<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/a10454a61d414a0ab43a4fa5af279bfb&quot; frameborder=&quot;0&quot; width=&quot;1272&quot; height=&quot;954&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>954</height><width>1272</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>954</thumbnail_height><thumbnail_width>1272</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/a10454a61d414a0ab43a4fa5af279bfb-5427a31011039393.gif</thumbnail_url><duration>121.8987</duration><title>Exploring Malware Analysis and AI Code Execution</title><description>Hi everyone, in this video, I walk you through our data analysis process using AI to evaluate network data and run malware tests. We utilize Gemini to generate code that we execute in a sandbox environment, which helps us identify any suspicious patterns. I also discuss our evaluations, including LML and rule-based assessments, to ensure the scripts we analyze are safe. Please pay attention to the audio output as I demonstrate the results. Let me know if you have any questions or need further clarification!</description></oembed>