Adrian has worked as an Offensive Security Expert, Penetration Tester, and Software Developer in financial, e-commerce, and semiconductor companies. Eventually, he became full-time security consultant working with experts from different industries and people from all around the world. His experience ranges from attacking complex applications, through sophisticated red teaming exercises, to exploiting internals of operating systems. Currently working as Staff Application Engineer at Doyensec.
- When Filenames Become Attack Surfaces: Weaponizing NASA’s CFITSIO Extended Filename Syntax
Aleksa is a passionate security engineer, software developer, and aspiring open sorcerer. He enjoys writing and publishing software that provides elegant solutions to offensive security problems. He has contributed to multiple projects, including Metasploit. In April of 2022, Aleksa graduated from the University of Toronto with a bachelor’s degree in computer science and a Certificate of Ethical Hacking (CEHv10). He began working as a Cloud Security consultant and hacker. He also began attending Defcon as an attendee and a volunteer for the Blue Team Village (BTV). One of Aleksa’s fondest cybersecurity memories is playing the Pros Versus Joes CTF during BSides Las Vegas. By April 2024, Aleksa had obtained his OSCP and begun working as a security engineer at Praetorian. He is currently pursuing his OSCE3. He enjoys Brazilian Jiu-Jitsu, running long distances, and reading in his free time. He currently holds a blue belt in Brazilian Jiu-Jitsu. The book Mastery by Robert Greene is a big inspiration for Aleksa.
- What's Old is New: Exploiting Classic Vulnerabilities in GraphQL APIs
- Leaky API Keys, Log Tampering, and Account Takeover
Dr. Aleksandr Pilgun is a computer science researcher specializing in Android application security and analysis.
He defended his doctoral thesis at the University of Luxembourg, where he developed ACVTool — an efficient instruction coverage measurement tool for third-party apps without source code. ACVTool is widely used by researchers to evaluate novel automated testing tools and continues to be actively developed to bridge academic research with industry needs.
Throughout his research, Aleksandr has analyzed tons of Android applications. In recent years, his work has focused on fraudulent applications and assisting several FinTech startups to improve their service interoperability through reverse engineering. He recently returned from Portugal to rejoin the University of Luxembourg.
- Android App Tricks: Defenses and Bypasses
Alessio Di Santo received a Bachelor's degree in Information Engineering in 2020 from the Università degli Studi dell'Aquila, with a thesis focused on fairness and cryptography. In 2022, he completed a Master's degree at the same institution, presenting a thesis on forensic acquisition techniques for Windows IT/OT assets. Currently, he is pursuing a Ph.D. at the Università degli Studi dell'Aquila under the supervision of Professor Dajana Cassioli, with co-tutor Walter Tiberti. Since 2020, he has been employed in the cybersecurity sector, working as a Cyber Threat Intelligence Analyst, Incident Responder, Purple Teamer and Malware Analyst. Nowadays, he works as a Senior Cyber Security Specialist at Deutsche Boerse.
- Exploiting the Past: How Linguistic Redundancy weaponizes the Quantum Search Landscape
Alex Holden is the founder and CISO of Hold Security, LLC. Under his leadership, Hold Security played a pivotal role in information security and threat intelligence, becoming one of the most recognizable names in its field. Mr. Holden researches minds and techniques of cyber criminals and helps our society to build better defenses against cyber-attacks.
- Advanced Threat Hunting: Staying One Step Ahead of Adversary
- Why I Go to the Dark Web Every Day
Building Open Cloud Security at Prowler.
I started as a sysadmin, was a Site Reliability Engineer until a few years ago when I moved to the dark side... Security. I've been hooked to CTFs and anything with a scoreboard for a long time.
Starting the unicrons.cloud project to share knowledge about cloud security with the community.
- Level Up Your CI/CD: Building a secure pipeline with OSS
- Level Up Your CI/CD: Building a secure pipeline with OSS
Andrey Lukashenkov handles all things revenue, product, and marketing at Vulners - a bootstrapped, profitable company committed to providing an all-in-all vulnerability intelligence platform to the cybersecurity community.
Being naturally curious and having a technical background, he leverages unlimited access to the Vulners database to explore various topics related to vulnerability management, prioritization, exploitation, and scoring.
- When LLMs Summarize Security Findings: The Tradeoffs You Can’t Ignore
I am a successful entrepreneur with cyber security, hardware and AI as my hobbies and work specialties. Did my first blue team cyber gig in 2001, founded SOC Prime in 2014 together with Alex and Ruslan, which we've built from a small rented apartment in Kyiv to venture backed profitable company which operates across 4 continents, who's products and content are used by over 11,000 organisations. In cyber domain I am specializing in threat detection, sigma rules, MITRE ATT&CK, detection engineering and cyber threat intelligence, with a goal to build better tools for people who work in same niche. I consider two most successful contributions to such community projects Uncoder and DetectFlow which both can be found on GitHub.
- Panel Discussion: The future of Detection Engineering
- Turbocharged SOC: DetectFlow and other innovative Open Source tools released by SOCPrime for detection engineering
Antonio Formato is a Senior Cybersecurity Solution Engineer at Microsoft, where he leads technical engagements on security platforms including Defender XDR, Sentinel, and Defender for Cloud for enterprise and public sector customers across EMEA. With 18+ years of experience in cybersecurity, he advises CISOs and security teams on Zero Trust strategies, multi-cloud security posture, and secure AI adoption.
