Standoff 10
State F faces new challenges as cyberattacks get trickier. What will hackers manage to pull off this time? Tune in to find out.
ticker_message_1_text
ticker_message_2_text
ticker_message_3_text
ticker_message_4_text
ticker_message_1_text
ticker_message_2_text
ticker_message_3_text
ticker_message_4_text
ticker_message_1_text
ticker_message_2_text
ticker_message_3_text
ticker_message_4_text
Standoff 10 highlights
Cyberbattle
The best hackers and security specialists meet face-to-face for the 10th time to see who really runs the show in State F
Live studio
We keep an eye on the cyberbattle 24/7 and talk to Standoff participants and guests who shape the cybersecurity landscape
Standoff Talks
A meetup where offensive and defensive security specialists share their research experience first-hand
Investor Day
We discuss how hacker activity changes the way investors see IT and cybersecurity sectors
Business sessions
Representatives of large and medium-sized businesses join us to talk about the main drivers of the cybersecurity industry
Program
Cyberbattle progress
 
Attacker ranking
   Event points  Vulnerability pointsTotal
1
Triggered 4 non-tolerable events
3,6881,7755,463
2
Triggered 4 non-tolerable events
3,8121,5005,312
3
Triggered 5 non-tolerable events
4,57004,570
4
Triggered 2 non-tolerable events
1,3183501,668
5
Triggered 2 non-tolerable events
8286001,428
 
Defender results
  InvestigatedRecorded non-tolerable eventsRecorded incidentsFalsely recordedAverage investigation time
Defends MetalliKO iron and steel works
001900
Defends Electric power industry
11151 3 h 30 m
Defends Tube oil and gas company
11460 3 h 17 m
Defends Heavy Logistics transport company
78370 9 h 34 m
Defends Banking system
11270 1 h 23 m
Defends City Housing and Utilities
78540 4 h 43 m
News
November 15
Innostage to hold cyber drills for defenders
During the Standoff cyber battle, the Innostage GC team will deploy a virtual cyber range to help IT security specialists pump up their skills in terms of countering hacker attacks.
October 25
Bug bounty platforms: market study
Positive Technologies analyzed the largest and most active bug bounty platforms across the globe. The highest demand for services of bug bounty platforms was observed in the following sectors: IT (16%), online services (14%), services (13%), trade (11%), and finance (9%). This global trend largely correlates with the situation in the Russian market. Russian bug bounty programs are mostly used by private businesses serving a large number of customers. Some examples of such businesses are banks, online services, e-commerce players, and IT vendors. Public sector and critical infrastructure organizations could become the main driver of bug bounty initiatives.
October 11
Standoff cyberbattle to take place in Moscow
On November 22–24, 2022, white-hat hackers and infosec experts will convene once again at the Standoff open cyberbattle. For the tenth time, the infrastructure of the virtual State F will come under a barrage of hacker attacks, while infosec experts will uncover flaws in the infrastructure and figure out how hackers might break in. The event will be streamed live online at standoff365.com.
August 7
VK joins Standoff 365 Bug Bounty
VK has launched a bug bounty program on The Standoff 365 Bug Bounty, a platform developed by Positive Technologies for uncovering vulnerabilities. A bug bounty program offers rewards to outside researchers for discovering and reporting security flaws before attackers can find and exploit them.
Our media partners
anti-malware logo
security lab logo
information security logo
ciso club logo
xakep logo
bis journal logo
ict 2 go logo
singleton-security logo
mobile comm logo
ict-online logo
connect-wit logo
sovetnik logo
plus world logo
cyber ed logo
codeby logo
android guards logo