Initial Experiments – Deep Groove in the Floor

Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. Running around Chicago doing errands on a rainy day. #shotcutvideo #collage #collagelife #weird #weirdvisualfx #kaleidoscope #kaleidoscopevideos #kaleidoscopeoflife #driving #lsd #chicago #timelapse #groceryshopping #videotour #slipstream #version #version6 #versionsix #kaleidoscopeart #kaleidoscopevideos #kaleidoscopeeffect #kaleidoscopeworld #kaleidoscopevideo

Conference Video – Former CIA Officer Will Teach You How to Spot a Lie

In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal Read More …

Month of AI Video – Practical LLM Security

Practical LLM Security As large language models (LLMs) become increasingly integrated into various applications, the security standards for these integrations have not kept pace. Much of the current security research tends to focus on either 1) the social harms and biases associated with LLMs, along with content moderation issues, or 2) the LLMs themselves, often Read More …

Malware TV – Automatically Extracting Obfuscated Strings from Malware

The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …

Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion

Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …