#DefCon33

2026-02-02

🎥 Watch the video recording of the talk:
“Letthemin: Facilitating High-Value Purple Teams Using an Assumed Compromise Approach" from Adversary Village at @defcon 33 Creator Stage.

🎤 Speaker: Sarah Hume - Purple Team Service Lead at Security Risk Advisors.
youtu.be/xM8nodIw1_E?si=44upZ7

#AdversaryVillage #DEFCON33 #DEFCON #AccessEverywhere #AdversaryTactics

2026-02-01

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-02-01

🎥Watch the video recording of the talk: “Red Russians: How Russian APT groups closely follow offensive security research.” from Adversary Village at @defcon 33 Creator Stage, delivered by Will Thomas, Cyber Threat Intel Advisor at @teamcymru.
youtube.com/watch?v=bpUxuOdfGHM

#AdversaryVillage #DEFCON33 #AccessEverywhere #ThreatIntelligence

2026-01-26

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-01-25

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-01-25

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-01-24

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

Zapa :thounking: :verified:trojanfoxtrot@infosec.exchange
2026-01-23

I have a great presentation/hands-on idea for any west coast-based infosec conference CFP, but DEFCON hasn’t opened up CFP for DC33, yet.

This would be my first time doing this, and it’s Applied Cyber Threat Intelligence. Any friends out there?

#infosec
#CTI
#cybersecurity
#threatintel
#cyberthreatintelligence
#DEFCON33

2026-01-22

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-01-20

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-01-09

🎥Watch the video recording of the talk: “Operational Twilight: APTs, OT, and the geopolitics of a dying climate.” from Adversary Village at @defcon 33 Creator Stage, delivered by Cybelle O., Cyber Threat Intelligence Researcher at Malwarelandia.
youtu.be/Ekp5iMPEgVw?si=lZMd2Z

#AdversaryVillage #DEFCON33 #AccessEverywhere #APTs #OTSecurity #ThreatIntelligence #AdversaryTradecraft

2026-01-07

🎥 Watch the video recording of the talk: “Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors”, from Adversary Village at @defcon 33 Creator Stage.

🎤 Speaker: @spark - Staff Threat Researcher at Zscaler.

youtu.be/j5gxdWd5sMg?si=ET2lcQ

#AdversaryVillage #DEFCON33 #DEFCON #AccessEverywhere
#AdversaryTactics #AdversaryEmulation #ThreatActors #AdversarySimulation

2026-01-05

🎥 Watch the video recording of the talk:
“Here and Now: Exploiting the Human Layer at the Right Moment.” from Adversary Village @defcon 33 Creator Stage.

🎤 Speaker: Daniel Isler - Awareness & Social Engineering Consultant & Team Leader at Dreamlab Technologies.

youtu.be/vvDostysRAU?si=E-5LwL

#AdversaryVillage #DEFCON33 #DEFCON #AccessEverywhere
#AdversaryTactics #AdversaryEmulation #SocialEngineering
#ThreatActors #AdversarySimulation #AdversarialMindset

2026-01-03

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2026-01-02

Watch the session recording “Malware in the Gist: How Malicious Packages on npm Bypass Existing Security Tools” on YouTube from Adversary Village at @defcon 33 – Creator Stage, delivered by Paul McCarty, Founder of @securestackco.
youtu.be/emhocCFs9N4?si=_vV1Q9

#AdversaryVillage #DEFCON33 #AccessEverywhere #Malware #npmBypass #AdversaryTradecraft

2025-12-26

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2025-12-24

The Honeybear Honey Pot is online! 🐻

SSH to my head: honeybear.hydrox.fun #defcon #defcon33 #hardhatbrigade

2025-12-24

💭 " The BIC PIC (By: Eli McRae) is modeled after an Afro Pic! It is both an SAO and an SAO totem, so our badge is definitely full of interesting tricks ! " 👾

#DEFCON #BICVillage #BlacksInCyber #DEFCON33

Blacks In Cybersecurity HQ :verified:blacksincyber@infosec.exchange
2025-12-24

💭 " The BIC PIC (By: Eli McRae) is modeled after an Afro Pic! It is both an SAO and an SAO totem, so our badge is definitely full of interesting tricks ! " 👾

#DEFCON #BICVillage #BlacksInCyber #DEFCON33

2025-12-23

💭 " Seeing people's faces scowl in frustration and then light up when they solve a problem, that really makes it worthwhile, seeing the fruits of your labor in that regard. I've had a pretty good experience volunteering here! "

#DEFCON #BICVillage #BlacksInCyber #DEFCON33

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst