HACKING VILLAGE
Welcome and Introduction


Infohound Demo

GenAI: Transforming Cybersecurity in 2024 and Beyond

News from the Front Lines

Hunting like a Falcon: Cyber-dive into the Realm of Digital Threats

Strategy in the Shadows: Conflicts, Geopolitics, and Cyber Threats

AI Game Changer for SOC Operations


Enter the Digital Frontier: Educating and Empowering Cyber Guardians




Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance issues

HUGS´n´BEERS: BSides Barcelona Community Chat



Transforming DevSecOps: Empowering SMEs and Startups with Lazarus



Learning Path through Malicious PDF

Enhancing Cyber Defense through AI: Addressing Scalability Detection and Response

Elevating Incident Response: Unleashing Advanced Analytics for the Next Generation


AI for cybercrime and for protection

Infohound Demo

Welcome and Introduction of Day 2


CaixaBankTech Capture The Flag Challenge: Unleash Your Hacking Skills!

Inside the Shadows: Decrypting the Data Black Market & Crafting Strategic Defenses

Threat Detection in Xot environments with MDR

Navigating the Post-Quantum Cryptography Frontier: Assessing Risks and Readiness Strategies for Today


Incident First Golden Hour – Elite SOC Performance on the razor’s edge


Unveiling the Shadow: Advanced Evasion Techniques in APT Operations

Lessons Learned from Incident Response


OSINT investigations with Maltego


Disrupting attacks while fighting the cybersecurity poverty line


Solving the mystery: Applying intelligence to anticipate threats

Unplugging PlugX : Sinkholing the PlugX USB worm botnet
