{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/a10454a61d414a0ab43a4fa5af279bfb\" frameborder=\"0\" width=\"1272\" height=\"954\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":954,"width":1272,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":954,"thumbnail_width":1272,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/a10454a61d414a0ab43a4fa5af279bfb-5427a31011039393.gif","duration":121.8987,"title":"Exploring Malware Analysis and AI Code Execution","description":"Hi everyone, in this video, I walk you through our data analysis process using AI to evaluate network data and run malware tests. We utilize Gemini to generate code that we execute in a sandbox environment, which helps us identify any suspicious patterns. I also discuss our evaluations, including LML and rule-based assessments, to ensure the scripts we analyze are safe. Please pay attention to the audio output as I demonstrate the results. Let me know if you have any questions or need further clarification!"}