Hacktivity 2025: The CEE Region’s Premier IT Security Festival Returns and Announcing Speakers
<Updated_28.07.2025/>
📍 Budapest, 3 October 2025 – Hacktivity, Central and Eastern Europe’s longest-running and most influential IT security event, is back with a powerhouse lineup of 33 expert speakers from 14 countries from Latvia to India through Hungary, the UK, UAE, Israel and many more. Known for blending cutting-edge research with hands-on hacking, Hacktivity 2025 will once again unite professionals, hobbyists, and students from across the cybersecurity landscape.
This year’s program explores the most pressing challenges and emerging trends in cybersecurity, spanning both offensive and defensive domains. Topics range from operating system internals, cloud infrastructure, and application security to advanced persistent threats, social engineering, and forensic analysis. Attendees will also gain insight into the growing role of AI in cybersecurity, the nuances of hardware-level attacks, and the importance of securing the software supply chain.

With a strong focus on real-world threats, practical tools, and future-facing solutions, the event covers themes such as:
Participants can expect:
🎤 Presentations from IT security researchers, professionals, and hackers
🛠️ Hands-on workshops to build practical skills
🎯 Live hackathon competition testing creativity and collaboration
🧩 Interactive puzzles and challenges in the Hacker Space
🤝 A vibrant, international community with open knowledge-sharing at its core
List of speakers and presentations:
Speaker Name 6633_f9d1cf-75> |
Presentation Title 6633_733c57-1c> |
---|---|
Roland Nagy 6633_4802ca-34> |
How to find rootkits in the Linux kernel 6633_ff0f5e-bc> |
Gábor Fuchs 6633_387707-4d> |
Targeted Attacks on the TLSH Similarity Digest Scheme |
Balázs Gerlei 6633_6e853b-c0> |
Don’t let attackers exploit your Android app via Intents |
Bianka Bálint 6633_fd3f03-9d> |
Demystifying Internal Threat Intelligence 6633_8b16f3-7f> |
Aurelio Picon Lopez 6633_28ba88-6c> |
At Home with the Enemy: How APTs Weaponize IoT Devices as Residential Proxies 6633_52365e-22> |
Shubham Kumar, Sagar Tiwari 6633_0d4ddc-88> |
Dark Ships & Transparent Seas: Tracking Vessels with Open-Source Intelligence 6633_beb9e6-af> |
Shahmeer Amir 6633_519893-1b> |
Hack the Sky: Exploring Satellite Vulnerabilities and Cyber Threats 6633_35189b-da> |
Craig Balding 6633_c8a816-16> |
Pair Programming with Aider to Create High-Performance Web Security Tools (WS) 6633_9e51c1-2d> |
Ignat Korchagin 6633_63d6fa-0b> |
What is Linux kernel keystore and why you should use it in your next application 6633_737855-78> |
Marta Janus 6633_3acaab-4d> |
AI Security Landscape: Tales and Techniques from the Frontlines 6633_318ba9-d3> |
Chen Shiri 6633_799de7-51> |
How I took over two platforms of Google including Google Cloud, Google Collaboratory and Used It on Gemini AI 6633_68ab9e-61> |
Santi Abastante 6633_d9b4dc-ac> |
Practical AWS Antiforensics 6633_2a624c-07> |
Gábor Arányi 6633_2a2ba3-0f> |
Challenges while developing a ransomware-proof backup solution 6633_fd1860-f1> |
Dr. Matthias Kesenheimer 6633_a9f7e7-ac> |
Your SoC implements a glitch detector? Hold my beer! 6633_5c6c92-ec> |
Sean Hopkins 6633_f644bd-84> |
Full Stack Red Team: From Code to Hardware 6633_b21057-a2> |
Dániel Markovics & János Kovács & Dominik Maksa 6633_2cdcc6-29> |
Where the treasure is – Security Scanning the DICOM stack of Medical IT environments 6633_71a3de-7a> |
Ananda Krishna SV &Anand Sreekumar 6633_c752fd-66> |
Ghost Math: Syscall-Only Injection, Deterministic Shellcode & QUIC C2 — A Full Kill-Chain that Slipped Past CrowdStrike Falcon 6633_024ae9-7f> |
Vikas Khanna 6633_dfd179-42> |
Unlocking the Gates – Understanding Authentication Bypass Vulnerabilities 6633_263dba-41> |
Giorgio Perticone 6633_b8ac68-76> |
Crafting effective Security Operations tactics: Deep Dive Forensics VS Rapid Response 6633_d960b8-c4> |
Konrad Jędrzejczyk&Marek Zmyslowski 6633_7770d2-80> |
AI in Adversarial Hands: Masterminds and Machines 6633_e6cf36-5c> |
Vincenzo Santucci 6633_35a67f-8d> |
Revamping Reflection: Enhancing the Timeless Concept of Reflective Loading 6633_e55f31-56> |
Szilárd Pfeiffer 6633_5c4fdf-ec> |
TOTP is not a silver bullet 6633_306ce7-5a> |
József Ottucsák 6633_f116be-04> |
The Big Software Supply Chain Security Problem 6633_920379-3c> |
Tobias Schrödel 6633_22a9af-0c> |
Real RansomChats 6633_109808-20> |
Thomas Fischer 6633_d3e84c-d5> |
Masterclass connecting your car (WS) 6633_4ea441-8f> |
William Robinet 6633_2b57ee-3d> |
In bed with Qubes OS – tips & tricks exchange party (WS) 6633_b28753-ce> |
Kirils Solovjovs 6633_7c5677-4f> |
So you’re interested in social engineering? The very first steps (WS) 6633_20dd37-d1> |
Whether you’re interested in defending infrastructure, breaking into systems (legally), or exploring how AI is reshaping the threat landscape, Hacktivity 2025 offers a unique space to learn, connect, and challenge yourself.
Only just a few more days to save your seat and buy your ticket with an Early Bird discount!