Join Sarah Hume from Security Risk Advisors (SRA) at Adversary Village for a hands-on interactive session on purple teaming at RSAC 2026.

𝗜𝗻𝘁𝗲𝗿𝗮𝗰𝘁𝗶𝘃𝗲 𝗦𝗲𝘀𝘀𝗶𝗼𝗻: Running Point - How to Execute and Track Purple Team Exercises

📅 Adversary Village, Room 204, Moscone South | March 24th, 1:30 - 2:30 PM | March 25th, 11:30 AM - 12:30 PM
📅 Connection Hub, Moscone West | March 25th, 09:30 - 10:30 AM

Get hands-on with real-world purple teaming, detection validation, and building a purple team workflow that actually holds up in production.
Seats are limited, and do not worry about bringing a laptop, we got you covered.

More info on Adversary Village at RSAC 2026: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/

Checkout the full village schedule for more cool hands-on activities: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/schedule

#RSAC2026 #PowerOfCommunity #RSAC #AdversaryVillage #PurpleTeam #AdversarySimulation #CyberSecurity #InfoSec #SanFrancisco @onersac_community

Lab4PurpleSec Purple Team homelab

Open-source lab simulates enterprise networks with AD, IDS, SIEM and vulnerable apps to practice attacks, pivoting and detection.

https://github.com/0xMR007/Lab4PurpleSec

#PurpleTeam #Homelab

GitHub - 0xMR007/Lab4PurpleSec: Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSense + Suricata, and a Wazuh SIEM. It provides a realistic, open-source training environment for web exploitation, pivoting, Active Directory attacks, and Blue Team detection.

Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSense + Suricata, and a Wazuh SIEM. It provides a realistic, ope...

GitHub

Adversary Village is proud to have Security Risk Advisors (SRA) as a Gold Sponsor for our presence at RSAC 2026.

SRA is the team behind VECTR, the go-to platform for purple team reporting, collaboration, and tracking adversary emulation results. If you have run a purple team exercise, chances are you have crossed paths with VECTR.
Their support helps make our hands-on activities, panels, and community-driven initiatives possible at one of the biggest stages in cyber security.

📍 Adversary Village at #RSAC 2026 Conference | Moscone South, San Francisco 📅 March 24-26, 2026

Come find us at RSAC 2026, we are running our Adversary Simulator, breach and adversary emulation exercises, hands-on activities, and interactive sessions.
🔗 More about SRA: https://sra.io/
🔗 Learn more about Adversary Village at RSAC 2026: https://adversaryvillage.org/adversary-events/RSA-Conference-2026/

Thank you, SRA, for backing the community and continuing to build tools that make purple teaming accessible to everyone.

#RSAC2026 #PowerOfCommunity #RSAC #OffensiveCyberSecurity #VECTR #AdversaryVillage #GoldSponsor #SRA #VECTR #CyberSecurity #PurpleTeam #RedTeam #AdversarySimulation #AdversaryEmulation #InfoSec #SanFrancisco

Adversary Village is back at RSAC 2026, and we are discussing the biggest shift in AI offensive tradecraft.
𝗣𝗮𝗻𝗲𝗹 title: AI and the New Offensive Playbook of State-Sponsored Cyber Threat Actors [VLG-W02]
📍 RSAC 2026 Conference | Moscone Center, San Francisco
📅 Wednesday, March 25, 2026 | 9:40 AM - 10:30 AM PDT
🎟️ Reserve your seat here: https://lnkd.in/gSFvMykb

Our panelists:
Abhijith B R, Founder and Lead of Adversary Village
Seeyew Mo, Director of Training at @defcon, Cyber Mary Land
Adam Pennington, ATT&CK Lead at MITRE Corporation
Paul McCarty, Head of Security Research at OpenSourceMalware

State-sponsored threat actors are no longer just experimenting with AI, they are operationalizing it. Nation-state adversaries are rewriting the offensive playbook with generative AI at its core.

🔗 View the full session and reserve your seat: https://lnkd.in/gSFvMykb

Adversary Village will also be running hands-on activities throughout RSAC 2026, including our Adversary Simulator, breach and adversary emulation exercises, and more.
We look forward to seeing you there: https://lnkd.in/gVa4E8bq

#RSAC2026 #PowerOfCommunity #RSAC #AdversaryVillage #AI #CyberSecurity #StateSponsoredThreats #ThreatIntelligence #RedTeam #PurpleTeam #AdversarySimulation #InfoSec #AdversarySimulation #SanFrancisco

Watching one of our best red teamers battle with his own soul cause I'm asking him to focus on artefact creation rather than defense evasion or trade craft.

