The speaker’s profile picture
Acey9

This person is too lazy to leave anything.

  • The Howl of Kimwolf Resonates Across 1.8 Million Android Devices Worldwide
The speaker’s profile picture
Albert Zsigovits

Albert is a senior malware researcher at VMRay. Initially, Albert honed his skills as an IDS/IPS analyst, meticulously analysing security events, before transitioning to the role of an incident responder for a Fortune 50 company. Then he embarked on his next challenge: malware analysis and threat research at a respected AV/EDR company. He discovered that detection engineering and signature development came just like a second language for him, so he continued investing in this area. He is also a former conference speaker at AVAR, BSidesBUD, BSidesVienna, DisobeyFi, Hacktivity, SEC-T and Virus Bulletin.

  • Decoding the Core: Inside Stories of Malware Configuration Extraction
The speaker’s profile picture
Alessandro Strino

Solid background in Penetration testing and modern malware analysis. His main research topics are threat intelligence and computer forensics. Nevertheless, he is passionate about binary exploitation, reverse engineering, and privilege escalation techniques. He now works as a principal malware analyst at Cleafy. He has spoken at Botconf 2023, Cert-EU 2023, BSides Cyprus 2023, FS-ISAC 2024, and Botconf 2025 as well as DEFCon 2025.

  • Advanced Android Malware Analysis: Defeating Obfuscation in the Real World
  • Broken by Design: Defeating APK Malformation at Scale in the MaaS Era
The speaker’s profile picture
Alex Turing

Alex Turing is a senior researcher at QI-ANXIN XLab, with deep expertise in kernel security and threat intelligence. He specializes in Linux platform threats, particularly the tracking of large-scale DDoS botnets. Over the years, he has led or contributed significantly to the discovery and in-depth analysis of several million-node botnets, including Mozi, Bigpanzi, Vo1d, and Kimwolf. His current research focuses on APTs, with a strong emphasis on uncovering campaigns and attack chains targeting Asia—especially China.

  • The Howl of Kimwolf Resonates Across 1.8 Million Android Devices Worldwide
The speaker’s profile picture
Alexey Bukhteyev

Alexey Bukhteyev is a security researcher at Check Point Software Technologies, driven by a long-standing interest in understanding how software systems work and how they fail under attack. With extensive experience in malware analysis and threat research, he focuses on uncovering new threats and developing effective defenses against malware and related attacks. His work spans malware analysis at scale, operating system security, and privacy-focused investigations, with a particular interest in applying generative AI to accelerate research workflows. Alexey has presented his work at security conferences including Virus Bulletin and BotConf.

  • Chasing XLoader: Tracking a Notoriously Complex Malware Family at Scale
The speaker’s profile picture
Ana Rita Castanheira

Ana Rita is a Threat Researcher at Bitsight, supported by a background in Cyber Threat Intelligence, OSINT and Incident Response. Much of her work revolved around identifying and understanding emerging threats, and helping entities and teams prepare for or mitigate them.
This background is now applied to her malware research, using the same investigative approach to better understand how threats develop and operate.

  • The Dangers of Calendar Subscriptions: A New Ecosystem Unveiled
The speaker’s profile picture
Andreas Petker

I have been working for several years as a Senior Analyst in the Cyber Threat Intelligence (CTI) department at Deutsche Telekom Security. In this role I am deeply involved in analyzing attack methods and profiling threat actors. A particular focus of my work is the investigation of botnet structures—especially those associated with so called residential proxies, VPN providers, and ORB networks.

  • When One Botnet Leads to Another: Pivoting from Quad7-like Activity to Unknown Proxy Networks on Embedded Devices
The speaker’s profile picture
Bar Matalon

Bar Matalon is the Threat Intelligence Team Lead at Palo Alto Networks’ Cortex research department, and has over a decade of experience in cyber intelligence research. Bar has worked as a threat intelligence researcher in several international companies, including Novartis Pharmaceuticals and Intel Corporation.