Outside his professional role, Antonio is an independent researcher exploring the intersection of Generative AI and Cyber Threat Intelligence. He is the creator of TI Mindmap HUB, an AI-powered research platform that automates the transformation of unstructured threat reports into structured, machine-readable intelligence using LLMs and the STIX 2.1 standard. He is co-author of an academic paper on automated STIX 2.1 bundle generation currently under peer review, and collaborates with the University of Salerno as co-advisor on cybersecurity thesis projects.
Antonio is a regular speaker at security conferences including RomHack, HackInBo, BSides Athens, and ITASEC. His independent research is open to community collaboration at ti-mindmap-hub.com.
TI Mindmap HUB is a personal, independent research project, not affiliated with any employer or commercial entity.
- Your CTI Reports Are Useless Without Structure: From Unstructured Threat Intel to STIX Knowledge Graphs with LLMs and MCP server
Arad Donenfeld is an attacks and exploits developer in SafeBreach, and has a background in security research from several roles (including Deep Instinct, where this research was conducted). With his strong foundations of development, security, and operating systems internals, Arad develops tools for offensive operations, detection methods, and workflow automation. Arad focuses on practical techniques to identify and manipulate vulnerabilities and breaches, while testing and improving defenses across broad environments
- The Agents of Chaos: AI Driven Malware Generation
I am an Information Security Specialist with expertise in security monitoring, incident response, and threat hunting. Currently, I work at ESET.
Previously worked as a Cybersecurity Specialist for the largest independent moving company in North America, where I contributed to strengthening the company’s security posture.
- Mastering Incident Response with Kanvas
I am a cybersecurity consultant and auditor with experience in Information Security, Cyber Security, Cloud Security, IT Governance, IT Risk Management, IT Compliance, IT Audit and in Data Privacy.
With more than 25 years practice in delivering advisory and audit engagements, as part of several consulting firms, I delivered numerous projects as part of international teams in different geographies covering a wide range services in diverse industries: finance and banking, technology, telecommunication, start-ups, energy, healthcare, retail and manufacturing.
- Cloud Sovereignty
Chris Beckman is a Principal Security Engineer at TaxBit with expertise in AI security and security architecture across both emerging technology startups and public companies. His work focuses on practical security decision-making in real-world systems. Outside of work, he enjoys photography.
- From Phishing to Mitigation: An Early-Career Incident Response
A generalist Engineer who collected various experience from various industries and domains.
Engaged now on DevSecOps topics at Fondation Restena,
- From CLI to Platform: Building NetCarapace, a Secure and Open Source URL Checking Ecosystem driven by Fondation Restena URL Shortener Use Case
Daniela Parker has sat on the other side of the table — as a Chief Risk Officer and Chief Operating Officer — making the tough calls on budgets, priorities, and competing initiatives. She knows exactly what happens in the executive huddle after the security team leaves the room.
As the founder of Parker Solutions, Daniela helps organizations turn risk and security from technical conversations into strategic business decisions. She has led enterprise risk programs, technology transformations, regulatory initiatives, and operational strategy — and she’s had to decide where resources go and why.
Her superpower? Teaching security professionals how to speak the language executives actually use.
Her style is direct, practical, and real. No theory for theory’s sake. Just executive-level insight into how decisions actually get made — and how to influence them.
Because when you understand how executives think, security doesn’t just get acknowledged.
It gets prioritized.
- From Zero Trust to Trusted Advisor - Selling Security to Stakeholders
I am Debjeet, a Malware Developer for Black Hills Information Security. I curate malware and tools for testers, publishes research, discovers new bypasses and creates automation pipelines. Previously, he used to work as a Consultant with Certus and a Researcher with Payatu. When I am not in front of the computer, I am either reading Philosophy books, playing Dark Souls or riding bikes!
- From Code to Compromise: Turning modern day IDEs into attack vectors via malicious Extensions
Denim Latić is working as a security analyst and part of the CSIRT for Fondation Restena, the NREN of Luxembourg.
Cybersecurty is an ever-evolving field and so, he embarks on a perpetual journey to do his best to be able to face new and old threats in the cyberspace. Furthermore, he is enthusiastic about raising awareness on cybersecurity related issues to both small and large audiences.
- Hello LuCy nice to meet you! - A conclusion on a 3 year Open-Source cybersecurity project
- How to be just the right amount of Paranoid (Cybersecurity Edition)
Diana Waithanji believes data privacy is a human right. She works as a cybersecurity professional at SAP specifically SAP Cloud Infrastructure in Germany. She is a TechWomen USA fellow 2025 at Google and an AFRIKA KOMMT Germany alumni 2022. Diana sits in two technical committees at the Kenya Bureau of Standards (KEBS) and serves as a board member at Nivishe Foundation. Diana is also a founder of Wahandisi La Femme, an initiative that mentors girls in rural Kenya to get into tech and engineering.
- Panel Discussion: The future of Detection Engineering
- AI in Cybersecurity: How can we make best use of it?
- Building Secure AI: Making Threat Modeling a Core Part of Development
Hi there, I'm Didier, a technology and information security enthusiast. I started my career as an information security Ninja, defending information systems against cyber threats using my Jedi skills. However, I also have another side to me that comes out at night, that of a benevolent hacker. I love using my skills to support the values of open source and firmly believe in them.
I believe that technology can be used to improve people's lives, but this can only be done if we work together and share our knowledge. That's why I'm also a strong advocate of collaboration and openness in the tech industry.
May the source code be with you!
- Spreading malware with USB keys - does it still work ?
