
Hack, Learn, and Level Up Your IoT Security Skills
Save $100 on an Expo Plus Pass with code 36USBIOTXPD! Sign up here!
Matter IoT manufacturing: engineer your CTF challenge
Bitdefender invites you to take control of your IoT cybersecurity education through our innovative open-source framework, designed to put you in charge of creating custom Matter IoT Capture The Flag challenges. Using fully emulated Matter devices – from smart bulbs to dishwashers – you’ll dive into a hands-on experience that goes beyond traditional puzzle-solving. Instead, you’ll craft the challenges themselves, gaining deep insights into attack vectors while mastering IoT exploitation techniques within a safe, controlled learning environment.
Ready to transform from defender to digital architect? Step into your personal Matter IoT device laboratory where you’ll build innovative challenges, break through security barriers, and test robust IoT protection solutions!

UCx – QEMU: Emulating Your “Things”
Learn IoT hacking without the actual device! This brand new mini-workshop provides a quick intro to QEMU, a popular open source machine emulator and virtualizer. Cybersecurity researchers often use emulation for product testing even without the physical hardware. It’s also helpful for making it easier to use common tools and methods like fuzzing and debugging. In this Free Extended Upskill Challenge (UCx), Andrew Bellini teaches emulating a “thing” and exploiting a vulnerability in it.
UCx – Encryption! What Encryption?
Learn to quickly decrypt supposedly secure IoT communications! In this Free Extended Upskill Challenge (UCx), Matt Ehrnschwender, the author of both mini-workshops from last year, is back with a brand new, hands-on lab. Students will set up the infrastructure to intercept network traffic from a simulated OpenWRT device and use the mitmproxy tool suite to decrypt TLS encrypted traffic originating from the device.

Your Wallet Meets the Standard. Does It Withstand Adversaries
Join this fast-paced preview of Johan Sellström’s two-hour RSA Learning Lab and explore how to engineer privacy beyond compliance. We’ll break down unlinkable selective disclosure, OHTTP, revocation without correlation, and defensive architecture patterns that resist metadata leakage and excessive data requests. Built for engineers who design systems to survive real-world threat models.
