๐—•รฉ๐—ปรฉ๐˜ƒ๐—ผ๐—น๐—ฎ๐˜: ๐—ฅ๐—ฒ๐—ท๐—ผ๐—ถ๐—ป๐˜€ ๐—น'รฉ๐—พ๐˜‚๐—ถ๐—ฝ๐—ฒ ๐—ฑ๐—ฒ ๐—ฏรฉ๐—ปรฉ๐˜ƒ๐—ผ๐—น๐—ฒ๐˜€ ๐—ฝ๐—ผ๐˜‚๐—ฟ ๐—น'รฉ๐—ฑ๐—ถ๐˜๐—ถ๐—ผ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ โ€ข ๐—ฉ๐—ผ๐—น๐˜‚๐—ป๐˜๐—ฒ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด: ๐—๐—ผ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—ฉ๐—ผ๐—น๐˜‚๐—ป๐˜๐—ฒ๐—ฒ๐—ฟ ๐—ง๐—ฒ๐—ฎ๐—บ ๐—ณ๐—ผ๐—ฟ ๐˜๐—ต๐—ฒ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—˜๐—ฑ๐—ถ๐˜๐—ถ๐—ผ๐—ป!

ร€ la recherche de bรฉnรฉvoles les 11 au 17 mai prochains. Les bรฉnรฉvoles sont au cล“ur de NorthSec depuis 2013. Toute l'organisation de l'รฉvรฉnement est portรฉe par une รฉquipe incroyable de bรฉnรฉvoles.

ร‰quipes qui recherchent des bรฉnรฉvoles: confรฉrences, logistique, formations, inscriptions/accueil, bar et villages.

Ce qui t'attend:

  • Accรจs gratuit ร  la confรฉrence et ร  la compรฉtition (avec l'รฉquipe ยซunderdogsยป non-compรฉtitive)
  • T-shirt bรฉnรฉvole NorthSec
  • Nourriture et boissons pendant tes shifts
  • Rรฉseautage avec des professionnels de la cybersรฉcuritรฉ

Tous les dรฉtails ร  https://nsec.io/fr/volunteer/

Looking for volunteers from May 11 to 17. Volunteers have been at the heart of NorthSec since 2013. The entire event is powered by an incredible team of volunteers.

Teams looking for volunteers: conferences, logistics, training, registration/welcomw, bar and villages.

What awaits you:

  • Free access to the conference and competition (with the non-competitive team "underdogs")
  • NorthSec volunteer t-shirt
  • Food and drinks durieg your shifts
  • Networking with cybersecurity professionals

More details at https://nsec.io/volunteer/

#NorthSec

NorthSec 2026 speaker lineup is here ...and it's our best yet!

31 talks & workshops. Two days in Montrรฉal. Tickets going fast (get yours by April 1st to secure a badge and a t-shirts). ๐Ÿ‘‡

๐—ง๐—ฎ๐—น๐—ธ๐˜€:
โ€ข Guillaume Valadon & Gaetan โ€” Private Key Leaks in the Wild: Insights from Certificate Transparency
โ€ข Philippe Pรฉpos Petitclerc โ€” A systematic approach to evading antivirus software
โ€ข ร‰milio Gonzalez โ€” Increasing detection engineering maturity with detection as code
โ€ข Franรงois Labrรจche โ€” A Needle in a Haystack: Identifying an Infostealer Attack Through Trillions of Events in a Large-scale Modern SOC
โ€ข Wietze โ€” Trust me, I'm a Shortcut - new LNK abuse methods
โ€ข Reza Sharifi โ€” Internet Blackout 2026 in Iran โ€” Next-Level Internet Censorship: A Technical Breakdown of Techniques and Tactics
โ€ข Andrew Buchanan, Max CM & Connor Laidlaw โ€” Commit, Push, Compromise: Attacking Modern GitHub Orgs
โ€ข Dirk-jan Mollema & Sanne Maasakkers โ€” Researchers vs. Threat Actors in Cloud Attacks
โ€ข Jeremy Miller โ€” Measuring AI Ability to Complete Long Cybersecurity Tasks
โ€ข Manu Jose โ€” The Merchant of Venice: Trading Latency for Security at Scale
โ€ข Joshua Prager & Ben Schroeder โ€” Mapping Deception Solutions with BloodHound OpenGraph
โ€ข Christian Paquin โ€” Doxxing-proof authentic digital media: trust the asset, protect the source
โ€ข Robbe Van Roey โ€” Hacking Browsers: The Easy Way
โ€ข Ron Bowes โ€” Adventures in Process Injection (How I Accidentally Built a Debugger - Again!)
โ€ข Xavier Facรฉlina โ€” Le futur s'invente avant-hier
โ€ข Charl-Alexandre Le Brun & Simon Lachkar โ€” The OpenGraph diary: Attack path management applied to Ansible
โ€ข Franรงois Proulx โ€” Living Off The Pipeline: Defensive Research, Weaponized
โ€ข Pierre-Nicolas Allard-Coutu โ€” Stolen Laptops: Defeating DMA Countermeasures
โ€ข Philippe Marchand โ€” Cybermenaces gรฉopolitiques au Canada: ร‰tat des lieux et perspectives stratรฉgiques
โ€ข Kristine Barbara โ€” From Experts to Everyone: Democratizing Threat Modeling at Ubisoft
โ€ข Chirag Savla โ€” When Serverless Becomes a Foothold: Abusing Azure Function Apps in Modern Cloud Environments
โ€ข Brad Edwards โ€” APTL: An Open Source Agentic Purple Team Lab
โ€ข Maxime Arquilliere & Coline C โ€” Sold to the highest bidder: the escalation of ADINT from geolocation tracking to intrusion vector
โ€ข Sรฉbastien Dudek โ€” Hacking 5G: From Radio Security to the APIs

