Expand Your Security Services: From Web Apps to ..

BY Adina Harabagiu
Expand your security services: from web apps to complete cloud infrastructure November 11th, 2025 | Bucharest ..

Build your first Offensive Security AI Agent

BY Adina Harabagiu
Build your first Offensive Security AI Agent November 12th, 2025 | Bucharest Let’s demystify how AI agents ..

Hunt, Detect, Respond: Bridging Log Analysis, ..

BY Adina Harabagiu
Hunt, detect, respond: bridging log analysis, threat hunting & incident response November 10th, 2025 | ..

ClickBait

BY Adina Harabagiu
Overview Back to Contests ClickBait ClickBait is a fast-paced competition where participants will uncover ..

Think Beyond Models

BY Adina Harabagiu
Overview Back to Contests Think Beyond Models Phishing is one of the biggest cybersecurity threats today: ..

IoT Hunt

BY Adina Harabagiu
Overview Back to Contests IoT Hunt Join us on a treasure hunt themed around the marvelous experience of IoT ..

“Bad actors will begin using massive A.I. to ..

BY Adina Harabagiu
Edition #14 of DefCamp is just around the corner, and the excitement is building! With less than a week to go,..

ThirdSeer: Advanced Third-Party Risk Management ..

BY Adina Harabagiu
Data Core Systems is pleased to introduce ThirdSeer, a solution built to simplify third-party risk management ..

Security Operations Center by Data Core Systems

BY Adina Harabagiu
Since 2022, the Data Core Systems Security Operations Center (SOC) has been fully committed to defending ..

Offensive Services by Data Core Systems

BY Adina Harabagiu
In cybersecurity, anticipating threats is key. Data Core Systems’ Offensive Services provide a comprehensive..

Crack the SCADA

BY Adina Harabagiu
Overview Back to Contests Crack the SCADA Mission: Your mission, should you decide to accept it, is to find a ..

Decode and Conquer: Forensics CTF Challenge

BY Adina Harabagiu
Overview Back to Contests Decode and Conquer: Forensics CTF Challenge Put your forensic and reverse ..

The Vulnerability Vault

BY Adina Harabagiu
Overview Back to Contests The Vulnerability Vault The Vulnerability Vault is a pentesting competition where ..

Threat Hunting: taking the proactive approach in ..

BY Adina Harabagiu
#BLUE: Threat Hunting: taking the proactive approach in Cyber Security Discover the essentials of threat ..

Cyber Reverse & MITRE Challenge

BY Adina Harabagiu
Overview Back to Contests Cyber Reverse & MITRE Challenge Cyber Reverse & MITRE Challenge invites you ..