top of page

THE Speakers

Aditya Singh
RNGQWU_SV6WOwL_imresizer.jpg

Aditya Singh

Trojan Penguin in the Windows: Advanced Attack Vectors Through WSL2

Aditya Singh is a Senior Security Researcher at Siemens Healthineers focused on adversary evasion techniques and digital privacy; he leads Threat Intelligence, incident response investigations, and malware analysis. Currently also conducting research at the University of Newcastle, he investigates platform-level security gaps in modern operating systems. His research has been presented at multiple international security conferences including Nullcon Goa, HackRed-Con, MY Hack Malaysia, BSides Bloomington, BSides Sydney, BSides Connecticut, BSides Mumbai & Noida and VulnCon, Defcon Delhi. His work on "Unveiling Digital Identities: Mobile Device Fingerprinting" explores multi-layered user tracking mechanisms, while "Reinventing Access Control" proposes novel frameworks to prevent phishing-driven account takeover.

alon_profile.jpeg

Alon Friedman

Weaponizing Autonomous AI for Logical Exploits and Financial

Alon Friedman is a Principal Security Architect at Microsoft Security, with extensive experience in application security and penetration testing. He focuses on defining application security standards and researching threat landscapes. His background includes leading secure software development at Salesforce and managing application vulnerabilities at PayPal. Alon is a recognized researcher, credited with CVE-2014-4246 and the creation of the SCIP OWASP ZAP extension. A frequent speaker at international conferences, Alon has presented at venues such as Ekoparty, DeepSec, and BSides. Additionally, he serves as a lecturer at universities and colleges, teaching information security curriculums in both English and Hebrew.

Bach Ngoc Hung.png

Bach Ngoc Hung &
Nguyen Anh Quynh

Browser Credentials Theft: Stealers' Journey from DPAPI to App-Bound Encryption

Bach Ngoc Hung is currently working as a Redteamer at VinSOC, focusing on malware analysis/development, OS internals, and offensive security research. Through his work at VinSOC, he contributes to building malware and exploitation payloads and to helping the organization understand its exposure to advanced threats.

Nguyen Anh Quynh is the author of Capstone, Unicorn, and Keystone frameworks.

Lei-HUANG.jpg

Lei HUANG

From EDR Evasion to Detection Engineering: A Practical Red-Blue Methodology

Lei HUANG is a red teamer and offensive security enthusiast at Ansen, where he focuses on practical offensive security assessment and adversary simulation. He holds multiple advanced certifications, including OSCE3, OSCP, OSEP, OSWE, OSED, and OSWP, reflecting hands-on experience across exploitation, web security, endpoint tradecraft, and wireless assessment. His research focuses on endpoint evasion and adversary tradecraft, particularly within Windows environments, with close attention to how offensive techniques interact with modern defensive controls. He is especially interested in translating technical research into realistic operator methodology and actionable insights for defenders. Through his work, he aims to bridge the gap between public tooling, real-world intrusion tradecraft, and practical security testing in enterprise environments.

058A1309f-לידור בן שיטרית-crop-לבן.jpg

Lidor Ben Shitrit

Pre-auth RCE in Enterprise Java: When Middleware Becomes the Exploit

Lidor Ben Shitrit (@Thisis0xczar) is a Cloud Security Researcher and a Founding Team Vulnerability Researcher at Novee Security, focused on uncovering vulnerabilities across major cloud platforms, with a particular emphasis on Azure. Lidor is a Microsoft Most Valuable Researcher (MVR) for 2022 and 2023, recognized for his impactful contributions to cloud security research.

Alon Friedman
Bach Ngoc Hung & Nguyen Anh Quynh
Lidor Ben Shitrit
Yaoan Guan
Lei HUANG
Yaoan_Speaker Photo.jpg

Yaoan Guan

Trojan hidden in the weight—A Chain of LLM Attacks

Yaoan Guan focuses on ML cybersecurity research and AI offense and defense. He ranked among the top 15% in the Attack Phase of Track 1 at the Alibaba Cloud-AI and Global Competition and achieved top 20% in the Tencent Cloud Hackathon Intelligent Penetration Testing Challenge. He was invited as a guest lecturer at the 2025 QI-ANXIN Butian Hacker Conference. He exploited IVI vulnerabilities at Pwn2own Automotive. His team won the "Excellent Red Team" title at the Shenzhen Autonomous Vehicle Cybersecurity Competition and has been granted numerous CVE vulnerability IDs. He is an active member of a hacking group, DEFCON DC86020.

Subscribe

© 2026 by HKHACK.

bottom of page