๐—ช๐—ผ๐—ฟ๐—ธ๐˜€๐—ต๐—ผ๐—ฝ๐˜€:
โ€ข Logan Maclaren & Lewis Moore โ€” Command & Conquer: A hands-on C2 primer for aspiring Red & Blue teamers
โ€ข Santiago Abastante โ€” AWS Security - The Purple Team Way
โ€ข Faan Rossouw โ€” Agentic AI for Threat Hunting
โ€ข Ben Gardiner โ€” Hardware RE: a gentle intro
โ€ข Tammy Harper โ€” The Ransomware Negotiation Lab
โ€ข Mark El-Khoury โ€” DIY Continuous Security: Practical Security Engineering
โ€ข Ashley Manraj & Philippe Dugrรฉ (zer0x64) โ€” Breaking and Hardening the Cloud: Advanced Hooking and Shellcoding in a Hardened Environment

#NorthSec #cfp #infosec #cybersecurity

๐ŸŸฃ ๐—ฅ๐—ฒ๐—ป๐—ฑ๐—ผ๐—ป๐˜€ ๐—ป๐—ผ๐˜๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ฎ๐˜‚๐˜รฉ ๐—ฝ๐—น๐˜‚๐˜€ ๐—ถ๐—ป๐—ฐ๐—น๐˜‚๐˜€๐—ถ๐˜ƒ๐—ฒ! โ€ข ๐—Ÿ๐—ฒ๐˜'๐˜€ ๐—บ๐—ฎ๐—ธ๐—ฒ ๐—ผ๐˜‚๐—ฟ ๐—ฐ๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐˜† ๐—บ๐—ผ๐—ฟ๐—ฒ ๐—ถ๐—ป๐—ฐ๐—น๐˜‚๐˜€๐—ถ๐˜ƒ๐—ฒ!

Tu fais partie d'un groupe sous-reprรฉsentรฉ et tu rรชves de participer ร  un CTF enivrant? NorthSec te donne ta chance!

Ce que tu peux gagner: 1 billet CTF ร  gagner (jusqu'ร  8 personnes seront sรฉlectionnรฉes)

๐Ÿ‘‰ Date limite: 13 mars

Envoie ta lettre de motivation et ton CV. Partage cette initiative avec toutes les personnes qui pourraient รชtre intรฉressรฉes! https://nsec.io/fr/diversity/

Are you part of an underrepresented group and dream of participating in an exciting CTF? NorthSec is giving you the chance!

What you can win: 1 CTF ticket (up to 8 people will be chosen)

๐Ÿ‘‰ Deadline: March 13

Send your cover letter and resume. Share this initiative with anyone who might be interested! https://nsec.io/diversity/

#womenintech #cybersecurity #infosec #NorthSec

Diversitรฉ

NorthSec 2026

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (12/12): "Adversary Perspectives: Azure" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Hope Walker (SpecterOps)

๐Ÿ“… Dates: May 10-13, 2026 (4 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Remote