  • Thinking Outside the Package: Hunting Supply Chain Behavior from the Endpoint Perspective
The speaker’s profile picture
Charlie Cullen

Charlie is employed as a principal intelligence analyst with CrowdStrike’s Intelligence Analysis Cell and focuses on macOS malware, ransomware operators, and cryptocurrency analysis. He previously worked at TRM Labs, Dataminr, and AECOM and has presented at Fal.Con 2019 and 2020, BSides Atlanta 2020, BotConf 2022, and Disruption 2024. He is proficient in Arabic, Farsi, Russian, Spanish, and French.

  • iMac-ulate Conception: The Birth of the macOS Stealer Ecosystem
The speaker’s profile picture
Chetan Raghuprasad

Chetan Raghuprasad is a cyber threat researcher with the Cisco Talos, focusing on hunting and researching the latest threats in the cyber threat landscape and generating actionable intelligence. He seeks to uncover threat actors’ tactics, techniques, and procedures by reversing and analyzing the threats. Chetan also publicly represents Cisco Talos by writing blogs and talking at cybersecurity conferences worldwide.
Chetan Raghuprasad has 16 years of professional experience with expertise in Threat research and Malware analysis, cyber incident response, and digital forensic analysis. He has worked in technology, consulting, and financial institutions. He is a CISSP-certified and SANS-certified Digital Forensic Examiner, Malware Reverse Engineer and Cyber Threat Intelligence researcher.

  • Masks, Monsters, and Drivers: Unpacking the Deception of Chaos, Kraken, and DeadLock
The speaker’s profile picture
Damien Schaeffer

Damien works as a Senior Malware Researcher at ESET, where he has specialized in targeted attack research. With a primary focus on APT, his main duties include hunting and reverse engineering of the latest threats. As a background, he holds an M.Sc. in Computer Science and previously worked in incident response, cyber threat intelligence, and malware analysis.

  • FrostyNeighbor’s playbook: How phishing and malware drive long-term espionage in Europe
The speaker’s profile picture
Eric Howard

Eric Howard is a new team member of the ESET Research team in Montreal, Canada. Growing up, computers and technology have always been his passion that he shared with his brother, leading him to pursue Software Development. After a few years as a developer in the financial sector working within the fraud and financial crime team, his love for cybersecurity was realized, beginning the long journey of independent study. Eventually, Eric became part of a Cyber Threat Intelligence team within the telecom sector where he spent four years building on his skills. Now, Eric spends time on his interests, tracking China-aligned APT groups, reversing malware, and working with Rust.

  • Meet GopherWhisper: Uncovering an APT’s secrets through its own words
The speaker’s profile picture
Fabian Marquardt

Fabian is a Threat Intelligence Analyst at Deutsche Telekom Security with a focus on Cybercrime. He has multiple years of experience in tracking threat actors, malware analysis, threat hunting and similar activities. He has spoken at multiple international Cybersecurity conferences and has a strong background in computer networks and IT security research due to his former role as a researcher at the University of Bonn. He enjoys exchanging ideas with other analysts and is constantly striving to expand his network in order to better respond to cyber threats.

  • When One Botnet Leads to Another: Pivoting from Quad7-like Activity to Unknown Proxy Networks on Embedded Devices
  • Izanagi RAT: Discovery and Analysis of a Cross-Platform, Long-Lived Go Backdoor
The speaker’s profile picture
Federico Valentini

Federico is passionate about technology in general, with a deep interest in cybersecurity, particularly Penetration Testing, Malware Analysis, and Social Engineering. He's currently leading the Threat Intelligence Team and Incident Response at Cleafy. He oversees all activities related to monitoring and uncovering new threats and attack patterns used by malicious actors. He has spoken at HackInBO 2022, Botconf 2023, Cert-EU 2023, BSides Cyprus 2023, FS-ISAC 2024, Botconf 2025, DEFCON33 and other private events managed by CertFIN in the Italian territory.

