Hacktivity 2025: The CEE Region’s Premier IT Security Festival Returns and Announcing Speakers

<Updated_28.07.2025/>

📍 Budapest, 3 October 2025 – Hacktivity, Central and Eastern Europe’s longest-running and most influential IT security event, is back with a powerhouse lineup of 33 expert speakers from 14 countries from Latvia to India through Hungary, the UK, UAE, Israel and many more. Known for blending cutting-edge research with hands-on hacking, Hacktivity 2025 will once again unite professionals, hobbyists, and students from across the cybersecurity landscape.

This year’s program explores the most pressing challenges and emerging trends in cybersecurity, spanning both offensive and defensive domains. Topics range from operating system internals, cloud infrastructure, and application security to advanced persistent threats, social engineering, and forensic analysis. Attendees will also gain insight into the growing role of AI in cybersecurity, the nuances of hardware-level attacks, and the importance of securing the software supply chain.

With a strong focus on real-world threats, practical tools, and future-facing solutions, the event covers themes such as:

  • Reverse engineering and malware analysis
  • Red teaming, privilege escalation, and bypass techniques
  • Cloud and container security (including AWS and Google Cloud)
  • Adversarial machine learning and AI misuse
  • Linux kernel and system-level hardening
  • Insider threat detection, behavioral analytics, and UEBA
  • Satellite and maritime OSINT
  • Authentication, cryptography, and multi-factor security
  • Resilient backup strategies and ransomware defense
  • Automotive and embedded system security

Participants can expect:

🎤 Presentations from IT security researchers, professionals, and hackers
🛠️ Hands-on workshops to build practical skills
🎯 Live hackathon competition testing creativity and collaboration
🧩 Interactive puzzles and challenges in the Hacker Space
🤝 A vibrant, international community with open knowledge-sharing at its core

List of speakers and presentations:

Speaker Name

Presentation Title

Roland Nagy

How to find rootkits in the Linux kernel

Gábor Fuchs

Targeted Attacks on the TLSH Similarity Digest Scheme

Balázs Gerlei

Don’t let attackers exploit your Android app via Intents

Bianka Bálint

Demystifying Internal Threat Intelligence

Aurelio Picon Lopez

At Home with the Enemy: How APTs Weaponize IoT Devices as Residential Proxies

Shubham Kumar, Sagar Tiwari

Dark Ships & Transparent Seas: Tracking Vessels with Open-Source Intelligence

Shahmeer Amir

Hack the Sky: Exploring Satellite Vulnerabilities and Cyber Threats

Craig Balding

Pair Programming with Aider to Create High-Performance Web Security Tools (WS)

Ignat Korchagin

What is Linux kernel keystore and why you should use it in your next application

Marta Janus

AI Security Landscape: Tales and Techniques from the Frontlines

Chen Shiri

How I took over two platforms of Google including Google Cloud, Google Collaboratory and Used It on Gemini AI

Santi Abastante

Practical AWS Antiforensics

Gábor Arányi

Challenges while developing a ransomware-proof backup solution 

Dr. Matthias Kesenheimer

Your SoC implements a glitch detector? Hold my beer!

Sean Hopkins

Full Stack Red Team: From Code to Hardware

Dániel Markovics & János Kovács & Dominik Maksa

Where the treasure is – Security Scanning the DICOM stack of Medical IT environments

Ananda Krishna SV &Anand Sreekumar

Ghost Math: Syscall-Only Injection, Deterministic Shellcode & QUIC C2 — A Full Kill-Chain that Slipped Past CrowdStrike Falcon

Vikas Khanna

Unlocking the Gates – Understanding Authentication Bypass Vulnerabilities

Giorgio Perticone

Crafting effective Security Operations tactics: Deep Dive Forensics VS Rapid Response

Konrad Jędrzejczyk&Marek Zmyslowski

AI in Adversarial Hands: Masterminds and Machines

Vincenzo Santucci

Revamping Reflection: Enhancing the Timeless Concept of Reflective Loading

Szilárd Pfeiffer

TOTP is not a silver bullet

József Ottucsák

The Big Software Supply Chain Security Problem

Tobias Schrödel

Real RansomChats

Thomas Fischer 

Masterclass connecting your car (WS)

William Robinet

In bed with Qubes OS – tips & tricks exchange party (WS)

Kirils Solovjovs

So you’re interested in social engineering? The very first steps (WS)

Whether you’re interested in defending infrastructure, breaking into systems (legally), or exploring how AI is reshaping the threat landscape, Hacktivity 2025 offers a unique space to learn, connect, and challenge yourself

Only just a few more days to save your seat and buy your ticket with an Early Bird discount!

Similar Posts