Description:
"๐˜–๐˜ณ๐˜จ๐˜ข๐˜ฏ๐˜ช๐˜ป๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ฉ๐˜ฆ๐˜ข๐˜ฅ๐˜ด ๐˜ช๐˜ฏ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ค๐˜ญ๐˜ฐ๐˜ถ๐˜ฅ๐˜ด, ๐˜ฐ๐˜ณ ๐˜ข๐˜ต ๐˜ญ๐˜ฆ๐˜ข๐˜ด๐˜ต ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ช๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ. ๐˜Ž๐˜ฐ๐˜ฏ๐˜ฆ ๐˜ข๐˜ณ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฅ๐˜ข๐˜บ๐˜ด ๐˜ฐ๐˜ง ๐˜ฐ๐˜ฏ-๐˜ฑ๐˜ณ๐˜ฆ๐˜ฎ ๐˜ฅ๐˜ฐ๐˜ฎ๐˜ข๐˜ช๐˜ฏ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ฐ๐˜ญ๐˜ญ๐˜ฆ๐˜ณ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜Œ๐˜น๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜จ๐˜ฆ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ฆ๐˜ณ๐˜ด. ๐˜”๐˜ช๐˜ค๐˜ณ๐˜ฐ๐˜ด๐˜ฐ๐˜ง๐˜ตโ€™๐˜ด ๐˜ˆ๐˜ป๐˜ถ๐˜ณ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ด ๐˜ฐ๐˜ณ๐˜จ๐˜ข๐˜ฏ๐˜ช๐˜ป๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ ๐˜ค๐˜ญ๐˜ฐ๐˜ถ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ด๐˜ต๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ช๐˜ค๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ข๐˜ถ๐˜จ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต, ๐˜ฐ๐˜ณ ๐˜ช๐˜ฏ ๐˜ด๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ค๐˜ข๐˜ด๐˜ฆ๐˜ด, ๐˜ณ๐˜ฆ๐˜ฑ๐˜ญ๐˜ข๐˜ค๐˜ฆ ๐˜ฆ๐˜น๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ง๐˜ถ๐˜ฏ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ต๐˜ฆ๐˜ญ๐˜บ. ๐˜ˆ๐˜ญ๐˜ญ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ๐˜ด๐˜ฆ ๐˜ฏ๐˜ฆ๐˜ธ ๐˜ค๐˜ญ๐˜ฐ๐˜ถ๐˜ฅ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ต๐˜ด ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ฃ๐˜ฐ๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ต๐˜ณ๐˜ข๐˜ฅ๐˜ช๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ฅ๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฎ๐˜ฆ๐˜ข๐˜ด๐˜ถ๐˜ณ๐˜ฆ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ด๐˜ด๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด. ๐˜๐˜ฐ๐˜ณ ๐˜ฏ๐˜ฆ๐˜ธ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ท๐˜ฆ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ฏ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ง๐˜ฆ๐˜ด๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ด ๐˜ข๐˜ญ๐˜ช๐˜ฌ๐˜ฆ, ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฉ๐˜ฆ๐˜ด๐˜ฆ ๐˜ฏ๐˜ฆ๐˜ธ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ฐ๐˜ญ๐˜ฐ๐˜จ๐˜ช๐˜ฆ๐˜ด ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฏ๐˜ถ๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ด ๐˜ฐ๐˜ง ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฎ ๐˜ค๐˜ข๐˜ฏ ๐˜ฒ๐˜ถ๐˜ช๐˜ค๐˜ฌ๐˜ญ๐˜บ ๐˜ฃ๐˜ฆ๐˜ค๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ฆ๐˜ฅ. ๐˜ˆ๐˜ฅ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ข๐˜ณ๐˜บ ๐˜—๐˜ฆ๐˜ณ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ๐˜ด: ๐˜ˆ๐˜ป๐˜ถ๐˜ณ๐˜ฆ ๐˜ข๐˜ช๐˜ฎ๐˜ด ๐˜ต๐˜ฐ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ฆ ๐˜ฑ๐˜ข๐˜ณ๐˜ต๐˜ช๐˜ค๐˜ช๐˜ฑ๐˜ข๐˜ฏ๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ๐˜ฐ๐˜ถ๐˜ต ๐˜ฑ๐˜ณ๐˜ฆ๐˜ท๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜ˆ๐˜ป๐˜ถ๐˜ณ๐˜ฆ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข ๐˜ด๐˜ฐ๐˜ญ๐˜ช๐˜ฅ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ฐ๐˜ง ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ฆ๐˜ณ๐˜ด ๐˜ญ๐˜ฐ๐˜ฐ๐˜ฌ ๐˜ข๐˜ต ๐˜”๐˜ช๐˜ค๐˜ณ๐˜ฐ๐˜ด๐˜ฐ๐˜ง๐˜ต ๐˜ˆ๐˜ป๐˜ถ๐˜ณ๐˜ฆ, ๐˜ช๐˜ต๐˜ด ๐˜ข๐˜ถ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฎ๐˜ฆ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ช๐˜ด๐˜ฎ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฉ๐˜ฆ๐˜บ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ฐ๐˜ฏ๐˜ญ๐˜บ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ ๐˜ˆ๐˜ป๐˜ถ๐˜ณ๐˜ฆ-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด."