  • Advanced Android Malware Analysis: Defeating Obfuscation in the Real World
  • Broken by Design: Defeating APK Malformation at Scale in the MaaS Era
The speaker’s profile picture
Grégoire Clermont

Grégoire Clermont is a Security Engineer at Sekoia.io. Over the past two years, he has researched the Adversary-in-the-Middle phishing ecosystem, developing detection strategies with a focus on Microsoft Entra ID environments, and tracking PhaaS infrastructure. He has contributed to several Sekoia publications on AitM phishing kits, including Sneaky 2FA and Mamba 2FA.

  • Exploring the AitM Phishing Ecosystem: From Kit Hunting to Operator Profiling
The speaker’s profile picture
Hideyuki Furukawa

FURUKAWA Hideyuki is a malware analyst in the Analysis Team at the Cybersecurity Research Laboratory of National Institute of Information and Communications Technology (NICT) with 18 years of experience in binary code analysis for microcontrollers at a leading semiconductor company. His expertise spans reverse engineering and embedded systems software.

  • Tracking the Next Botnets after the RapperBot’s PowerOFF
The speaker’s profile picture
Hiroshi Takeuchi

Hiroshi Takeuchi is a security researcher with over 10 years of experience in the industry. His main responsibilities are reverse engineering and incident response within MACNICA, a security service company for the Asia Pacific and Middle East regions. In between his day job, he has developed internal tools such as an intelligence platform, honey network, and Python scripts to support analysis. He writes blog posts and private & public technical reports, and has spoken at a number of security conferences including Virus Bulletin, CONFidence, HITCON and JSAC.

  • Dissecting Evil Twin RATs: Tracking the Long-Term Use of TA410's FlowCloud Toolset
The speaker’s profile picture
Jaromir Horejsi
  • From Mods to Malware: Dissecting Minecraft Stealer Campaigns
The speaker’s profile picture
Joao Santos

Joao Santos is a distinguished lead investigator at Human Security on the Satori team. With over a decade of specialized experience in security, he has mastered roles from reverse engineering to penetration testing and sysadmin. His impressive track record extends to conducting threat research and audits for prominent enterprises and government entities in vital areas like passports and citizen IDs. Driven by his dedication to cybersecurity, Joao tirelessly shields individuals and organizations from potential cyber threats. A recognized voice in the community, he frequently shares his insights at information security conferences, championing a safer digital landscape for all.

  • When Your CTV Box Goes Rogue: How Millions Were Tricked Into Aiding a Global Cybercrime Operation
The speaker’s profile picture
João Godinho
  • Following RondoDox's Breadcrumbs
The speaker’s profile picture
Kyle Cucci

Kyle Cucci is a malware analyst and detection engineer with Proofpoint’s Threat Research team. Previously, he led the forensic investigations and malware research teams at a large global bank. Kyle is the author of the book “Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats” and is a regular speaker at conferences worldwide, speaking on topics like malware analysis, offensive security, and security engineering. In his free time, Kyle enjoys contributing to the community via open source tooling, research, and blogging.

  • For Educational Purposes Mostly: Tracking the Stealerium and PhantomStealer Ecosystem
The speaker’s profile picture
Lindsay Kaye

Lindsay Kaye is the Vice President of Threat Intelligence at HUMAN Security. Her technical specialty spans the fields of malware analysis and reverse engineering, with a keen interest in dissecting custom cryptographic systems. Lindsay is an internationally-recognized cybersecurity speaker and author. She is the author of the book Dissecting the Dark Web, to be published by No Starch Press in February 2026. Lindsay holds a BS in Engineering with a Concentration in Computing from Olin College of Engineering and an MBA from Babson College.

  • When Your CTV Box Goes Rogue: How Millions Were Tricked Into Aiding a Global Cybercrime Operation
The speaker’s profile picture
Maarten Weyns

After obtaining his MSc degree in January of 2025, Maarten continues his research into DDoS botnets in a PhD position in the Cyber Security group at the Delft University of Technology. The research covers several topics, including malware analysis, monitoring live botnet activity, analyzing attack targets and investigating used attack tactics. The research is performed under the supervision of Prof. Dr. Georgios Smaragdakis and Dr. Harm Griffioen.