- Mapping the Invisible: Why System Cartography Matters for Security and Compliance
I am an Application Security Engineer with extensive experience building and operating security tooling at scale. I started my career at Checkmarx, where I worked on security products, and later joined Flutter Entertainment, where I implemented and evolved large-scale AppSec programs. I currently work at OLX, focusing on automation, scalable security tooling, and cloud security. I actively contribute to open-source security projects and regularly speak at security conferences including Black Hat MEA, BSides, and BalCCon, with a focus on practical SAST, SECRETS management and SCA implementations.
- Turnkey Code – Enhancing Secrets Management in Large Scale Organizations
- Building vs. Buying – A Tale of Developing an In-House SCA Tool
Elliot is a cyber threat intelligence consultant at AmeXio. He is from New Zealand with a background in Financial Services, Technology Services and Government organisations. His expertise is in threat intelligence, threat hunting, reverse engineering, malware analysis, and incident response.
- Ferrari without fuel: Exorcise GIGO out of Logs Management
- Phinding a Phisher: Don't let rep get you rekt
- Scaling defence - finding RedVDS from a phishing email
Ellis Stannard is a part-time security researcher and core member of the Ransom-ISAC (Information Sharing and Analysis Center) initiative, where he contributes to collaborative threat intelligence efforts focused on ransomware and advanced persistent threat (APT) campaigns.
- XCTDH Cross-Chain Transaction Data Hiding: Cyber Espionage and OPSEC Encounters
PhD Student at University of Luxembourg
SnT, TruX research team
- Understanding Mobile Stalkerware
I’m a technical sales engineer and cybersecurity professional specializing in software supply-chain security, threat intelligence, and risk management. Based in Moormerland, Germany, I combine deep technical expertise with a strategic, customer-focused approach to help organizations gain visibility, reduce risk, and strengthen resilience across their software ecosystems.
At ReversingLabs, I work with customers and partners across Europe to implement scalable, intelligence-driven solutions that address the growing challenges of modern software development and supply-chain integrity. My work covers areas such as Software Bill of Materials (SBOM) management, malware analysis, and advanced file and binary inspection.
I’m passionate about translating complex cybersecurity topics into clear, actionable strategies that align with business goals. I focus on turning cybersecurity from a reactive defense into a proactive enabler of innovation. I also enjoy engaging in conversations about the evolving threat landscape, the future of software trust, and how automation and AI can strengthen cyber defense.
My goal is to help organizations build not just safer software, but stronger security cultures, where transparency, collaboration, and continuous improvement are at the center of every initiative.
- Death By Pickle: "Python's Betrayal ML"
- Curating Secure Software: The Art of Selecting Safe Dependencies
- Managing Uninvited Guests: Securing Open Source Dependencies
Gabriella Lanziani received her Bachelor Degree in Literature and her Master Degree in History. Her academic interests lie primarily in linguistics, with a particular focus on the structural and semantic properties of language and their potential applications in information theory and cryptography. Her research explores how linguistic analysis - especially syntax, semantics, and pattern recognition - can contribute to the understanding of code systems, cryptographic communication, and natural language processing in cybersecurity contexts.
- Exploiting the Past: How Linguistic Redundancy weaponizes the Quantum Search Landscape
Glen Sorensen is a Recovering CISO/vCISO-Type and is presently a Solutions Engineer with DeleteMe. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership, including leading the security program for a credit union and for smaller organizations in a fractional role. He currently focuses on how exposed information and OSINT are weaponized in conjunction with AI toward social engineering attacks, and how that factors into greater enterprise cyber risk.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 20+ years, depending on how much misspent youth you count. He is a privacy geek and a sucker for a good tabletop exercise, and also serves as an Incident Master for HackBack Gaming, which puts his countless hours of roleplaying game experience to work teaching people about cybersecurity and incident response.
- From Zero Trust to Trusted Advisor - Selling Security to Stakeholders
- Gotta Contain 'Em All: Collaborative Incident Response Training Through Gaming
- Dungeons & Dragons: The security power tool you didn’t know you needed
- The High-Performance Fuel for Social Engineering (Now in AI Flavors!)
Guillaume is an expericed security nerd mostly operating on the blue team side, who is equally experienced in very large organizations and startups, typically in the cyber security or fintech spaces. He was head of security for companies such as JupiterOne, FleetDM and Finaptic.
The thing he dislikes the most about security is the use of old avice and "best practices" that do not reduce risk for real companies and people, and he much prefers to base his work on real data and threats.
- Startup Security 2020: Aged Like Wine or Milk?
Hrishikesh Somchatwar (@StorytelnHacker) is an independent security researcher, bestselling author, and international speaker known for his deep expertise in hardware and automotive cybersecurity. With a passion for uncovering vulnerabilities in embedded systems, he has presented his research at top security conferences worldwide, including SCSA Georgia, Defcamp Romania, SecurityFest Sweden, DeepSec Austria, Bsides Delhi & Ahmedabad, Hackfest Canada, and c0c0n Kochi.
Beyond cybersecurity, Hrishikesh runs The StorytellingHacker Podcasts, where he shares insights on hacking, security, and storytelling. His thought leadership extends to his engaging Twitter presence, where he discusses cutting-edge security topics.
In his free time, he explores Vedic Astrology (Jyotisa), blending ancient wisdom with modern problem-solving. Whether on stage, in a podcast, or through his writing, Hrishikesh brings a unique perspective—merging technical depth with the art of storytelling.