About the trainer:
Hope Walker (@icemoonhsv) is a Principal Consultant at SpecterOps with experience in conducting and leading red team operations. Prior to joining SpecterOps, she conducted research, led red team process improvement efforts, trained new operators, and managed the operations floor for a DoD Red Team. Hope holds four degrees from the University of Alabama in Huntsville including a masterโ€™s in cyber security and was a recipient of the National Science Foundation Cyber Corps scholarship.

๐Ÿ”— Training details: https://nsec.io/training/2026-adversary-perspectives-azure/

#NorthSec #cybersecurity #Azure #cloudsecurity #offensivesecurity

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (11/12): "Practical AI Security - Go Beyond Theory: Build, Break, and Defend" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Harish Ramadoss

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: On-Site

Description: Learn AI security from first principles with a Build, Break, Defend approach. Build production-grade GenAI applications using LLM APIs, embeddings, RAG pipelines, agentic systems, and MCPs. Attack real applications through prompt injection, sensitive data disclosure, and MCP exploitation. Implement guardrails, MCP gateways for observability, and agentic security patterns. Integrate AI security tooling into your SDLC.

About the trainer:
Harish Ramadoss has several years of expertise in Product Security, Red Teaming, and Security Research. Previously, he was a Principal at Trustwave Spiderlabs, where he led their Application Security efforts. He joined Rippling as a founding member of the Security Engineering team and leads their AI Security and Appsec efforts. Harish built DejaVu, an open-source deception platform. He has presented at Black Hat, DEFCON, HITB, and other conferences globally.

๐Ÿ”— Training details: https://nsec.io/training/2026-practical-ai-security-go-beyond-theory-build-break-and-defend/

#NorthSec #cybersecurity #AI #aisecurity #generativeai

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (10/12): "Offensive GCP Operations & Tactics Certification (OGOTC)" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Chirag Savla & Jay Pandya