Maarten is a published author at USENIX and presented his work at several conferences, including Botconf and OneConference.

  • Flexing Your Botnet: Investigating Power Proofs in the DDoS-for-Hire Market
The speaker’s profile picture
Maddie Stewart

Maddie graduated from Tufts University with Bachelor's degrees in International Relations and Spanish. She previously worked for CrowdStrike's Intelligence Analysis Cell's Latin America mission and conducted research in Spanish and Portuguese.

Currently, Maddie is employed as a senior intelligence analyst with CrowdStrike's Global Threat Analysis Cell where she focuses on enabling and commodity eCrime threats. She previously presented at Fal.Con, OBTS, and SleuthCon on the macOS information stealer ecosystem.

  • iMac-ulate Conception: The Birth of the macOS Stealer Ecosystem
The speaker’s profile picture
Max 'Libra' Kersten

Max Kersten is a senior malware analyst, blogger, and speaker who aims to make malware analysis more approachable for those who are starting. In 2019, Max graduated cum laude with a bachelor's in IT & Cyber Security, during which Max also worked as an Android malware analyst. He then worked at Trellix in the Advanced Research Center, where he dove into APT malware and campaigns. Currently, Max works as an analyst at Politie (Dutch law enforcement). Over the past few years, Max spoke at international conferences, such as DEFCON, Black Hat (USA, EU, MEA, Asia), Botconf, Confidence-Conference, HackYeahPL, and HackFestCA. Additionally, he gave guest lectures and workshops for DEFCON, Botconf, several universities, and private entities.

  • Malware symbol recovery with Ghidra using Golang examples
The speaker’s profile picture
Michele Roviello

Cybersecurity professional with experience in malware analysis and threat intelligence. I’m specialized in reverse engineering Windows and Android malware, gaining deep insights into malicious operations and behaviors. Currently, I am a Malware Analyst at Cleafy, focusing on analyzing and mitigating emerging mobile cyber threats.

  • Advanced Android Malware Analysis: Defeating Obfuscation in the Real World
  • Broken by Design: Defeating APK Malformation at Scale in the MaaS Era
The speaker’s profile picture
Murtuza Ali

I am a Ph.D. candidate in the Cybersecurity (CYS) research group at TU Delft, working under the supervision of Professor Georgios Smaragdakis and Professor Harm Griffioen. I will be working on a broad spectrum of cybersecurity topics, including:

Network Security
Internet Measurement
Malware Analysis
Cyber Threat Intelligence (CTI)

My primary focus involves leveraging TU Delft’s Network Telescopes and Honeypots to understand internet wide scanning activities and their implications on our cybersecurity.

Prior to my doctoral studies, I completed my Master’s degree in Computer Science at TU Delft, specializing in Cybersecurity. My master’s thesis examined the proliferation of Mirai botnets and their variants, laying the groundwork for my current research interests.

  • No Honor Among Pirates: Investigating Malware in Pirated Media
The speaker’s profile picture
Nicolas Collery

Nicolas Collery has been in the security field for over 20 years, focusing on fighting cybercrime.
Passionate about forensics, malware analysis, and now simulating attacks focusing on
real-adversaries’ tactics, techniques and procedure to assess the capability to prevent, detect
and respond.
He has presented at multiple conferences and security events in Singapore featuring various
applications of remote forensic toolkits, including bypass of proprietary full disk encryption, cloud
forensics and more.Nicolas now leads the active defence services at DBS Bank headquartered Singapore which
comprises the threat intelligence, penetration testing, vulnerability assessment and red & purple
teaming practices. He is a primary incident responder for DBS Computer Emergency Response
Team (DBSCERT).
Nicolas also leads application security in DBS to maintain the high standards expected by its
customers. The focus of his team is to empower the bank to release applications at a fast pace
and using modern technologies, while ensuring security.

