Welcome to AppSec Village

where red, blue and purple teamers, come together learn from the best of the best on how to exploit software vulnerabilities and how to secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.

Read More

DEF CON Talks

Sponsored Content

  • The malware dating guide: Understanding the types of malware on NPM

    The malware dating guide: Understanding the typ...

    You’ve heard of red flags in dating… but what about in your npm install? Our friends at Aikido Security just dropped the Malware Dating Guide. A brilliant (and hilarious) breakdown...

    The malware dating guide: Understanding the typ...

    You’ve heard of red flags in dating… but what about in your npm install? Our friends at Aikido Security just dropped the Malware Dating Guide. A brilliant (and hilarious) breakdown...

  • What’s Broken in Cybersecurity - and How Developer-First Security Can Fix It

    What’s Broken in Cybersecurity - and How Develo...

    What Does “Developer-First Security” Actually Look Like in Practice? This article cuts through the buzzwords to unpack what developer-first security really means—and why most current approaches fall short. It’s not...

    What’s Broken in Cybersecurity - and How Develo...

    What Does “Developer-First Security” Actually Look Like in Practice? This article cuts through the buzzwords to unpack what developer-first security really means—and why most current approaches fall short. It’s not...

  • Proven Strategies to Unlock Developer Adoption of AppSec

    Proven Strategies to Unlock Developer Adoption ...

    Strong developer buy-in is one of the most crucial ways AppSec managers can effectively fix vulnerabilities. But how can you get your dev teams to adopt a security minded approach?...

    Proven Strategies to Unlock Developer Adoption ...

    Strong developer buy-in is one of the most crucial ways AppSec managers can effectively fix vulnerabilities. But how can you get your dev teams to adopt a security minded approach?...

  • EU Cyber Resilience Act: A Practical Guide

    EU Cyber Resilience Act: A Practical Guide

    The EU Cyber Resilience Act introduces important new requirements for connected products and embedded software. It’s a meaningful shift—designed to raise the baseline for cybersecurity across the digital product lifecycle....

    EU Cyber Resilience Act: A Practical Guide

    The EU Cyber Resilience Act introduces important new requirements for connected products and embedded software. It’s a meaningful shift—designed to raise the baseline for cybersecurity across the digital product lifecycle....

  • The best way to secure your software supply chain? It depends.

    The best way to secure your software supply cha...

    Ever feel like dependency management is just chaos with extra steps? You patch one thing, something else breaks.You upgrade a package, the build fails.You triage a vuln, then find out...

    The best way to secure your software supply cha...

    Ever feel like dependency management is just chaos with extra steps? You patch one thing, something else breaks.You upgrade a package, the build fails.You triage a vuln, then find out...

  • The Rise of AI‑Native SAST

    The Rise of AI‑Native SAST

    Central Air > Window Units — and AI-Native > Retrofitted SAST You can survive a hot summer with a window unit... But wouldn't you rather have central air? Same goes...

    The Rise of AI‑Native SAST

    Central Air > Window Units — and AI-Native > Retrofitted SAST You can survive a hot summer with a window unit... But wouldn't you rather have central air? Same goes...

  • Insights on AI Powered Code Security

    Insights on AI Powered Code Security

    How Accurate Is AI at Fixing IaC Security Flaws? This article puts leading AI models to the test, benchmarking their ability to remediate real-world infrastructure-as-code vulnerabilities. The results are eye-opening:...

    Insights on AI Powered Code Security

    How Accurate Is AI at Fixing IaC Security Flaws? This article puts leading AI models to the test, benchmarking their ability to remediate real-world infrastructure-as-code vulnerabilities. The results are eye-opening:...

  • Navigating Security for Connected Devices

    Navigating Security for Connected Devices

    🔐 New eBook: Navigating Security for Connected Devices Connected devices are transforming how industries operate—improving efficiency, enhancing care, and enabling smarter systems. But this connectivity also introduces a new set...

    Navigating Security for Connected Devices

    🔐 New eBook: Navigating Security for Connected Devices Connected devices are transforming how industries operate—improving efficiency, enhancing care, and enabling smarter systems. But this connectivity also introduces a new set...

  • The DevSecOps Evolution 2025

    The DevSecOps Evolution 2025

    Can you smell revolution in the air? Or maybe evolution ? DevSecOps is a decade old concept, but it’s finally being implemented by DevOps leaders. How do we know this?...

    The DevSecOps Evolution 2025

    Can you smell revolution in the air? Or maybe evolution ? DevSecOps is a decade old concept, but it’s finally being implemented by DevOps leaders. How do we know this?...

Our Sponsors