- From CAN Frames to Corporate Firewalls: Life of an Automotive Security Researcher
please add
- Agnoletti & Trump: Gaming Playing to Win at Cyber
Jeremy is the founder and CEO of FireTail, an end-to-end AI security platform. Prior to FireTail, Jeremy worked in M&A at Rapid7, a global cyber leader, where he worked on the acquisitions of 3 companies during the pandemic. Jeremy previously led sales at DivvyCloud, one of the earliest cloud security posture management companies, and also led AWS sales in southeast Asia. Jeremy started his career with 13 years in cyber and IT operations. Jeremy has an MBA from Mason, a BA in computational linguistics from UNC, and has completed additional studies in Finland at Aalto University. Jeremy speaks 5 languages and has lived in 5 countries.
- Making a risk-informed LLM choice
- The challenges of AI-as-a-Service logging
Julien started in Apple automation and security. His role evolved towards mobile forensics for the last couple of years.
While being a niche market, it applies to many industry leaders. These leaders often misunderstand what nation state malware is and why tools from regular security vendors can't detect these.
His mission in 2026 is to build awareness amongst these industry leaders to help them understand what nation state malware is and whether it applies to their users or not.
- Spyware: The Invisible Threat
Cybersecurity and Risk Management professional with over 15 years of expertise in identifying, assessing, and mitigating cybersecurity and technology risks. Specialized in third-party risk management, regulatory compliance, and data security with proven success in aligning cybersecurity strategies with organizational goals. Skilled in advising executive management and technical teams on effective risk mitigation strategies within the Information Security Framework.
- Third Party Risk Management
At ReversingLabs, I work with customers and partners across Europe to implement scalable, intelligence-driven solutions that address the growing challenges of modern software development and supply-chain integrity. My work covers areas such as Software Bill of Materials (SBOM) management, malware analysis, and advanced file and binary inspection.
I’m passionate about translating complex cybersecurity topics into clear, actionable strategies that align with business goals. I focus on turning cybersecurity from a reactive defense into a proactive enabler of innovation. I also enjoy engaging in conversations about the evolving threat landscape, the future of software trust, and how automation and AI can strengthen cyber defense.
My goal is to help organizations build not just safer software, but stronger security cultures, where transparency, collaboration, and continuous improvement are at the center of every initiative.
- Death By Pickle: "Python's Betrayal ML"
- Curating Secure Software: The Art of Selecting Safe Dependencies
- Managing Uninvited Guests: Securing Open Source Dependencies
Chicago-based (But soon Porto!) and proudly a natural creature of winter, I thrive on snow, OSS, and just the right amount of chaos. Whether sipping Grand Mayan Extra Añejo or warding off cyber threats with a mix of honeypots, magic spells, and a very opinionated flamingo named Sasha (the BSidesChicago.org mascot), I keep things interesting. Honeypots and refrigerators rank among my favorite things—though my neighbors would likely disagree.
- Confound and Delay: Honeypot Chronicles from the Digital Battlefield
- Cloud Misconfigurations: Poke Poke, Breach
Katherine is a tech professional with 2.5 years of experience, having retrained in her 40s to become a Computer Expert, specialising in System Integration. Originally from New Zealand, she is currently based in Germany. During her training, she undertook a practicum at SevenShift, a boutique IoT cybersecurity company in Cologne that recognized her talent and dedication, ultimately hiring her. She is now in a training position, where she is honing her skills and contributing to the company's security initiatives. Outside of her professional life, Katherine is a dedicated single mother to a teenager. She is also a member of the Haecksen, the FLINTA branch of the CCC, and a leader of the Cologne OWASP Chapter
- Packet Analysis for Beginners - an IoT toy, some packets, and Wireshark
- Packet Analysis for Beginners - an IoT toy, some packets, and Wireshark
Kirils Solovjovs is Latvia's leading white-hat hacker and IT policy activist, known for uncovering and responsibly disclosing critical security vulnerabilities in national and international systems. An expert in penetration testing, network flow analysis, and reverse engineering, he is also a lifelong command-line enthusiast. Kirils started programming at age 7 and by grade 9 was spending his lunch breaks writing machine code directly in a hex editor. He uses bash daily for hacking, automation, and large-scale data processing and is sometimes contracted by major online education providers to proofread their bash certification exams. He currently is the lead researcher at Possible Security.
- Mastering Bash for Hackers: Extreme Command-Line Power
- Security Impress Karaoke
Klaus Agnoletti has been an all-round infosec professional since 2004. As a long-time active member of the infosec community in Copenhagen, Denmark, he co-founded BSides København in 2019.
Currently he's a freelance storytelling cyber security advisor specializing in security transformation and community focused marketing, employer branding, playing security games and other fun assignments and ideas coming his way.
Lately he has also become a neurodiversity advocate speaking about ADHD to educate and break down taboos in an industry with a vast overrepresentation of neurodiversity and not very many talking about it.
- Agnoletti & Trump: Gaming Playing to Win at Cyber
- Gotta Contain 'Em All: Collaborative Incident Response Training Through Gaming
- Dungeons & Dragons: The security power tool you didn’t know you needed
Coming from a bachelors of linguistics and being always enthusiastic about IT and CTI topics, I combined these passions for my masters in computational linguistics. After that I started working in academic research mostly in low-resource language NLP, going more into Cybersecurity with my recently started PhD at SnT Luxembourg, which will be focused on dark web and CTI research with NLP.