  • Inside Apple Silicon: Practical Live Forensics on Modern Macs
The speaker’s profile picture
Noa Dekel
  • Thinking Outside the Package: Hunting Supply Chain Behavior from the Endpoint Perspective
The speaker’s profile picture
Paul Jung

Paul is a long-time security professional with over two decades of experience in the cybersecurity field in Luxembourg. He has built extensive consulting expertise across multiple industries, covering activities from offensive security assessments to incident response and digital forensics. Prior to joining the Computer Incident Response Center Luxembourg (CIRCL), he served as Senior Security Architect in the Managed Network Security department of the European Commission, where he led the technical direction of major security projects. He later joined Excellium Services (acquired by Thales Group in 2022), where he founded and led TCS-CERT, a multi-country CSIRT dedicated to intrusion response. Paul regularly speaks at international conferences such as FIRST, Virus Bulletin, Botconf, and Hack.lu, and has published articles on DDoS, botnets, and incident response. He is a native French speaker and fluent in English.

  • Finding Meaning in /dev/null
The speaker’s profile picture
Pedro Falé

Pedro Falé is a Threat Researcher at Bitsight, specializing in tracking botnets and researching malware tactics & Techniques. Pedro currently is looking to leverage adversary understanding to improve his role. Before joining Bitsight Pedro worked with some of the best CSIRT's in Portugal, providing xSOAR, EDR and Threat Intelligence knowledge.
He mostly enjoys finding flaws in threat actor operations and studying edge-cases.

  • The Dangers of Calendar Subscriptions: A New Ecosystem Unveiled
The speaker’s profile picture
Peter Manev

Peter Manev is member of the executive team at Open Network Security Foundation (OISF) and Suricata Project Evangelist. Peter has over 20 years of experience in the IT industry, including enterprise-level IT security practice. He is a passionate user, developer, and explorer of innovative open-source security software. He is responsible for training as well as quality assurance and testing on the development team of Suricata – the open-source threat detection engine. Peter has been involved with Suricata IDS/IPS/NSM from its very early days in 2009 as QA and training lead.

Peter is also one of the lead developers of SELKS / ClearNDR Community, the popular turnkey open-source based implementation of Suricata IDS/IPS/NSM. Peter is a regular speaker and educator on open-source security, threat hunting, and network security.

Peter Manev is a co-author of The Security Analyst’s Guide to Suricata book written with Eric Leblond.

Additionally, Peter is the co-founder and chief strategy officer (CSO) of Stamus Networks, a company providing commercial and open-source network detection and response solutions based on Suricata. Peter often engages in private or public training events in the area of advanced deployment and threat hunting at conferences, workshops or live-fire cyber exercises such as Crossed Swords, Locked Shields, DeepSec, Troopers, DefCon, Suricon, SharkFest, RSA, Flocon, MIT Lincoln Lab and others.

  • Threat detection engineering with Suricata
The speaker’s profile picture
Quentin Bourgue

Quentin Bourgue is a senior threat researcher in the Threat Detection & Research (TDR) at Sekoia.io. He co-leads the Cyber Threat Intelligence (CTI) team, which investigates financially motivated threats. His responsibilities include researching emerging cyber threats, tracking adversary infrastructure, analysing malware distribution campaigns, and writing and presenting technical reports.

  • Exploring the AitM Phishing Ecosystem: From Kit Hunting to Operator Profiling
The speaker’s profile picture
Rachael Liao

Rachael is a anti-virus analyst at Fortinet, specializing in threat intelligence and malware analysis, with a focus on identifying phishing campaigns and analyzing attacker infrastructure.

  • Malicious Blind Pack: Uncovering all RAT Tools in Silver Fox campaign
The speaker’s profile picture
Souhail Hammou

Souhail Hammou is a reverse engineer and vulnerability researcher with a background in software engineering. Currently serving as a principal reverse engineer with the Intel 471 Malware Intelligence team, he specializes in analyzing emerging threats, maintaining malware tracking systems and conducting in-depth research. Souhail presented research on malware reversing and tracking at previous editions of Botconf as well as in other international conferences.