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

Description: "๐˜–๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜Ž๐˜Š๐˜— ๐˜–๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด & ๐˜›๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ด ๐˜Š๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ง๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ (๐˜–๐˜Ž๐˜–๐˜›๐˜Š) ๐˜ช๐˜ด ๐˜ข๐˜ฏ ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ๐˜ด-๐˜ฐ๐˜ฏ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ด๐˜ช๐˜จ๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฆ๐˜ฒ๐˜ถ๐˜ช๐˜ฑ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ง๐˜ฆ๐˜ด๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด ๐˜ต๐˜ฐ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ด๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ช๐˜ต ๐˜ท๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ช๐˜ฏ ๐˜Ž๐˜ฐ๐˜ฐ๐˜จ๐˜ญ๐˜ฆ ๐˜Š๐˜ญ๐˜ฐ๐˜ถ๐˜ฅ ๐˜—๐˜ญ๐˜ข๐˜ต๐˜ง๐˜ฐ๐˜ณ๐˜ฎ (๐˜Ž๐˜Š๐˜—) ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ค๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ง๐˜ถ๐˜ญ๐˜ญ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ ๐˜ญ๐˜ช๐˜ง๐˜ฆ๐˜ค๐˜บ๐˜ค๐˜ญ๐˜ฆ, ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ช๐˜ฏ๐˜ช๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ข๐˜ค๐˜ค๐˜ฆ๐˜ด๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ถ๐˜ฎ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ต๐˜ฐ ๐˜ฑ๐˜ณ๐˜ช๐˜ท๐˜ช๐˜ญ๐˜ฆ๐˜จ๐˜ฆ ๐˜ฆ๐˜ด๐˜ค๐˜ข๐˜ญ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ญ๐˜ข๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ญ ๐˜ฎ๐˜ฐ๐˜ท๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฑ๐˜ฐ๐˜ด๐˜ต-๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ช๐˜ต๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด. ๐˜—๐˜ข๐˜ณ๐˜ต๐˜ช๐˜ค๐˜ช๐˜ฑ๐˜ข๐˜ฏ๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜ต๐˜ฐ ๐˜ข๐˜ฃ๐˜ถ๐˜ด๐˜ฆ ๐˜ฎ๐˜ช๐˜ด๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜จ๐˜ถ๐˜ณ๐˜ฆ๐˜ฅ ๐˜๐˜ˆ๐˜” ๐˜ณ๐˜ฐ๐˜ญ๐˜ฆ๐˜ด, ๐˜ฆ๐˜น๐˜ฑ๐˜ฐ๐˜ด๐˜ฆ๐˜ฅ ๐˜ˆ๐˜—๐˜๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ฆ๐˜ต๐˜ข๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ช๐˜ค๐˜ฆ๐˜ด, ๐˜ข๐˜ด ๐˜ธ๐˜ฆ๐˜ญ๐˜ญ ๐˜ข๐˜ด ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ช๐˜ต ๐˜ธ๐˜ฆ๐˜ข๐˜ฌ ๐˜ฑ๐˜ฆ๐˜ณ๐˜ฎ๐˜ช๐˜ด๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ง๐˜ข๐˜ถ๐˜ญ๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜จ๐˜ถ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ฆ๐˜ด ๐˜ข ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ฅ๐˜ช๐˜ท๐˜ฆ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜’๐˜ถ๐˜ฃ๐˜ฆ๐˜ณ๐˜ฏ๐˜ฆ๐˜ต๐˜ฆ๐˜ด ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ด, ๐˜ฉ๐˜ช๐˜จ๐˜ฉ๐˜ญ๐˜ช๐˜จ๐˜ฉ๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฐ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฎ๐˜ช๐˜ด๐˜ฆ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ฐ๐˜ท๐˜ฆ ๐˜ธ๐˜ช๐˜ต๐˜ฉ๐˜ช๐˜ฏ ๐˜’๐˜ถ๐˜ฃ๐˜ฆ๐˜ณ๐˜ฏ๐˜ฆ๐˜ต๐˜ฆ๐˜ด ๐˜ค๐˜ญ๐˜ถ๐˜ด๐˜ต๐˜ฆ๐˜ณ๐˜ด. ๐˜™๐˜ฆ๐˜ข๐˜ญ-๐˜ธ๐˜ฐ๐˜ณ๐˜ญ๐˜ฅ ๐˜ด๐˜ค๐˜ฆ๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฐ๐˜ด, ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ค๐˜ณ๐˜ฆ๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ต๐˜ฉ๐˜ฆ๐˜ง๐˜ต, ๐˜ฑ๐˜ฉ๐˜ช๐˜ด๐˜ฉ๐˜ช๐˜ฏ๐˜จ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฆ๐˜ณ๐˜ท๐˜ช๐˜ค๐˜ฆ ๐˜ข๐˜ค๐˜ค๐˜ฐ๐˜ถ๐˜ฏ๐˜ต ๐˜ฉ๐˜ช๐˜ซ๐˜ข๐˜ค๐˜ฌ๐˜ช๐˜ฏ๐˜จ, ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜ฃ๐˜ฆ ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ณ๐˜ฆ๐˜ฅ. ๐˜‹๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜จ๐˜ช๐˜ฆ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ช๐˜ต๐˜ช๐˜จ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜ฃ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฉ๐˜ฆ๐˜ญ๐˜ฑ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ฆ ๐˜Ž๐˜Š๐˜— ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ข๐˜จ๐˜ข๐˜ช๐˜ฏ๐˜ด๐˜ต ๐˜ต๐˜ฉ๐˜ฆ๐˜ด๐˜ฆ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต๐˜ด."

About the trainers:
Chirag Savla is a cyber security professional with 10+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. For fun, he enjoys creating open-source tools and exploring new attack methodologies in his leisure. Chirag has worked extensively on Azure, Active Directory attacks and defense, and bypassing detection mechanisms. He is the author of multiple open source tools such as Process Injection, Callidus, and others. He has presented at many conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, Wild West Hackinโ€™ Fest, HackSpaceCon, VulnCon and NorthSec.

๐Ÿ”— Training details: https://nsec.io/training/2026-offensive-gcp-operations--tactics-certification-ogotc/

#NorthSec #cybersecurity #cloudsecurity #GCP #pentest

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (9/12): "Advanced Detection Engineering in the Enterprise" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Olaf Hartong & Rogier Boon (FalconForce)