- What is the dark web talking about? - Dark Jargon Detection and Identification
Lisi found tech as her place to be in 2009 and has grown as a specialized generalist ever since. Building great products that deliver value together with great people motivates her and lets her thrive. As a security engineer, she’s now fully focusing on all things product security to help build more secure solutions. She's committed to testing and quality, passionate about whole-team approaches to increase effectiveness and resilience, and enjoys experimenting and learning continuously. Having received a lot from communities, Lisi is paying it forward by sharing her stories and learning in public. She posts on Mastodon as @lisihocke@mastodon.social and blogs at www.lisihocke.com. In her free time, she plays indoor volleyball or delves into computer games and stories of all kinds.
- Out of Security Exception - What to Do Without an Expert to Secure Your Software
- Secure Development Lifecycle Applied - How to Make Things a Bit More Secure than Yesterday Every Day
Louis Nyffenegger is a renowned application security expert and the founder of PentesterLab, a leading platform for hands-on security training. With extensive experience in penetration testing, code review, and application security, Louis has worked at organizations like the National Bank of Australia, Australia Post, and Fitbit.
He has delivered talks at security conferences, including DEFCON, Kawaiicon, and BSides Canberra, sharing insights on web security, code review techniques, and the intricacies of penetration testing.
As the primary author of PentesterLab’s labs, Louis has designed practical, real-world exercises that help security professionals and developers master vulnerabilities and improve their skills. He also runs AppSecSchool, a YouTube channel dedicated to application security, and writes thought-provoking blog posts to inspire the security community.
Beyond his technical contributions, Louis is passionate about teaching and empowering others to build secure software. He believes in a hands-on approach to security education, emphasising real-world applications and meaningful learning experiences.
- Those Who Don’t Learn from CVEs Are Doomed to Rediscover Them
- How to Read Code to Find Vulnerabilities
Luc Dockendorf is Luxembourg's Cyber/Digital Ambassador since March 2025. He started working in international relations in autumn 2003, after graduating with a Master in English and International Relations. He joined the Ministry of Foreign Affairs in 2006 and has notably been in Luxembourg's team for the UN Security Council (2013-2014) and the Human Rights Council (2022-2024). Chaired the EU's Group of Friends of the Presidency on Cyber Issues in 2015.
- Things Fall Apart: Allying Cybersecurity and Diplomacy against Authoritarian Disorder
N/A
- BsidesLuxembourg 2026 CTF Walkthrough Session
Marius Genheimer is a DFIR Specialist and Threat Researcher with the SECUINFRA Falcon Team. He specializes in malware analysis and defensive security training.
- A phishing trip with Fancy Bear - Let's analyze APT malware together!
Markus Einarsson is a Security Architect and Incident Response Lead at Sectra in Sweden, where he secures cloud-hosted environments for healthcare customers worldwide. With over a decade of experience in cybersecurity, Markus specializes in incident response, digital forensics and security architecture.
As part of the Sectra Hunt and Incident Response Team, he has extensive hands-on experience with forensic workflows and modern DFIR toolchains. Markus holds multiple GIAC certifications including GEIR, GCDA, GCFE, GCFA, GRID, GNFA, GCIA and GCIH. He is passionate about scalable incident response methodologies and advancing open-source forensic tools.
- From Hours to Minutes: Automating Incident Response Triage with Open-Source Tools
Massimo Bertocchi is a Threat Hunter and Detection Engineer based in Zürich, specializing in advanced malware analysis, covert channel research, and offensive security tooling. He holds dual Master's degrees in Cybersecurity from KTH Royal Institute of Technology (Stockholm) and Aalto University (Finland), where his thesis on Microsoft Teams covert channels received international recognition and was subsequently published by Compass Security. His groundbreaking research identified and exploited multiple covert C2 channels within Microsoft Teams (achieving exfiltration rates up to 90KB/s) demonstrating critical vulnerabilities in cloud-based business communication platforms that bypass traditional network monitoring. This work represents the first comprehensive analysis of covert channels in enterprise collaboration tools and has influenced detection strategies across the industry.
- Not So hARMless: The Hidden World of Linux Packers and Detection Challenges
Tech nerd, gamer, living in the past (on purpose)
- SPOT - Spear-Phishing Overwatching Tool
Cyber fun guy.
- Spreading malware with USB keys - does it still work ?
Melina Phillips is an Offensive Security Engineer with a background in Security Operations and Incident Detection. She has over ten years of IT experience and six years working directly in cybersecurity, blending hands on blue team work with her current focus on adversary simulation and endpoint compromise.
Her recent talks have been featured at Bsides Cambridge, Security Fest, BruCon, LeHack, HackLu and BlackAlps. She's known for making complex technical concepts accessible without watering them down, and for delivering practical insights grounded in real world attack and defense experience. She strongly believes that Linux security doesn’t have to be presented in a boring way, and that technical depth and creativity can (and should) coexist.
Outside of breaking into infrastructure and chasing down Linux threats, she's usually at CrossFit or playing with makeup, ideally not at the same time.
- The Spy Who Logged Me - When your XDR joins the attackers
- The whistles go woo woo: SIEM alerts, threat detection and tuning unnecessary noise
Senior Cybersecurity Consultant with over 15 years of experience leading strategic security initiatives across global organizations. I am specialized in aligning cybersecurity governance with business objectives, ensuring compliance, managing risk, and enabling secure innovation. My expertise includes security architecture, regulatory frameworks (ISO 27001, GDPR, NIS2, DORA), and cross-regional project management. I have successfully delivered high-impact programs, audits, and policy frameworks in collaboration with teams from Europe, North America, and Asia. I am also an active member of the local cybersecurity community.