Like, what kinds of things inhibit these techniques, let's see which ones the customer has in play and how well they are integrated with the SOC.

#purpleteam

Gemeinsam Computerdinge lernen? Rätsel kreativ lösen? Komm in #Wien zur ersten #FLINTA*-Edition vom C3WTF!

What (the F)?
Chaos Computer Club Wien (=C3W) + Capture the Flag (=CTF = Rätsel lösen) = C3WTF

Gemeinsam lösen wir kreative in kleinen Gruppen techniknahe Rätsel. Das sind Challenges aus unterschiedlichen Bereichen:

Sicherheitslücken auf Websiten finden (ethisches Hacken)?
Spielerisch in der Kommandozeile arbeiten und dazulernen?
Investigative Nachforschungen anhand von frei zugänglichen Quellen (OSINT)?
Schauen was im Netzwerk herumgeschickt wird? Wo da vielleicht wer unerlaubt sich eingeschleust hat?
Oder andere Rätsel auf die du sonst noch Lust hast? Klar, probieren wir es gemeinsam aus!

Wann?
Sa, 14. März ab 15 Uhr - FLINTA*-Edition
Sa, 11. April ab 15 Uhr - FLINTA*-Edition
Fr, 8. Mai ab 16 Uhr - open for all genders
Wo?
Favoritenstraße 11 / Ecke Taubstummengasse, 1040 Wien OpenStreetMap
Erdgeschoss, FAV Hörsaal 3 Zemanek, (barrierearmer Raum und WC)

Was bringst du mit?
Lust zu lernen, Dinge auszuprobieren und Spaß daran, kreative um die Ecke zu denken.
Eigener Laptop ist super. Wir haben vermutlich auch Laptops zum Ausborgen. Auch sonst finden wir eine Gruppe, wo du zuschauen, gemeinsam Challenges lösen und mitdiskutieren kannst. :)

Beginner-friendly: Es gibt immer auch Rätsel und Aufgaben für Anfänger*innen.
Für einzelne Challenges, wo es bestimmte Tools braucht, helfen wir uns gegenseitig beim Einrichten der Umgebung. Für manche Challenges ist es hilfreich, eine virtuelle Maschine und/oder die Software Docker am Laufen zu haben, aber es gibt auch genug Auswahl, wo das nicht der Fall ist!

Auch Leute, die sich schon gut auskennen und Erfahrung mit Cybersecurity-Challenges haben, sind herzlich willkommen! Let's connect and learn from each other!

Es wird Snacks geben. Kostenlos, keine Anmeldung nötig – komm einfach vorbei! Bring gerne friends mit und leite diese Einladung weiter, danke. :)

https://metalab.at/wiki/Haecksen#C3WTF

Einladung zum C3WTF. Gerne kommen und/ oder weiterleiten. (:

Zusätzliche Termine
PS: Zusätzliche Termine für all genders gibt es auch im https://metalab.at/ (Rathausstraße 6, 1010 Wien)

Sa, 21. Februar ab 14 Uhr - open for all genders @ metalab
Sa, 21. März ab 14 Uhr - open for all genders @ metalab
Sa, 18. April ab 14 Uhr - open for all genders @ metalab

#wien #vienna #ethicalhacking #ctf #capturetheflag #feminist #finta #women #trans #nonbinary #intersex #meetup #learning #laptop #blueteam #redteam #purpleteam #security #itsecurity #webapps #OSINT #german #Austria #workshop #handson #linux #opensource #tools #haecksen

Haecksen – Metalab Wiki

Made my first stego .wav for a blurple thing. Now to incorporate SoundCloud, DNS and Crimeflare.

And unlike Red teamers TPers, I have to clean up my own mess.

#purpleTeam #blueTeam

📢 New article about GAC Hijacking to perform Code Execution and Persistence
📖 1x Playbook - A structured breakdown of the full approach
💡 3x Detection Opportunities
🏹 2x Threat Hunting Queries - Defender & Splunk

https://ipurple.team/2026/02/10/gac-hijacking/ #purpleteam

GAC Hijacking

The Global Assembly Cache is a system-wide repository in the .NET framework that stores strong named (name + version + culture + public key token identity) assemblies so multiple applications can u…

Purple Team
AppLocker Rules Abuse

AppLocker was introduced by Microsoft in Windows 7 to enable organizations to define which executables, scripts or installers are allowed to run in their environments. AppLocker can reduce the atta…

Purple Team

Just sat the CREST incident analyst cert for shits and giggles.

#purpleteam