Advertisement · 728 × 90
#
Hashtag
#cyberwarcon
Advertisement · 728 × 90
Post image

Some great moments from CYBERWARCON 2025!

Insightful talks, real conversations, and a community that keeps pushing the work forward.

Grateful for our speakers, sponsors, volunteers, and attendees who made it all happen!

Make sure to stay connected with us for updates on #CYBERWARCON!

8 2 0 0

@vertexproject.bsky.social and #Synapse would not be possible without our amazing community of customers, fans, and friends. Thanks to everyone who supported us at #CYBERWARCON, and who continue to support us throughout the year!

2 0 0 0

Had a fantastic time seeing new faces and catching up with old friends at #CYBERWARCON this week! Thanks to everyone who said hello, stopped by the @vertexproject.bsky.social booth, or participated in our #Synapse challenge. And thanks to @hultquist.bsky.social for a fantastic event!

3 1 0 0
Post image

#Graphika team members had an amazing experience connecting with everyone and presenting their talks this week on AI-powered influence operations and Pro-Iran narratives at @cyberwarcon.bsky.social.

We're already looking forward to next year!
#cyberwarcon #cybersecurity #cyberthreatintelligence

10 9 0 0
A slide at CYBERWARCON from Emerson T. Brooking with images of article headlines that point to enshittification and predictions on how AI is the next frontier of enshittification.

A slide at CYBERWARCON from Emerson T. Brooking with images of article headlines that point to enshittification and predictions on how AI is the next frontier of enshittification.

Emerson T. Brooking of the Atlantic Council predicts that genAI is the next frontier of enshittification which will attract state threat actors in particular. AI optimization will supplant search engine optimization, he says.

Oh joy more powerful enshittification ahead. #cyberwarcon

15 5 0 1
Preview
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare | Amazon Web Services The new threat landscape The line between cyber warfare and traditional kinetic operations is rapidly blurring. Recent investigations by Amazon threat intelligence teams have uncovered a new trend tha...

On the heels of @dlshad.net and @davidmagnotti.bsky.social’s presentation at #CYBERWARCON, happy to share the associated AWS Security blog post (with IOCs) aws.amazon.com/blogs/securi...

14 5 1 1
Preview
Typhoon by Consent: Quiet, Durable, Everywhere One “Allow” → tenant-wide weather event. 🌀 AI agent phish wraps the consent flow, device-code keeps churning, and Typhoon rides “good” U.S. infra. Kill list: user consent, device-code, or EWS app perm...

How are "Typhoons" likely to evolve in 2026?

blog.alphahunt.io/typhoon-by-c...

#CYBERWARCON #AlphaHunt

0 0 0 0
Slide photo of linguistic discrepancies showing sign of document forgery by a Russian language speaker

Slide photo of linguistic discrepancies showing sign of document forgery by a Russian language speaker

@activemeasures.bsky.social (which is a real llc!) and I assume @wylienewmark.bsky.social with a jaw dropping presentation. Best analysis of SVR vs GRU and history of the forgeries in 2016 leaks I’ve ever heard. #cyberwarcon

20 4 2 0
Post image

Hope to see many of you at #CYBERWARCON tomorrow! As always, if you see me in the AWS shirt, don’t be afraid to say hi, and please don’t be offended if I forget your name (it’s not you, it’s me). 😅

6 0 3 0

If you're at #CYBERWARCON be sure to find me and the other @vertexproject.bsky.social folks and say hi!

5 0 0 0
Post image

A huge thank you to @censys.bsky.social for being our lunch sponsor this year at #CYBERWARCON!

Their support helps fuel the conversations, connections, and collaboration that make this community strong.

Chew. Chat. Chill.

4 0 0 0

Also check out @dlshad.net and @davidmagnotti.bsky.social presenting on more of our work at #CYBERWARCON this week!

3 0 0 0
Post image

CFP closes this Friday, September 26th at 11:59pm EST!

If you'd like to speak at CYBERWARCON this year, get your talk submission in ASAP to be considered!

Submit your talk here >> www.cyberwarcon.com/cfp2025

#CYBERWARCON #CFP

14 9 0 1
Video

CFP closes in 1 WEEK!

Submit yours before its too late: www.cyberwarcon.com/cfp2025

#CYBERWARCON #CFP

2 3 0 0
Post image

Got knowledge on cyberattacks that would make a great talk at CYBERWARCON?

We want to hear about it. Submit your talk proposal TODAY!

CYBERWARCON's CFP closes at 11:59 PM (ET) on Friday, September 26th, 2025.

www.cyberwarcon.com

#CYBERWARCON #CFP #threatintel #cybersecurityevents

1 1 0 0
Video

No need to panic. There's still plenty of time to get those submissions in. CFP closes on the 26th.

....marketing, you might want to panic. Sponsorship opportunities are almost gone.