- Unraveling Failure - Lessons from an Avoidable Ransomware Attack
Automating Security since 2022.
Building (and breaking) AI agents to test their limits.
- The Agent Had a Plan—So Did I: Top Attacks on OWASP Agentic AI Systems
- AI Security village - technical training and implementation
- AI Security village - technical training and implementation
- AI Security Village
Will work on this
- Cloud & AI Security - Capture the Flag
Senior AppSec Consultant at NVISO, I help teams across Europe embed security from design to delivery. I lead threat modeling workshops, secure design reviews, and lectures. I turn AppSec into real-world impact and help fast-paced teams make threat modeling stick for good with no bullsh*t.
- What Does Threat Modeling Solve for AI Security?
Olivier joined POST Cyberforce Offensive Security team where he participated to a large variety of offensive security missions such as vulnerability research, mobile, web applications and network penetration tests, targeting telecom and banking systems, payment machines or ATMs, and also participated to several forensics investigations.
On a regular basis he also participates to the development of in-house telecom network security testing software, and assessments .
He is currently active on adversary simulation and red team engagements for DEEP, and participates to the offensive security team research & development effort.
- RioT – A Raspberry-Based Network Implant for Red Team Operations
Ondrej Nekovar is an experienced executive manager responsible for the cyber security of critical information infrastructure and the state. His areas of expertise include research into the use of advanced technologies for active cyber defense, deception, detection engineering and cyber counterintelligence.
LinkedIn profile:
https://www.linkedin.com/in/onekovar/
- Panel Discussion: The future of Detection Engineering
- CT(C)I-Driven detection against internal and external threats
- Building a safe harbor for cybersecurity professionals
I’m an SRE focused on Developer Productivity and Platform Engineering, with over 8 years of experience building tools that help developers work smarter. I pride myself on being highly pragmatic, always prioritizing solutions that balance efficiency and impact.
Oh, and fun fact: my right thumb is actually my toe. Yes, it’s as weird as it sounds, but I like to think I can give "Super Likes".
- Level Up Your CI/CD: Building a secure pipeline with OSS
- Level Up Your CI/CD: Building a secure pipeline with OSS
Panagiotis is a Senior Red Team Operator @ NVISO, with multiple years of experience in ethical hacking and Red Teaming, interested in API hacking, Active Directory hacking and malware development.
Panagiotis is RTOS, CRTO, OSCP, OSWE, OSWA, RTOS and eWPT certified
Panagiotis is also an active student at the University of West Attica
- Oh Shit I Accidentally Breached an Organization (or many) using AI
Parth Shukla is a Senior Security Researcher specializing in AI Security and Adversarial Machine Learning. With a deep background in offensive security, he currently focuses on the security architecture of Agentic Systems and LLMs. His research bridges the gap between traditional application security and the probabilistic risks of modern AI.
- The Agent Had a Plan—So Did I: Top Attacks on OWASP Agentic AI Systems
- Talk to a Shell : Exploiting AI agent in Real Time
- AI Security village - technical training and implementation
- AI Security village - technical training and implementation
- AI Security Village
Currently leading the Offensive Security R&D at Hacknowledge SA and a member of the offensive security team. Coming from a blue team background, I transitioned to the red side, focusing on offensive tool development, cloud penetration testing, and purple teaming. With expertise in both attack and defense, I work on advancing adversary emulation, bypassing detection techniques, and automated security assessments.
- Goodbye Purple Team, Hello Purple Bots
Paul Jung (paul.jung@circl.lu) is a long-time security professional with over two decades of experience in the cybersecurity field in Luxembourg. He has built extensive consulting expertise across multiple industries, covering activities from offensive security assessments to incident response and digital forensics. Prior to joining the Computer Incident Response Center Luxembourg (CIRCL), he served as Senior Security Architect in the Managed Network Security department of the European Commission, where he led the technical direction of major security projects. He later joined Excellium Services (acquired by Thales Group in 2022), where he founded and led TCS-CERT, a multi-country CSIRT dedicated to intrusion response. Paul regularly speaks at international conferences such as FIRST, Virus Bulletin, Botconf, and Hack.lu, and has published articles on DDoS, botnets, and incident response. He is a native French speaker and fluent in English.
- Finding meaning in /dev/null
Pauline Bourmeau is an independent security researcher specializing in the intersection of artificial intelligence, cognitive psychology, and threat intelligence. She has consulted on multilingual natural language processing, led deep learning and NLP workshops, and created training materials blending STEM with human factors. As founder of DEFCON Paris and contributor to the MISP project, she actively advances collaborative cybersecurity practices.
Previously, Pauline worked as a Threat Intelligence Analyst conducting OSINT, HUMINT, and SOCINT analysis to profile threats and investigate APTs. She holds a Master’s in Criminology with a thesis on cybersecurity intelligence sharing, and a background in sociolinguistics and computer science from Sorbonne and School 42.
- [Reboot] ML foundations for cybersecurity in 2026
- SPOT - Spear-Phishing Overwatching Tool
- [Reboot] ML foundations for cybersecurity in 2026
Quentin is a Rust developer at CIRCL. Inspired by his background in incident response and threat detection, he develops open-source security tools to solve practical problems. His main interests include threat detection, bug hunting, and building tools that help the security community.