  • Chasing XLoader: Tracking a Notoriously Complex Malware Family at Scale
The speaker’s profile picture
Stephan Berger

Stephan Berger has over a decade of experience in cybersecurity. Currently working with the Swiss-based company InfoGuard, Stephan investigates breaches and hacked networks as Head of Investigation of the Incident Response team.

An avid Twitter user under the handle @malmoeb, he actively shares insights on cybersecurity trends and developments. Stephan also authors the blog DFIR.ch, where he provides in-depth analysis and commentary on digital forensics and incident response.

Stephan has spoken at numerous conferences, sharing his expertise with audiences worldwide.

  • Tomb Raider - In Search of the Lost Signatures
The speaker’s profile picture
Sven Rath

Sven Rath researches the cybercrime ecosystem at Check Point Research. In his spare time, he works on topics such as reverse engineering, malware and windows kernel rootkits and blogs about them at https://eversinc33.com

  • Defeating Node.js Malware through API Tracing
The speaker’s profile picture
Vikas Parthasarathy

Vikas P is a Staff Investigator at HUMAN Security, specializing in ad fraud research, botnet analysis, and large-scale threat mitigation. With more than a decade of experience in the field, he has led the discovery of major botnet operations including VASTFLUX, BADBOX, and PEACHPIT. Formerly a Vulnerability Researcher at iSIGHT Partners, Vikas now focuses on developing advanced investigation platforms and detection signatures to automate the identification of emerging cyber risks and fraudulent automated traffic.

  • When Your CTV Box Goes Rogue: How Millions Were Tricked Into Aiding a Global Cybercrime Operation
The speaker’s profile picture
Vitaly Kamluk

Vitaly Kamluk is a cybersecurity researcher based in Singapore with over 20 years of
experience. Previously, as a Principal Security Researcher, he used to lead a cyber threat
intelligence unit focusing on targeted attack investigations. In 2014-2016, Vitaly worked at
INTERPOL Digital Forensics Lab as a cybersecurity expert. Vitaly participates in infosec
mentorship initiatives, volunteers to deliver free talks for the next generation of researchers, he
is one of Black Hat speaker coaches. Over the years, he conducted research on various
subjects and presented at many conferences including events such as Black Hat, DEF CON,
Hitcon, BSides, Ruxcon, Sincon, FIRST, Botconf.
Vitaly runs TitanHex, a cybersecurity startup in Singapore. He also is an advisor to TLPBLACK
and a researcher with SentinelLABS. He is passionate about a broad set of cybersecurity topics
including reverse engineering, malware analysis, cyberthreat intelligence, computer forensics,
cryptography, privacy, hardware hacking.

  • Inside Apple Silicon: Practical Live Forensics on Modern Macs
The speaker’s profile picture
Wang Hao
  • The Howl of Kimwolf Resonates Across 1.8 Million Android Devices Worldwide
The speaker’s profile picture
Yi Ping (Cara) Lin

Manager AntiVirus Anlysis, Fortinet FortiGuard Labs

  • Malicious Blind Pack: Uncovering all RAT Tools in Silver Fox campaign
The speaker’s profile picture
Éric Leblond

Eric Leblond is a cybersecurity professional and open-source developer focused on network threat detection. He is the co-founder and Chief Technology Officer (CTO) of Stamus Networks, a company that provides Network Detection and Response (NDR) solutions.

In the open-source security space, Eric Leblond is a core developer of Suricata, an intrusion detection and prevention system (IDS/IPS). His work on the project centers around network visibility and alert context. He also serves on the board of directors for the Open Information Security Foundation (OISF), the non-profit organization behind Suricata.

Additionally, Eric Leblond is an emeritus member of the Netfilter Core Team, where his work involved kernel and user-space interactions. Over the course of his career, he has authored technical articles, co-created the SELKS security distribution, and presented on threat detection methodologies at industry conferences.

  • Threat detection engineering with Suricata