For more information, visit www.cyberwarcon.com

#CYBERWARCON #CFP

0 0 0 0

Yo! #CYBERWARCON CFP & Reg is LIVE! You know what to do. AI can't do it for you...or wear these socks.

@hultquist.bsky.social @cyberwarcon.bsky.social

1 3 0 0
Preview
CYBERWARCON

CYBERWARCON is coming!!! Registration and CFP are now open for this year's #CYBERWARCON! This year's keynote speaker will be @dmitri.silverado.org!!
We are back in Arlington, VA this year on November 19th.

www.cyberwarcon.com

29 22 1 9
Post image

it's that time!!! @cyberwarcon.bsky.social tickets are on sale!!
Get one before they sell out!!

www.cyberwarcon.com/registration

#CYBERWARCON #sockarmy

4 2 0 0
Preview
Lookout Discovers Massistant Chinese Mobile Forensic Tooling | Threat Intel Massistant is a mobile forensics application used by law enforcement in China to collect extensive information from mobile devices.

@kristinabalaam.bsky.social authored an in-depth analysis on Massistant, a Chinese forensic tool tied to Meiya Pico and used by law enforcement to extract sensitive device data.

At #CYBERWARCON 2022, she also presented on MOONSHINE + BadBazaar and their role in mass Uyghur surveillance.

4 1 1 0
Video

At CYBERWARCON 2024, Zak Butler presented findings on how RT has evolved its tactics to continue spreading its narratives. Watch the full talk to see Zak Butler’s deeper investigation into these covert influence operations.

Watch here >> www.youtube.com/watch?v=ZPmL...

#cybersecurity #CYBERWARCON

3 1 0 0
Post image

Did you know there are over 50 #CYBERWARCON talks public on our YouTube, ready for you to watch RIGHT NOW?

Learn something new, or rewatch one of your favorites.

Check them out here: www.youtube.com/@cyberwarcon

Let us know what some of your favorite talks are below!

4 0 0 0
Video

At CYBERWARCON 2024, Matthieu Faou exposed Operation Texonto, a Russia-aligned information operation.

Watch his full talk here >> www.youtube.com/watch?v=X5lL...

Read the research here >> www.welivesecurity.com/en/eset-rese...

#CYBERWARCON #ThreatIntel #InformationOperations #Disinformation

3 3 0 0
Post image

Make sure you stay connected with us so that you don't miss any announcements or updates!

Website: www.cyberwarcon.com
YouTube: youtube.com/@cyberwarcon...
Twitter: x.com/CYBERWARCON
Linkedin: www.linkedin.com/company/cybe...

#CYBERWARCON #cybersecurity

2 1 1 0
Preview
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war ESET Research discovers Operation Texonto, a disinformation/psychological operations (PSYOPs) campaign that uses spam emails to demoralize Ukrainian citizens with disinformation messages about war-rel...

ESET’s Matthieu Faou exposed “Operation Texonto”, a pro-Russian disinformation operation aimed at Ukrainian speakers. He shared the full breakdown at #CYBERWARCON.

Watch his talk >> www.youtube.com/watch?v=X5lL...

Read the research >> www.welivesecurity.com/en/eset-rese...

#IO #Cybersecurity

7 8 0 0
Video

Morgan Adamski makes it clear: PRC cyber actors are not invincible, and USCYBERCOM is proving it.

See the CYBERWARCON 2024 keynote here: www.youtube.com/watch?v=gVSc...

#CYBERWARCON #USCYBERCOM #Cybersecurity

2 0 0 0
Video

What if your office got hacked because your neighbor did?

In this clip from #CYBERWARCON 2024, @stevenadair.bsky.social shares how APT28 pulled off "The Nearest Neighbor Attack", daisy-chaining Wi-Fi networks for covert access.

Watch the full talk here ⬇️
www.youtube.com/watch?v=Omrz...

1 1 0 0
Video

🎯 COLDRIVER doesn’t spam, they hunt.

Wesley Shields (Google TAG) breaks down this FSB-linked group’s aggressive, narrowly targeted phishing ops.

Watch the clip 👇
📍 From #CYBERWARCON 2024
🔗 Full talk: www.youtube.com/watch?v=gg5y...

#Cybersecurity #ThreatIntel #Phishing

4 0 0 0
Video

Hacktivist fronts exploded in 2023, with DDoS, leaks, and defacements targeting Israel.

Clip from Ari Ben Am’s #CYBERWARCON talk.

Full vid here: www.youtube.com/watch?v=jQKE...

#ThreatIntel #CyberWarfare #Cybersecurity #IO

2 0 0 0
Post image

Just a reminder that the CYBERWARCON 2024 talks are live on YouTube if you’re in the mood for some top-tier cyberthreat content 👀

🔗 www.youtube.com/@cyberwarcon

#CYBERWARCON #Cybersecurity #ThreatIntel

10 9 1 0