AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

From the Front Lines to the Forum: OPSWAT Threat Analysts Present at BSides BUD

Experience OPSWAT's cutting-edge malware research as our threat analysts present their findings and connect directly with the global cybersecurity community.
by OPSWAT Threat Research Team 
Share this Post

OPSWAT's commitment to advancing cybersecurity takes the global stage as two of our leading threat detection analysts, Daniel Ruiz A and Roland Győrffi from the MetaDefender Sandbox Team, present groundbreaking research at HackBCN and BSides Budapest.



Follow their journey across Europe which highlights the dedication involved, encompassing rigorous reverse engineering, compelling technical storytelling, and engaging deep-dive discussions with the cybersecurity community.

Meet the Speakers 

MetaDefender Sandbox Team presents groundbreaking research; two OPSWAT analysts speak at a conference podium

Daniel Ruiz A

Operating from Spain, Daniel, is a Malware Analyst who is passionate about reverse engineering and dedicated threat research. Previous threat research has uncovered adversaries that prey on other adversaries - yes, attackers targeting other attackers.

Roland Győrffi

Hailing from Hungary, Roland is another powerhouse within the team, blending his background in game development with professional malware reverse engineering. Roland focuses on how sophisticated malware hides inside legitimate software packages - especially for MSI installers.

Arrivals, First Impressions, and Pre-Conference Connections

May 16 – HackBCN, Barcelona

MetaDefender Sandbox Team presents groundbreaking research at HackBCN, showing a speaker and audience in a dark auditorium

Dani arrived in the vibrant city of Barcelona for HackBCN - a grassroots conference held in a lively cinema. More than just a venue, it was a space buzzing with youthful energy and cutting-edge discussion. Daniel’s connections ran deep here - sharing malware insights with known malware researchers like Sergi Álvarez (author of Radare2) and Marc Rivero (Kaspersky). 

May 21 – BSides BUD, Budapest

MetaDefender Sandbox Team presents groundbreaking research to a group viewing a large screen with data in Budapest

Kicking off their Budapest engagement, Roland and Dani participated in an invite-only pre-conference event. Held at Cyber Islands, a unique venue transformed by IVSZ and Hacktivity, the evening fostered valuable connections among cybersecurity speakers and practitioners. This gathering facilitated networking among speakers and cybersecurity experts, featuring engaging quizzes and local refreshments, setting a collaborative tone before the main conference sessions.

Hacking the Spotlight: Technical Talks That Hit Hard 

Roland’s Talk: Beyond Extraction – Dissecting Malicious MSI Files

MetaDefender Sandbox Team presents groundbreaking research on dissecting malicious MSI files at a conference talk

At BSides Budapest, Roland walked the audience through the deceptive potential of Microsoft Installer (MSI) files. Using his open-source tool msiparse, he demonstrated how malware authors embed payloads and scripts deep within installer files - bypassing traditional defenses. He showcased real-world samples and practical analysis techniques, leaving attendees with both insights and tools.

Daniel’s Talk: Uncovering the Attacker of Attackers

MetaDefender Sandbox Team presents groundbreaking research on XWorm RAT at a cybersecurity conference

In both Barcelona and Budapest, Daniel exposed a wild story from the malware underground: how threat actors distributing the XWorm malware were themselves being infected by a trojanized builder containing Millenium RAT. A case of predators becoming prey because of OPSEC failures. The talk followed the investigative path from underground forums to Telegram C2 servers - unveiling hundreds of infected threat actors.

Behind the Scenes: Notes from the Field 

icon quote

It wasn’t about marketing or promoting our products—it was about knowledge sharing. The fact that we could connect with peers, bounce ideas, and exchange stories over food and late-night talks was equally as valuable as the presentations themselves. It was a privilege to meet such great professionals.

Daniel Ruiz A
Senior Malware Analyst at OPSWAT - MetaDefender Sandbox Team
icon quote

Conferences like these aren’t just stages. They’re think tanks to explore the latest threat intel. You learn as much from hallway chats as you do from slides.

Roland Győrffi
Malware Analyst at OPSWAT - MetaDefender Sandbox Team

A major highlight was the post-conference roundtable, where Roland and Daniel sat down with fellow speakers and a Hungarian government cybersecurity official to discuss national threat trends and cross-border collaboration. 

Travel Snaps & Conference Clips 

From train rides through Hungary to neon-lit auditoriums in Spain, their journey was dotted with great moments. Favorite snapshots included: 

MetaDefender Sandbox Team presents groundbreaking research at a conference panel with audience and screen

BSidesBUD Panel Highlights with Trusted Industry Voices

MetaDefender Sandbox Team presents groundbreaking research at OPSWAT conference on dissecting malicious MSI

Roland walking attendees through malware code mid-presentation (yes, with live demos!) 

MetaDefender Sandbox Team presents groundbreaking research at a conference, team members working on laptops

Malware Masters & Peers: CTF Showdown at BSidesBUD

MetaDefender Sandbox Team presents groundbreaking research with locks, lockpicking tools, and security items on table

From Malware to Metal: Our Threat Analysts Tackle Real-World Lock-Picking

Final Reflections 

These trips weren’t just speaking gigs—they were testaments to OPSWAT’s vision in action. Sharing original malware research, learning from peers, and amplifying the voices of technical experts is what pushes the industry forward. 

One word that summed it up for both analysts? “Research.” 



Because in the end, that’s what fuels cybersecurity innovation, community, and defense. 

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.