{"id":2343,"date":"2026-05-04T23:36:15","date_gmt":"2026-05-05T02:36:15","guid":{"rendered":"https:\/\/securitybsides.com.br\/2026\/?page_id=2343"},"modified":"2026-05-04T23:36:15","modified_gmt":"2026-05-05T02:36:15","slug":"todas-as-villages","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2026\/todas-as-villages\/","title":{"rendered":"Todas as Villages"},"content":{"rendered":"\n<p>Selecione abaixo, qual Village deseja ver as atividades.<\/p>\n\n\n\n<table id=\"tablepress-41\" class=\"tablepress tablepress-id-41\">\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-1\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/aerospace-community\/\">Aerospace Community<\/a><\/td><td class=\"column-2\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/apple-red-team-village-artv\/\">Apple Red Team Village (ARTV)<\/a><\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/appsec-village\/\">AppSec Village<\/a><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/biohacking-village\/\">Biohacking Village<\/a><\/td><td class=\"column-2\"><b><center>BSides4Kidz<\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/village-de-carreira\/\">Village de Carreira<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/car-hacking-village\/\">Car Hacking<\/a><\/td><td class=\"column-2\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/ciso-village\/\">CISO Village<\/a><\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/conscientizacao-village\/\">Conscientiza\u00e7\u00e3o Village<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/cyber-women-village\/\">Cyber Women Village<\/a><\/td><td class=\"column-2\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/digital-investigation-village\/\">Digital Investigation Village<\/a><\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/dumont-hackerspace\/\">Dumont Hackerspace<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/exploit-village\/\">Exploit Village<\/a><\/td><td class=\"column-2\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/forense-village\/\">Forense Village<\/a><\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/humint-village\/\">Humint Village<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/village-ia\/\">Village IA<\/a><\/td><td class=\"column-2\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/ics-ot-village\/\">ICS\/OT Village<\/a><\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/jurassic-village\/\">Jurassic Village<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/mobile-security-village\/\">Mobile Security Village<\/a><\/td><td class=\"column-2\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/osint-village\/\">OSINT Village<\/a><\/td><td class=\"column-3\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/quantum-village-br\/\">Quantum Village BR<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><b><center><a href=\"https:\/\/securitybsides.com.br\/2026\/red-team-village\/\">Red Team Village<\/a><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-41 from cache -->","protected":false},"excerpt":{"rendered":"<p>Selecione abaixo, qual Village deseja ver as atividades.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-2343","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/comments?post=2343"}],"version-history":[{"count":1,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2343\/revisions"}],"predecessor-version":[{"id":2344,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2343\/revisions\/2344"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/media?parent=2343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}