TV team of Hacked opens Day 2 of Cybersec Europe : these are their 3 biggest hacks

Auteur zonder afbeelding icoon
William Visterin
07 May 2026
3 min

TV team of Hacked opens Day 2 of Cybersec Europe : these are their 3 biggest hacks

On Thursday, May 21 at 10:30 AM, the team behind the Streamz docuseries will kick off Day 2 of with a keynote on the main stage. The team gained attention through high-profile ethical hacks involving beverage producer Ordal, a mayor’s mailbox, and an apparently harmless printer.

Taking the stage are Cédric De Vroey (freelance ethical hacker), Keanu Nys, Kenneth Dee, Veerle Peeters, and Kurt Callewaert.

The Streamz series featured several realistic cyberattack scenarios that will be further explained and analyzed during the keynote. These were the most striking cases.

  1. Ordal: taking control of production

In the first episode of Hacked, the ethical hackers targeted beverage producer Ordal in Ranst. The company, which had previously experienced cyber incidents, deliberately allowed itself to be tested.

The hackers managed to gain access to the production environment. In theory, this would allow them to alter recipes, ranging from extreme sugar levels to potentially dangerous scenarios. The case once again highlights how cyberattacks can impact not only digital systems, but also physical processes.

  1. The mayor: deepfake and full control

The case in Herentals demonstrates how quickly trust can be exploited. Within a week, the hackers took control of the city’s network, including mailboxes and communication channels — among them the mayor’s mailbox. They discovered a playbook containing passwords for websites, newsletters, and the city’s social media channels.

The most remarkable element was a convincing deepfake video of the mayor, combined with a fake announcement about new traffic regulations. The attack was made possible because sensitive information, such as passwords, was insufficiently protected.

In the episode, the ethical hackers also succeeded in gaining access to BE-Alert — the emergency notification system used to send alerts to citizens — through the hacked mailbox. Following the broadcast, the Crisis Center announced it would accelerate changes to the login procedure. Until then, additional security codes could still be requested via email, which turned out to be the weak link exploited in the episode.

  1. The unattended printer: small device, major consequences

A third case involving a technologically advanced company once again showed how a single weak link is enough to gain entry. The hackers found access through a poorly secured printer.

From there, they gained control over systems managing parking facilities and energy infrastructure. One forgotten device opened the door to an entire infrastructure, highlighting how peripheral devices are often an underestimated security risk.

What can you expect from the keynote?

During the keynote, the five panelists will combine their insights into a story that goes beyond the individual hacks. The ethical hackers will demonstrate how attacks begin in practice and how relatively simple vulnerabilities are often at the root of major incidents.

The other speakers will place the cases in a broader societal context. The human factor will play a central role: not only systems, but also behavior and trust, prove crucial in the success of these types of attacks. The session will conclude with practical takeaways and actionable insights.

Register for free!

As cyber attacks continue to threaten today’s tech landscape, this event is the premier platform for seasoned cyber security professionals and innovative start-ups to exchange knowledge and tackle cybersecurity challenges together. Organizations across all sectors will discover strategies to boost cyber resilience and safeguard critical assets. Don’t miss this chance to strengthen your cyber defenses.