

Welcome to AppSec Village
where red, blue and purple teamers, come together learn from the best of the best on how to exploit software vulnerabilities and how to secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.
Best Sellers
-
AppSec Village @ DEF CON 33 Women's Graphic Tee
Regular price $30.00 USDRegular priceUnit price / per -
AppSec Village @ DEF CON 33 Graphic tee
Regular price $30.00 USDRegular priceUnit price / per -
AppSec Village Black Mug - Perfect for Developers, Programmers, Cybersecurity Enthusiasts, Birthday, Gift, Office Coffee [...]
Regular price $12.00 USDRegular priceUnit price / per -
AppSec Village Hoodie | Unisex Heavy Blend Sweatshirt, Casual Wear, Tech Lover Gift, Geek Culture Hoodie, Festive Attire
Regular price From $45.73 USDRegular priceUnit price / per -
AppSec Village Zip Hoodie - Unisex Heavy Blend™ Sweatshirt for Tech Lovers, Perfect for Conferences, Casual Wear, Gift for [...]
Regular price From $53.14 USDRegular priceUnit price / per -
AppSec Village Organic Cotton Tote Bag, Environmentally Friendly, Festival Essential, Giveaway, Shopping Bag, Gift for AppSec [...]
Regular price $24.00 USDRegular priceUnit price / per -
AppSec Village Tote Bag | Eco-Friendly Shopping Bag, Perfect for Gifts, Festivals, Beach Days, and More
Regular price $24.00 USDRegular priceUnit price / per -
AppSec Village @ DEF CON 28 Graphic tee
Regular price $30.00 USDRegular priceUnit price / per
Collections
DEF CON Talks
Sponsored Content
-
The malware dating guide: Understanding the typ...
You’ve heard of red flags in dating… but what about in your npm install? Our friends at Aikido Security just dropped the Malware Dating Guide. A brilliant (and hilarious) breakdown...
The malware dating guide: Understanding the typ...
You’ve heard of red flags in dating… but what about in your npm install? Our friends at Aikido Security just dropped the Malware Dating Guide. A brilliant (and hilarious) breakdown...
-
What’s Broken in Cybersecurity - and How Develo...
What Does “Developer-First Security” Actually Look Like in Practice? This article cuts through the buzzwords to unpack what developer-first security really means—and why most current approaches fall short. It’s not...
What’s Broken in Cybersecurity - and How Develo...
What Does “Developer-First Security” Actually Look Like in Practice? This article cuts through the buzzwords to unpack what developer-first security really means—and why most current approaches fall short. It’s not...
-
Proven Strategies to Unlock Developer Adoption ...
Strong developer buy-in is one of the most crucial ways AppSec managers can effectively fix vulnerabilities. But how can you get your dev teams to adopt a security minded approach?...
Proven Strategies to Unlock Developer Adoption ...
Strong developer buy-in is one of the most crucial ways AppSec managers can effectively fix vulnerabilities. But how can you get your dev teams to adopt a security minded approach?...
-
EU Cyber Resilience Act: A Practical Guide
The EU Cyber Resilience Act introduces important new requirements for connected products and embedded software. It’s a meaningful shift—designed to raise the baseline for cybersecurity across the digital product lifecycle....
EU Cyber Resilience Act: A Practical Guide
The EU Cyber Resilience Act introduces important new requirements for connected products and embedded software. It’s a meaningful shift—designed to raise the baseline for cybersecurity across the digital product lifecycle....
-
The best way to secure your software supply cha...
Ever feel like dependency management is just chaos with extra steps? You patch one thing, something else breaks.You upgrade a package, the build fails.You triage a vuln, then find out...
The best way to secure your software supply cha...
Ever feel like dependency management is just chaos with extra steps? You patch one thing, something else breaks.You upgrade a package, the build fails.You triage a vuln, then find out...
-
The Rise of AI‑Native SAST
Central Air > Window Units — and AI-Native > Retrofitted SAST You can survive a hot summer with a window unit... But wouldn't you rather have central air? Same goes...
The Rise of AI‑Native SAST
Central Air > Window Units — and AI-Native > Retrofitted SAST You can survive a hot summer with a window unit... But wouldn't you rather have central air? Same goes...
-
Insights on AI Powered Code Security
How Accurate Is AI at Fixing IaC Security Flaws? This article puts leading AI models to the test, benchmarking their ability to remediate real-world infrastructure-as-code vulnerabilities. The results are eye-opening:...
Insights on AI Powered Code Security
How Accurate Is AI at Fixing IaC Security Flaws? This article puts leading AI models to the test, benchmarking their ability to remediate real-world infrastructure-as-code vulnerabilities. The results are eye-opening:...
-
Navigating Security for Connected Devices
🔐 New eBook: Navigating Security for Connected Devices Connected devices are transforming how industries operate—improving efficiency, enhancing care, and enabling smarter systems. But this connectivity also introduces a new set...
Navigating Security for Connected Devices
🔐 New eBook: Navigating Security for Connected Devices Connected devices are transforming how industries operate—improving efficiency, enhancing care, and enabling smarter systems. But this connectivity also introduces a new set...
-
The DevSecOps Evolution 2025
Can you smell revolution in the air? Or maybe evolution ? DevSecOps is a decade old concept, but it’s finally being implemented by DevOps leaders. How do we know this?...
The DevSecOps Evolution 2025
Can you smell revolution in the air? Or maybe evolution ? DevSecOps is a decade old concept, but it’s finally being implemented by DevOps leaders. How do we know this?...