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: On-Site

Description: "๐˜๐˜ข๐˜ญ๐˜ค๐˜ฐ๐˜ฏ๐˜๐˜ฐ๐˜ณ๐˜ค๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ฅ ๐˜ข ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ด๐˜ต ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด๐˜ฉ๐˜ฐ๐˜ฑ ๐˜ง๐˜ฐ๐˜ณ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ง๐˜ฆ๐˜ด๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ด ๐˜ต๐˜ฐ ๐˜ฉ๐˜ฆ๐˜ญ๐˜ฑ ๐˜ต๐˜ข๐˜ฌ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ค๐˜ข๐˜ฑ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฏ๐˜ฆ๐˜น๐˜ต ๐˜ญ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ. ๐˜ˆ๐˜ฏ ๐˜ถ๐˜ญ๐˜ต๐˜ช๐˜ฎ๐˜ข๐˜ต๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฐ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ถ๐˜ฏ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฐ ๐˜จ๐˜ฐ ๐˜ข๐˜ญ๐˜ญ-๐˜ช๐˜ฏ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ-๐˜ญ๐˜ช๐˜ง๐˜ฆ, ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ๐˜ด-๐˜ฐ๐˜ฏ ๐˜ญ๐˜ข๐˜ฃ ๐˜ฆ๐˜น๐˜ฆ๐˜ณ๐˜ค๐˜ช๐˜ด๐˜ฆ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ค๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ด ๐˜ข ๐˜ง๐˜ถ๐˜ญ๐˜ญ, ๐˜ณ๐˜ฆ๐˜ข๐˜ญ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ค ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ฆ๐˜ณ ๐˜ด๐˜ค๐˜ฆ๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฐ ๐˜ช๐˜ฏ ๐˜ข๐˜ฏ ๐˜ฆ๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ฑ๐˜ณ๐˜ช๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต: ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฆ๐˜ฏ๐˜ฅ๐˜ฑ๐˜ฐ๐˜ช๐˜ฏ๐˜ต, ๐˜ต๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ˆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜‹๐˜ช๐˜ณ๐˜ฆ๐˜ค๐˜ต๐˜ฐ๐˜ณ๐˜บ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ค๐˜ญ๐˜ฐ๐˜ถ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต.

๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ช๐˜ด ๐˜ญ๐˜ฆ๐˜ฅ ๐˜ฃ๐˜บ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ฐ๐˜ณ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ต๐˜ฆ๐˜ข๐˜ค๐˜ฉ ๐˜ด๐˜ต๐˜ถ๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ต๐˜ฐ:
๐˜œ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฐ ๐˜ณ๐˜ฆ๐˜ด๐˜ฆ๐˜ข๐˜ณ๐˜ค๐˜ฉ ๐˜ข๐˜ฏ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ฆ๐˜ณ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ ๐˜ถ๐˜ด๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ ๐˜ค๐˜ฐ๐˜ณ๐˜ฑ๐˜ฐ๐˜ณ๐˜ข๐˜ต๐˜ฆ ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด. ๐˜‰๐˜ถ๐˜ช๐˜ญ๐˜ฅ ๐˜ณ๐˜ฆ๐˜ด๐˜ช๐˜ญ๐˜ช๐˜ฆ๐˜ฏ๐˜ต ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ข๐˜ณ๐˜ฆ ๐˜ฉ๐˜ข๐˜ณ๐˜ฅ๐˜ฆ๐˜ณ ๐˜ต๐˜ฐ ๐˜ฆ๐˜ท๐˜ข๐˜ฅ๐˜ฆ ๐˜ฃ๐˜บ ๐˜ข๐˜ฏ ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ฆ๐˜ณ. ๐˜๐˜ข๐˜ญ๐˜ช๐˜ฅ๐˜ข๐˜ต๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ต๐˜ฐ ๐˜ฎ๐˜ข๐˜ฌ๐˜ฆ ๐˜ด๐˜ถ๐˜ณ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜บ ๐˜ฌ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ง๐˜ถ๐˜ฏ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ด ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ฅ. ๐˜›๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ง๐˜ฐ๐˜ค๐˜ถ๐˜ด๐˜ฆ๐˜ด ๐˜ฐ๐˜ฏ ๐˜”๐˜ช๐˜ค๐˜ณ๐˜ฐ๐˜ด๐˜ฐ๐˜ง๐˜ต ๐˜š๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ฏ๐˜ฆ๐˜ญ ๐˜ข๐˜ฏ๐˜ฅ ๐˜‹๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ ๐˜Ÿ๐˜‹๐˜™, ๐˜ฃ๐˜ถ๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ค๐˜ฆ๐˜ฑ๐˜ต๐˜ด ๐˜ค๐˜ข๐˜ฏ ๐˜ฃ๐˜ฆ ๐˜ข๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฐ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜ด๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ด ๐˜ข๐˜ด ๐˜ธ๐˜ฆ๐˜ญ๐˜ญ."

About the trainers:
Olaf Hartong has a vast experience in digital security, specialized in security operations, detection engineering and threat hunting. Olaf has extensive knowledge of different monitoring platforms, in particular the Microsoft Defender XDR and Sentinel stack. He presents on well-known security conferences, such as BlackHat, Defcon, WWHF, BRUcon, SOcon, NorthSec, Insomni'hack and MITRE ATT&CKcon. Olaf is the author of ThreatHunting for Splunk, ATTACK datamap, FalconHound, and Sysmon-modular tools.

