Events Gallery
Relive the moments from our past cybersecurity events and community gatherings
INSA Cyber security month CTF
The Cybersecurity Month CTF was organized in collaboration with INSA across two regions of the country, Addis Ababa and Jimma, aimed at raising awareness and reaching more people during Cybersecurity Month.



Puagme CTF 2
Puagme CTF is an annual CTF event held during the 13th month of every year.


Cybershiled Showdown 2
This year, CyberShield was a four-day event, starting with two days of online introductory sessions on blue and red teaming, followed by a full day of a red teaming CTF challenge and another full day dedicated to a blue teaming challenge.






The 3rd International Conference on Collaboration in Cybersecurity and Digital Transformation 2025
An advanced training session covering professional penetration testing methodologies, live demonstrations of attack techniques, and certification guidance for aspiring pentesters.



University CTF 2025
University CTF is an annual online competition, designed to allow students from every corner of the country to participate and test their hacking skills.


Become a Professional Tech Product Developer
A career-focused session on turning product development skills into professional opportunities. The event covered product thinking, portfolio building, teamwork and delivery practices, and actionable steps for learners to transition from training projects to real-world product development roles.
Puagme CTF 1
Puagme CTF is an annual CTF event held during the 13th month of every year.






Cybersecurity Bootcamp
A multi-session bootcamp designed to build solid fundamentals across core cybersecurity domains. Topics included networking basics, Linux essentials, web security, incident response concepts, and hands-on labs to help participants move from theory to practice.
Demo a Threat 2
Building on our first session, Demo a Threat 2 delved deeper into advanced persistent threats (APTs) and zero-day exploits. Participants engaged in red team vs. blue team exercises, learning both offensive techniques and defensive strategies from industry experts.






Demo a Threat 1
Our first Demo a Threat session featured live demonstrations of real-world attack techniques, including social engineering, phishing simulations, and network intrusion methods. Attendees gained hands-on experience in identifying and mitigating these threats in a controlled environment.






Cybershiled Showdown 1
CyberShield Showdown was a two-day CTF event, featuring a Jeopardy-style CTF on the first day. On the second day, participants were given a full company network, starting from low-privilege access and escalating to Active Directory domain administrator.





Android Application Hacking
A practical session on Android app security where we walked through the mobile testing process: recon, static analysis, dynamic analysis, and common vulnerability classes (insecure storage, weak authentication, and misconfigured networking). Participants learned tooling fundamentals and safe lab practices.
TTS (Tech Trade Show 2023)
At the tech trade show, we hosted a series of webinars alongside a two-day CTF competition, featuring king-of-the-hill–style challenges where participants took on both attacker and defender roles.




Hack Fest
The second CTF, held in collaboration with GDG Addis, bringing together passionate participants and hosted at the Science Museum for an engaging, hands-on cybersecurity experience.






ChwataCTF
Our first-ever physical CTF, hosted in collaboration with Chewata Con.


Bug Bounty for Security Professionals
A beginner-friendly webinar introducing bug bounty programs and responsible disclosure. We discussed how to choose platforms, set up a safe testing workflow, write high-quality reports, and build a sustainable learning roadmap for security professionals.
Cybersecurity: A Luxury or a Must?
An interactive community talk exploring why cybersecurity is essential for individuals and organizations—not an optional expense. The session covered common local threat scenarios, the real cost of breaches, and practical first steps for improving security posture with limited resources.



