! ‱ đ—•đ—Œđ—»đ—»đ—Č đ—źđ—»đ—»đ—Č́đ—Č 𝟼𝟬𝟼đŸČ!

The NorthSec team wishes you a year filled with succcesss!

2025 was an incredible year: 1200 passionate attendees, 30 talks, cutting-edge technical workshops, and 37 CTF challenge tracks that pushed boundaries.

NorthSec 2026 is in full swing: be part of building our greenest edition yet! đŸŒ±đŸ‘€

→ 𝗖𝗼đ—čđ—č đ—łđ—Œđ—ż đ—Łđ—żđ—Œđ—œđ—Œđ˜€đ—źđ—č𝘀 (deadline: February 2): Submit your talks, workshops or village ideas: nsec.io/cfp

→ đ—”đ—±đ˜ƒđ—źđ—»đ—°đ—Čđ—± đ—§đ—żđ—źđ—¶đ—»đ—¶đ—»đ—Ž: 10 professional courses available: nsec.io/training-sessions

→ 𝗕đ—Čđ—°đ—Œđ—șđ—Č 𝗼 đ—Šđ—œđ—Œđ—»đ˜€đ—Œđ—ż: Support the event and join our community: nsec.io/become-a-sponsor

→ 𝗘𝗼𝗿đ—č𝘆 đ—•đ—¶đ—żđ—± đ—§đ—¶đ—°đ—žđ—Č𝘁𝘀 (limited time!): Special pricing available now: registrations.nsec.io/northsec

📅 Save the Date: May 11-17, 2026

📾 Memories from Thursday night party during NorthSec 2025

NorthSec 2025 Thursday Night Party
2025-12-22

🎯 đ—Ąđ—Œđ—żđ˜đ—”đ—Šđ—Č𝗰 𝟼𝟬𝟼đŸČ: 𝗗đ—Č𝘃đ—Čđ—»đ—Č𝘇 đ—°đ—Œđ—șđ—șđ—źđ—»đ—±đ—¶đ˜đ—źđ—¶đ—żđ—Č; đ—Łđ—żđ—Œđ—łđ—¶đ˜đ—Č𝘇 đ—±đ˜‚ đ—șđ—Čđ—¶đ—čđ—čđ—Č𝘂𝗿 đ—œđ—żđ—¶đ˜…! ‱ 𝗕đ—Čđ—°đ—Œđ—șđ—Č đ—Šđ—œđ—Œđ—»đ˜€đ—Œđ—ż; 𝗚đ—Č𝘁 đ˜đ—”đ—Č đ—Ÿđ—Œđ˜„đ—Č𝘀𝘁 đ—Łđ—żđ—¶đ—°đ—Č! ⏰

Faites rayonner votre organisation au plus grand événement de cybersécurité organisé par la communauté!

𝗗'đ—¶đ—°đ—¶ đ—čđ—Č 𝟯𝟭 đ—±Ă©đ—°đ—Čđ—ș𝗯𝗿đ—Č đŸźđŸŹđŸźđŸ±, bĂ©nĂ©ficiez d'un rabais de 10% lorsque vous signez pour un plan (Diamond, Platinum, Gold, Silver, Support ou entreprise en dĂ©marrage)!

Toute l'info 👉 nsec.io/become-a-sponsor/

Showcase your organization at the largest cybersecurity event organized by the community!

You have until 𝗗đ—Č𝗰đ—Čđ—ș𝗯đ—Č𝗿 𝟯𝟭𝘀𝘁, đŸźđŸŹđŸźđŸ± to get 10% off when you sign up for a plan (Diamond, Platinum, Gold, Silver, Support, or Startup)!

All the info 👉 nsec.io/become-a-sponsor/

#NorthSec #infosec

NorthSec sponsorship discount flyer

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst