ROOTCON 19 was held September 24, 25 & 26, 2025
Royce Hotel & Casino, Clark, Pampanga



Day ZerØ
September 24, 2025 (GMT +8)


08:30
eCrime Intelligence
TRACK 1A
HUMAN+
TRAININGS
Real-World Offensive Security: Red Teaming LLMs, Microsoft Entra ID & Android
TRACK 1B
HUMAN+
TRAININGS
12:00
Lunch Break
TRACK 1A&B
20:00
Beer Bash
Royce - Old Amare (Deluxe Tower)
MEETUPS

Day 1
September 25, 2025 (GMT +8)


08:00
CheckIn and Registration
Infobooth
09:00
Opening Remarks
TRACK 1
REMARKS
09:30
Keynote TBA
TRACK 1
REMARKS
10:00
Cyber Threat Intelligence - Collection 101 by: Aaron Ng & Scott Jarkoff
TRACK 4
WORKSHOP
10:15
Oops, I Hacked It Again: Tales and disclosures by: Ignacio Navarro
TRACK 1
OFFICIAL TALK
11:00
Two Devices Walk into Azure… One’s a Phish
TRACK 1
SPEEDTALK
11:30
Beneath the Prompt: The Hidden Risks Powering GenAI
TRACK 1
SPEEDTALK
12:00
Lunch Break
Deluxe Tower
13:15
Practical Hacking to RFID by: Dennis Goh
TRACK 1
OFFICIAL TALK
Breaking into Bug Bounties: Turning Skills into Rewards
TRACK 4
VILLAGE TALK
14:00
Thunder and Lightning: Dual Forces in the Digital Skies
TRACK 1
SPEEDTALK
14:20
The Silent Data Breach: Unintended Exposure of Sensitive Information in Microsoft Enterprise Enrollment, Entra, and Intune by: OfflineIsNewLuxury
TRACK 1
OFFICIAL TALK
Smart Threats, Smarter Defenses: Leveraging Machine Learning to Shrink and Sharpen Cyber Threat Intelligence on IP Addresses by: Wilson Chua
TRACK 4
OFFICIAL TALK
15:05
AI-Augmentation – Transforming Security Operations
TRACK 1
SPEEDTALK
Connected Car Attack Surface Mapping: OSINT Techniques for Automotive Threat Intelligence
TRACK 4
VILLAGE TALK
15:25
AstroTrap: A Deceptive Satellite Gateway Simulation by: Vismit Rakhecha(Druk)
TRACK 1
OFFICIAL TALK
16:10
Vulnerabilities in the Smart Core of Green Infrastructure Part-1 by: Arun Mane
TRACK 1
OFFICIAL TALK
Inside Mobile Communication Attacks and Scams
TRACK 4
VILLAGE TALK
17:00
Day 1 Closing Announcements
TRACK 1
REMARKS
20:00
Hacker Karaoke
TRACK 4
PARTY

Day 2
September 26, 2025 (GMT +8)


08:00
Opening Remarks
TRACK 1
REMARKS
Prowler Deep Dive: Mastering Multi-Cloud Security with Open Source and AI-Powered Insights by: Sergio García
TRACK 4
WORKSHOP
08:30
Lying Lazarus? Or Are We Just Lying to Ourselves? - Understanding DPRK’s Cyber Capabilities by: Aaron Ng
TRACK 1
OFFICIAL TALK
09:15
Security for AI vs. AI for Security
TRACK 1
SPEEDTALK
09:35
Security Cracks at the Summit: Rethinking OTA Updates by: EungyoSeo
TRACK 1
OFFICIAL TALK
10:20
Agents of Chaos - Real World Agentic AI Attack Vectors
TRACK 1
SPEEDTALK
TBA
TRACK 4
SPEEDTALK
10:40
CLR DLL Side-Loading, a secret technique used by APT41 by: Georgy Kucherin
TRACK 1
OFFICIAL TALK
11:25
Securing the Modern Workspace - From Risk to Resilience: Strategies to Secure the Work Environment
TRACK 1
SPEEDTALK
11:45
Lunch Break
Deluxe Tower
13:00
Ransomware 2.0: Declining Giants, Emerging Threats, and Evolving Ecosystems by Hyuna Lee
TRACK 1
OFFICIAL TALK
Lights Out and Stalled Factories: Real-World Modbus Exploitation in Industrial Control Systems Using MATRIX by: Karl Biron
TRACK 4
OFFICIAL TALK
13:45
The return of Lotus Blossom: Hiding in plain sight by: Doan Minh Long
TRACK 1
OFFICIAL TALK
Hijacking AI Agents: Attacks, Abuses, and How to Fight Back by: Rakesh Seal
TRACK 4
OFFICIAL TALK
14:30
Preempt, Protect, Prevail Key Takeaways from 2025 Sophos Active Adversary Report
TRACK 1
SPEEDTALK
Secret Fresh with RAMN and CARLA: The Journey For Autonomous Driving Research on a Miniature Board and Network
TRACK 4
VILLAGE TALK
14:50
Exploits Exposed: Smarter Scoring, Sharper Defense
TRACK 1
SPEEDTALK
15:10
AI-Orchestrated Penetration: Adapting Attacks in Real Time by YI TING SHEN
TRACK 1
OFFICIAL TALK
AI As Your 6th Man: Your Red Team Operator Off-the-Bench by: Ariz Soriano
TRACK 4
OFFICIAL TALK
15:55
50 Shades of Purple: Mastering the Art & Science of Purple Team Evolution by Pengfei BigZaddy Yu
TRACK 1
OFFICIAL TALK
16:40
Awarding and Closing Remarks
TRACK 1
REMARKS
20:00
Hacker Jeopardy
TRACK 1
PARTY
21:00
Zer0 Hour Party
TRACK 1
PARTY