Meet us in Helsinki!
This year, we’re proud to sponsor Disobey, the Nordic security event taking place in Helsinki, Finland, on February 13–14, 2026. Since 2015, Disobey has been fostering hacker culture and building a strong, vibrant community. A mission we’re very much aligned with.
If you’re curious about how YesWeHack works with hackers, want to exchange on current cybersecurity trends, or are simply looking for hands-on hacking tips and tricks, come say hi. Sam Lowe, Jan Nieminen, and Alex Brumen will be onsite and happy to chat.
And that’s not all. We’re also bringing a surprise. Our very own Brumens has designed a dedicated CTF challenge that will be part of Disobey’s 2026 CTF competition.
Don't miss the event!
Solve SQLLM!
Part of the main CTF, SQLLM features a Ruby on Rails web application and API connected to a Model Context Protocol. This MCP communicates with a local LLM that has permission to execute tools and extract user-related information from a PostgreSQL database.
Your goal is to interact with the LLM assistant and uncover a way to exploit the system guarding the flag.
If you're attending the event, try to solve SQLLM from Friday, 11:30AM to Saturday, 8PM!
About YesWeHack
YesWeHack is a leading Bug Bounty and Vulnerability Management Platform used by hundreds of organisations and tens of thousands of bug hunters worldwide. Built and run by ethical hackers since 2015, our Bug Bounty platform offers fast, in-house triage, fair rewards and prompt payouts, and compliance with stringent EU data security laws.
YesWeHack manages hundreds of private and public programs and holds regular Live Hacking Events. Bug Bounty programs include Tencent, Swiss Post, Orange France and the French Ministry of Armed Forces.
Bug hunting is boosted by YesWeHack’s CTF playground/training platform (Dojo), various bug hunting tools, responsible vulnerability disclosure platform (ZeroDisclo.com), non-partisan Bug Bounty/VDP search engine (FireBounty.com), and a blog featuring technical tips and interviews.
Find out more at www.yeswehack.com and via X, LinkedIn, YouTube and GitHub.




