We already know the exact date of the next Standoff Cyberbattle
Standoff 17
June 16-19 2026
Cyber Stress Testing
The only true way to measure your company's cyber resilience
Cyber Stress Testing stars
Bug Bounty
Uncover vulnerabilities before threat actors exploit them
Russia's largest bug hunting platform
Bug bounty programs reward ethical hackers for finding security flaws in organizations' apps, services, and other assets.

Head of Information Security at T-Bank
"To enhance the protection of our services, we engage the community of security researchers, just like the world's leading companies do."
Already on Standoff Bug Bounty
The biggest bounties
All programsUp to ₽10M
Up to ₽1M
Up to ₽1M
Up to ₽1M
Up to ₽1M
Up to ₽1M
Up to ₽1M
Up to ₽500K
Up to ₽500K
CYBERBATTLE
The most immersive experience for red and blue teams from around the world
An international competition designed to test and enhance offensive and defensive cybersecurity skills on a highly realistic infrastructure
The only cyberbattle with a decade-long legacy
Bringing together cybersecurity professionals from across the globe
Hyper-realistic environment
300+ technological and business processes, featuring controllers and SCADA systems
Attack impact demonstration
Watch cyberattacks play out on a physical 3D model and in the virtual space
Investigate live attacks to boost your expertise
Go head-to-head with top white hat hackers on Europe's largest infrastructure
Dive into the history of the world's largest cyberbattle
Now offering even more ways to participate

White hat hackers
Break into replicas of real-life systems and fight for the winner's trophy.

Mature SOC teams
Sharpen your defensive skills against live attacks.

Software vendors
Get honest, in-depth feedback from your potential users.

Security tool vendors
Introduce your products to practicing security specialists.

Digital twin simulations
Test your infrastructure's security without risk.
Hackbase
Hands-on practice for security researchers on replicas of real-world systems
The cyberrange where white hat hackers can sharpen their security assessment and vulnerability discovery skills 24/7
Level up your skills on true-to-life infrastructure, featuring SCADA systems, PLCs, and business processes found in real-world companies.
Learn more about Standoff HackbaseDEFEND
Enhance your business's cyber resilience with advanced SOC team training
The cyberrange provides a safe environment to strengthen security teams and prepare them to counter APT attacks.
Making mistakes during real incidents is expensive. Mistakes on the cyberrange safely teach you how to avoid them when it matters.
Learn more about Standoff Defendreal-world APT attacks
Attack simulations replicate the tactics and techniques of real APT groups.
practical cases
Explore notable attacks carried out by white hat hackers during Standoff cyberbattles.

Workshops with top experts
Experienced mentors guide you through complex attack scenarios and help you find effective solutions.

Realistic infrastructure
Investigate attacks using digital twins of IT environments equipped with the latest software and security tools.

Knowledge base
Deepen your expertise with extensive materials on incident investigation.

Managing Director for Information Security, DOM.RF
"We were looking for a tool that would allow us not just to study theory, but to train in conditions as close as possible to a real attack. Standoff Defend proved to be a convenient and well-thought-out solution: the scenarios are close to real incidents, and the online polygon format allows us to combine training with ongoing tasks"
CYBERDRILLS
Test your cybersecurity readiness before adversaries do.
Standard
For teams with basic investigation skills
Assess your team's expertise level and draw initial conclusions without unnecessary complications.
Ready-made scenarios based on Standoff Cyberbattle attacks
Typical IT infrastructure
Advanced
For experienced teams
Get in-depth team diagnostics and learn to navigate complex scenarios.
Complex attack chains modeled on real APT group tactics
Industry-specific infrastructure closely aligned with your operational environment
Setting the bar since 2016
None of this would be possible without our incredible community:
professional pentesters, SOC specialists, bug hunters, and many others