- Kunai Workshop: Hands-on Linux Threat Detection
- Kunai: Open-Source Threat Detection on Linux
- Magic-rs: A Memory-Safe, libmagic-Compatible File Type Detection Ecosystem
I am a Threat Intelligence Researcher and a regular contributor to the Infosec Community via Tweets and Investigation Blog Posts. I run a Threat Intelligence Blog named "THE RAVEN FILE" which purely focuses on Threat Intelligence Topics such as Dark Web, Ransomware Ecosystem, Scam Busting, Blockchain Analysis, etc.
Recently, I infiltrated into 0APT Ransomware Group and exposed their Modus Operandi on my latest blog post. I often expose the real IP Addresses of Ransomware Groups such as: LockBit, Kairos, etc repeatedly. 3 years back, I made it into the headlines of finding Offensive GPT Model titled "FraudGPT" which got a global recognition.
I had conducted a 3-Hour Dark Web Workshop for Conferences like:- Craccon in 2025 and at IICON in 2024 which were held in Delhi, India.
This year, I have been made into the list of Contributor of the Year by ABUSECH and SPAMHAUS for providing large number of IOCs, Ransomware Samples to the Platform, making a real impact in the Infosec Community by providing timely action for Defending the Threats.
You can read my Blog at: theravenfile.com
- ANALYZE & HUNT DPRK ATTACKS
Ralph is a Senior Pentester for a confidential company somewhere in the Middle East. Before that, he was a Senior Security Engineer at Microsoft where he deals with security architecture reviews, security design reviews, threat modelling, security research, code reviews, and pentesting on the dedicated product he is directly working on with 100+ software engineers. He has 10 years experience in the industry as a Security Consultant/Pentester/Security Researcher who recently served as a Security Consultant in a well-acknowledged global information security assurance firm called NCC Group. His expertise is mainly Web, Mobile, and Network Pentesting, Threat Modeling, Security Architecture Review, and Security Design Reviews. Prior to that, he was a pioneer Application Security Consultant for Fwdsec, a Cyber Threat Management Consultant at Ernst & Young (EY) with the experience of being sent abroad for client engagements upon client request. He started his career as a Security Researcher at Hewlett-Packard Fortify with focus on Mobile Application Security particularly with Android and iOS.
He is also a major active contributor and a member of the working group for the OWASP Application Security Verification Standard (ASVS) project, making the standard better for fellow pentesters and developers alike. Whenever he has spare time, he volunteers giving Web, Mobile Application Security and Threat Modelling lectures to university students as part of being a thought leader in the security community and outreach to students. You can also find him as a regular conference volunteer staff for some premium and well-known security conferences, namely: CanSecWest, REcon and Ringzer0 Training.
He trained attendees at BSides Vancouver 2025 and BSides Orlando 2025 for the same workshop, "Threat Modelling Starter Training" which had been well received. He has presented his talk entitled, "OWASP ASVS: A Methodical and Practical Approach to Application Security Testing" on OWASP AppSec Pacific Northwest conference (PNW) 2024 on June 15-16, 2024 in Vancouver, BC Canada. He has also presented a similar presentation aimed for beginners delivered online at HackStop Cybersecurity Summit 2024 on March 21-22, 2024 held in Ljubljana, Slovenia.
He earned his Computer Science degree from Ateneo de Naga University - one of the best top tier schools in the Philippines. His bachelor degree thesis was awarded in a National IT Conference last 2015 as one of his top accomplishments during that time aside from being a consistent Dean's List award as well.
- Threat Modelling Starter Training
- Threat Modelling Starter Training
Red teamer. CVE hunter. AD / WEB Apps destroyer. Dad. Teaches kids to question everything starting with default credentials.
- Goodbye Purple Team, Hello Purple Bots
With over 20+ years in the cybersecurity field, I have dedicated my career to safeguarding organisations by developing robust SOC and effective incident response teams. As a passionate advocate for knowledge sharing and collaboration - "sharing is caring"- I have actively contributed to the cybersecurity community and related open-source projects, such as MISP. In my current role, I have led the OpenTide initiative, turning it into a project at the core of the Detection Engineering team. I am looking for exchanging and collaborating with other Detection Engineering teams to develop repeatable, traceable, and pragmatic processes, effectively bridging the gap between Threat Intelligence, Threat Hunting, and Threat Detection.
- Panel Discussion: The future of Detection Engineering
- OpenTide: From Raw Intelligence to Structured Threat-Informed Detections
https://nl.linkedin.com/in/rihensen
- Cloud & AI Security - Capture the Flag
Rishi is a London-based security researcher with experience in vulnerability research, threat intelligence, and enterprise risk analysis. His work focuses on identifying zero-day vulnerabilities and emerging CVEs, with a particular interest in building detection logic before threats are publicly weaponised.
He works across both offensive and defensive disciplines, developing threat models grounded in real-world TTPs, writing detection rules, and automating reconnaissance to uncover exposed assets at scale. Attack surface management and OSINT are areas he keeps coming back to, specifically the challenge of mapping exposure that organisations often don't know exists.
Outside of his day job, Rishi contributes to open source security tooling through Project Discovery and OWASP, part of the leadership team of the UK OSINT Community, and occasionally speaks at community events including DEF CON and BSides.
- From Manual Hunt to Mass Detection: Weaponising Nuclei Against Phishing
- The Forgotten Fingerprint: DNS Based OSINT Techniques for Product & Service Discovery
Chief Technology Officer at Warpnet, Roald has a broad background in security engineering, platform operations, and IT compliance. He contributes to open-source projects and serves as an organizer of BSides Groningen and BSides Amsterdam.