Rogier Boon has over 20 years experience as both a security consultant and in-house technical specialist. Throughout his career, Rogier had roles as offensive specialist and blue teamer (TIER2/3 SOC, incident response, detection engineer). Rogier brings extensive experience working in various high-tech environments and researching a multitude of technologies. Rogier facilitated at Black Hat US and various private trainings sessions for in-house SOC teams.

๐Ÿ”— Save Your Spot: https://nsec.io/training/2026-advanced-detection-engineering-in-the-enterprise/

#NorthSec #cybersecurity #detectionengineering #infosec #blueeteam

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ Formations/Trainings (8/12): "Attacking & Securing CI/CD Pipeline Certification (ASCPC)" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Raunak Parmar & Robert (Bobby) Schwass (White Knight Labs)

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

Description: Master CI/CD security through practical offense and defense. Explore GitHub Actions context injection, CircleCI misconfigurations, AWS CodeBuild exploitation, Docker registry attacks, Kubernetes risks, and Azure DevOps abuse. Learn to identify and exploit real vulnerabilities while gaining hands-on defensive engineering techniques. Work directly with modern tools including GitHub Actions, CircleCI, Docker, Kubernetes, and AWS CodeBuild.

About the trainers:
Raunak Parmar and Bobby Schwass are DevSecOps specialists with extensive experience securing CI/CD pipelines and understanding the threat landscape across modern development infrastructure.

๐Ÿ”— Training details: https://nsec.io/training/2026-attacking--securing-cicd-pipeline-certification-ascpc/

#NorthSec #cybersecurity #devsecops #cicd #cloudsecurity

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜ต๐—ถ๐—ผ๐—ป๐˜ด/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด (7/12): "Offensive Development Practitioner Certification (ODPC)" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Munaf Shariff (White Knight Labs)

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

Description: "๐˜›๐˜ฉ๐˜ฆ ๐˜–๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜‹๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜—๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ฆ๐˜ณ ๐˜Š๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ง๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ (๐˜–๐˜‹๐˜—๐˜Š) ๐˜ช๐˜ด ๐˜ฅ๐˜ฆ๐˜ด๐˜ช๐˜จ๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ต๐˜ข๐˜ฌ๐˜ฆ ๐˜บ๐˜ฐ๐˜ถ ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ฐ๐˜ง ๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ณ๐˜ฏ ๐˜ฅ๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ฆ ๐˜ฆ๐˜ท๐˜ข๐˜ด๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ช๐˜ฏ๐˜จ, ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ๐˜ด-๐˜ฐ๐˜ฏ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ฆ ๐˜ข๐˜ต ๐˜ข๐˜ฏ ๐˜ข๐˜ฅ๐˜ท๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ฅ ๐˜ญ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ. ๐˜›๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ญ๐˜ช๐˜ท๐˜ฆ, ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ฐ๐˜ณ-๐˜ด๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ฆ๐˜ฅ ๐˜ญ๐˜ข๐˜ฃ๐˜ด, ๐˜บ๐˜ฐ๐˜ถโ€™๐˜ญ๐˜ญ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฐ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ค๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ-๐˜ธ๐˜ฐ๐˜ณ๐˜ญ๐˜ฅ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฎ๐˜ฆ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ช๐˜ด๐˜ฎ๐˜ด ๐˜ฃ๐˜บ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ช๐˜ฏ๐˜จ ๐˜ฅ๐˜ช๐˜ณ๐˜ฆ๐˜ค๐˜ต๐˜ญ๐˜บ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜›๐˜ฆ๐˜ณ๐˜ณ๐˜ข๐˜ง๐˜ฐ๐˜ณ๐˜ฎ-๐˜ฅ๐˜ฆ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด, ๐˜ฑ๐˜ฆ๐˜ณ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜—๐˜Œ ๐˜ง๐˜ช๐˜ญ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฏ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜น๐˜ฆ๐˜ค๐˜ถ๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ฅ๐˜ท๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ฅ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ค๐˜ฆ๐˜ด๐˜ด-๐˜ช๐˜ฏ๐˜ซ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜จ๐˜ช๐˜ฆ๐˜ด.

