OPSWAT's commitment to advancing cybersecurity takes the global stage as two of our leading threat detection analysts, Daniel Ruiz A and Roland Győrffi from the MetaDefender Sandbox Team, present groundbreaking research at HackBCN and BSides Budapest.
Follow their journey across Europe which highlights the dedication involved, encompassing rigorous reverse engineering, compelling technical storytelling, and engaging deep-dive discussions with the cybersecurity community.
Meet the Speakers
Daniel Ruiz A
Operating from Spain, Daniel, is a Malware Analyst who is passionate about reverse engineering and dedicated threat research. Previous threat research has uncovered adversaries that prey on other adversaries - yes, attackers targeting other attackers.
Roland Győrffi
Hailing from Hungary, Roland is another powerhouse within the team, blending his background in game development with professional malware reverse engineering. Roland focuses on how sophisticated malware hides inside legitimate software packages - especially for MSI installers.
Arrivals, First Impressions, and Pre-Conference Connections
May 16 – HackBCN, Barcelona
Dani arrived in the vibrant city of Barcelona for HackBCN - a grassroots conference held in a lively cinema. More than just a venue, it was a space buzzing with youthful energy and cutting-edge discussion. Daniel’s connections ran deep here - sharing malware insights with known malware researchers like Sergi Álvarez (author of Radare2) and Marc Rivero (Kaspersky).
May 21 – BSides BUD, Budapest
Kicking off their Budapest engagement, Roland and Dani participated in an invite-only pre-conference event. Held at Cyber Islands, a unique venue transformed by IVSZ and Hacktivity, the evening fostered valuable connections among cybersecurity speakers and practitioners. This gathering facilitated networking among speakers and cybersecurity experts, featuring engaging quizzes and local refreshments, setting a collaborative tone before the main conference sessions.
Hacking the Spotlight: Technical Talks That Hit Hard
Roland’s Talk: Beyond Extraction – Dissecting Malicious MSI Files
At BSides Budapest, Roland walked the audience through the deceptive potential of Microsoft Installer (MSI) files. Using his open-source tool msiparse, he demonstrated how malware authors embed payloads and scripts deep within installer files - bypassing traditional defenses. He showcased real-world samples and practical analysis techniques, leaving attendees with both insights and tools.
Daniel’s Talk: Uncovering the Attacker of Attackers
In both Barcelona and Budapest, Daniel exposed a wild story from the malware underground: how threat actors distributing the XWorm malware were themselves being infected by a trojanized builder containing Millenium RAT. A case of predators becoming prey because of OPSEC failures. The talk followed the investigative path from underground forums to Telegram C2 servers - unveiling hundreds of infected threat actors.
Behind the Scenes: Notes from the Field
It wasn’t about marketing or promoting our products—it was about knowledge sharing. The fact that we could connect with peers, bounce ideas, and exchange stories over food and late-night talks was equally as valuable as the presentations themselves. It was a privilege to meet such great professionals.
Daniel Ruiz ASenior Malware Analyst at OPSWAT - MetaDefender Sandbox Team
Conferences like these aren’t just stages. They’re think tanks to explore the latest threat intel. You learn as much from hallway chats as you do from slides.
Roland GyőrffiMalware Analyst at OPSWAT - MetaDefender Sandbox Team
A major highlight was the post-conference roundtable, where Roland and Daniel sat down with fellow speakers and a Hungarian government cybersecurity official to discuss national threat trends and cross-border collaboration.
Travel Snaps & Conference Clips
From train rides through Hungary to neon-lit auditoriums in Spain, their journey was dotted with great moments. Favorite snapshots included:

BSidesBUD Panel Highlights with Trusted Industry Voices

Roland walking attendees through malware code mid-presentation (yes, with live demos!)

Malware Masters & Peers: CTF Showdown at BSidesBUD

From Malware to Metal: Our Threat Analysts Tackle Real-World Lock-Picking
Final Reflections
These trips weren’t just speaking gigs—they were testaments to OPSWAT’s vision in action. Sharing original malware research, learning from peers, and amplifying the voices of technical experts is what pushes the industry forward.
One word that summed it up for both analysts? “Research.”
Because in the end, that’s what fuels cybersecurity innovation, community, and defense.