- Hands-on Car Hacking & Automotive Cybersecurity
- Car Hacking Village
- Car Hacking Village
- Car Hacking Village
- Car Hacking Village
Sonia is a Software Engineer with a passion for Digital Forensics and CTFs
- Blackhoodie training - Introduction to Linux Memory Forensics
- Blackhoodie training - Introduction to Linux Memory Forensics
SOC Team Leader and hard-worker, with a decade of experience among ISP, MSSP and Internal SOC.
SANS/GIAC GSOM Certified
- Ferrari without fuel: Exorcise GIGO out of Logs Management
Been in IT security for too long. I enjoy creating fun and games!
- Dismantle The Bomb
- Dismantle The Bomb
- Dismantle The Bomb
- Dismantle The Bomb
- Dismantle The Bomb
- Dismantle The Bomb
- Dismantle The Bomb
- Dismantle The Bomb
Dr. Tailia Malloy (She/They) is a postdoctoral researcher at the University of Luxembourg in the Trustworthy Software Engineering research group. Their PhD explored computational cognitive models of human learning and decision making that can allow us to train AI systems with an understanding of human biases and constraints. This lead them to the area of cybersecurity, where their current research focuses on Generative AI applied to recommendations in network analysis, social engineering training and defense, and safe and secure code generation with LLM agents.
- Teaming, Trust, and Threats: How Humans Interact with Generative AI in Security
I started my career as a developer 15 years ago as network technician, then I switched to law, started to work as a forensic expert, now I help cyber startups to grow and scale, specially in the forensic part, to build a collective digital immunity to eradicate the cyber pandemic.
- Forensic Challenges in Real-World Cases of Digital Manipulation
Systems/Infrastructure Developer during the day.
Game Developer at night.
Passionate about ice/roller skating, video games, linux ricing and music.
- SPOT - Spear-Phishing Overwatching Tool
Tomas is a researcher in the Emerging Threats team focusing on Cloud Threat Intelligence at CrowdStrike. He began his cybersecurity journey during his exchange studies at Aalto University. His career started as a vulnerability and exploit analyst specializing in IPS rule development, then progressed through operational security roles and incident response. Now, returning to research, he focuses exclusively on cloud intrusions and he loves it.
- In The Wild Cloud Exfiltration Paths You Might Not Expect
Major background in Software Engineering, Machine Learning, IT Security
Security Analyst since 2025
- Comprehensive Framework for Analyzing and Detecting Malicious Browser Extensions
- Keynote: Identity Security Just Exploded
- Keynote: Identity Security Just Exploded
William manages the technical team behind AS197692 at Conostix S.A. in Luxembourg. He’s been working in cybersecurity using free and opensource software on a daily basis for more than 25 years. Recently, he presented his work on SSL/TLS toolkits at Nullcon 2025 in Goa and Hack.lu 2025 in Luxembourg. He contributed to the cleanup and enhancement efforts done on ssldump lately. He particularly enjoys tinkering with open (and not so open) hardware. Currently he likes playing around with new tools in the current ML scene, building, hopefully, useful systems for fun and, maybe, profit. When not behind an intelligent wannabe machine, he's doing analog music with his band of humans.
- SPOT - Spear-Phishing Overwatching Tool
Xavier Mertens is a freelance security consultant running his own company based in Belgium (Xameco). With 20+ years of experience in information security, Xavier finds “blue team” activities more attractive. Therefore, his day job focuses on protecting his customers' assets by providing services like incident handling, malware analysis, forensic investigations, log management, security visualization, and OSINT). Besides his day job, Xavier is also a Senior Handler at the SANS Internet Storm Center, Certified SANS Instructor (FOR610, FOR710), security blogger and co-organizer of the BruCON security conference.
- What You See Is (Not) What You Get
Yotam Perkal leads security research at Pluto Security, a next-generation AI security and governance platform designed to protect the rapidly emerging ecosystem of AI builders, low-code/no-code tools, and agentic applications. His work focuses on securing AI-native development environments and building scalable methods for detecting, validating, and mitigating risks in AI-driven software workflows.
Previously, Yotam led the Threat Research team at Zscaler, headed the Vulnerability Research team at Rezilion, and held multiple roles within PayPal’s security organization across vulnerability management, threat intelligence, and insider threat.
Yotam is an active participant in several cross-industry working groups dealing with AI security, vulnerability management, and supply chain security.
- Breaking the Control Plane: Exploiting MCP Servers in AI Workflows
cybersecurity enthusiast, author, speaker and mathematician. Author of popular books:
MD MZ Malware Development Book (Github, 2022, 2024)
MALWILD: Malware in the Wild Book (Github, 2023)
Malware Development for Ethical Hackers Book: (Packt, 2024)
AIYA Mobile Malware Development Book (Github, 2025)
Malware Development for Ethical Hackers 2nd edition (Packt, 2026, in progress)
Author and tech reviewer at Packt.
Co founder of various cybersecurity research labs, author of many cybersecurity blogs, HVCK magazine
Malpedia contributor
Speaker at BlackHat, DEFCON, Security BSides, Arab Security Conference, Hack.lu, Positive Hack Talks, etc conferences
- AI and Cryptography for Evasive Malware
- Malware Development for Ethical Hackers (Windows, Linux, Android)
Łukasz is a digital security trainer based at the ICRC Global Cyber Hub in Luxembourg. He has a background in politics, technology, and international relations. He is particularly interested in digital security pedagogies, selecting secure and sustainable digital tools, and effectively supporting at-risk groups and individuals.
- Digital risks, threat models, and empathy: trainings that empower