๐˜›๐˜ฉ๐˜ฆ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ฆ๐˜น๐˜ฑ๐˜ข๐˜ฏ๐˜ฅ๐˜ด ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ต-๐˜ญ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต, ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ช๐˜ฏ-๐˜ฅ๐˜ฆ๐˜ฑ๐˜ต๐˜ฉ ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜Š๐˜ฐ๐˜ฃ๐˜ข๐˜ญ๐˜ต ๐˜š๐˜ต๐˜ณ๐˜ช๐˜ฌ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ข๐˜ฏ๐˜ฅ-๐˜ข๐˜ฏ๐˜ฅ-๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ฐ๐˜ญ ๐˜ง๐˜ณ๐˜ข๐˜ฎ๐˜ฆ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด, ๐˜ด๐˜ข๐˜ฏ๐˜ฅ๐˜ฃ๐˜ฐ๐˜น ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฆ๐˜ท๐˜ข๐˜ด๐˜ช๐˜ฐ๐˜ฏ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฐ๐˜ฑ๐˜ฉ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ค๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜Œ๐˜‹๐˜™ ๐˜ฃ๐˜บ๐˜ฑ๐˜ข๐˜ด๐˜ด ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด. ๐˜ ๐˜ฐ๐˜ถโ€™๐˜ญ๐˜ญ ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ด๐˜ช๐˜จ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ ๐˜ค๐˜ถ๐˜ด๐˜ต๐˜ฐ๐˜ฎ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด, ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ณ๐˜ฆ๐˜ง๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜‹๐˜“๐˜“ ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ๐˜ด, ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ˆ๐˜”๐˜š๐˜ ๐˜ข๐˜ฏ๐˜ฅ ๐˜Œ๐˜›๐˜ž ๐˜ฃ๐˜บ๐˜ฑ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ณ๐˜ข๐˜ง๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ข๐˜ช๐˜ญ๐˜ฐ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜จ๐˜ณ๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ ๐˜ถ๐˜ฑ. ๐˜‰๐˜บ ๐˜ฃ๐˜ญ๐˜ฆ๐˜ฏ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ, ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ญ๐˜ข๐˜ฃ๐˜ด, ๐˜–๐˜‹๐˜—๐˜Š ๐˜จ๐˜ช๐˜ท๐˜ฆ๐˜ด ๐˜บ๐˜ฐ๐˜ถ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ญ๐˜ฆ๐˜ฅ๐˜จ๐˜ฆ, ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ต๐˜ฐ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅโ€”๐˜ข๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ถ๐˜ต๐˜ฎ๐˜ข๐˜ฏ๐˜ฆ๐˜ถ๐˜ท๐˜ฆ๐˜ณโ€”๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ณ๐˜ฏ ๐˜ฅ๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ฐ๐˜ญ๐˜ฐ๐˜จ๐˜ช๐˜ฆ๐˜ด."

About the trainer:
Munaf Shariff is an offensive development specialist with deep expertise in bypassing modern security mechanisms and building custom offensive tooling that operates effectively in real-world environments.

๐Ÿ”— Training details: https://nsec.io/training/2026-offensive-development-practitioner-certification-odpc/

#NorthSec #cybersecurity #offensivesecurity #malware #evasion

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜ต๐—ถ๐—ผ๐—ป๐˜ด/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜ด (6/12): "Reverse, Bypass, Exploit: Mobile Hacking Workshop" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† David Backer & Steven Smiley (Corellium)

๐Ÿ“… Date: May 11, 2026 (1 day)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: On-Site

Description: Master mobile app security techniques covering iOS and Android platforms. Learn real-time network traffic analysis, reverse engineering, SSL pinning bypass, and security control bypasses including biometrics and jailbreak detection. Manipulate runtime behavior with Frida and tackle real-world mobile security challenges. Perfect for penetration testers and security professionals. Bonus: One week Corellium Viper trial and mobile CTF access.

About the trainers:
David Backer is a systems engineer focused on mobile application security testing. He works across various of layers of the Corellium tech stack to help customers adopt the platform's many features. Before Corellium, he fabricated cutting edge microprocessors in high-volume factories as well as designed, modeled, and fabricated novel silicon research devices. David also has experience with distributed systems, cryptography, data visualization, and business management.

Steven Smiley is a Senior Product Manager at MAST Solutions with over a decade of experience in mobile penetration testing and mobile application security. He holds a degree in Computer Security and Investigations from Fleming College and maintains two SANS certifications in mobile security and forensics (GMOB, GASF). Prior to joining the Corellium team, Steven worked as an independent consultant, leading mobile security assessments and penetration testing engagements for a wide range of organizations.

๐Ÿ”— Training details: https://nsec.io/training/2026-reverse-bypass-exploit-mobile-hacking-workshop/

#NorthSec #cybersecurity #mobileappsecurity #penetrationtesting