N-Grams, Quantum, and Malware – A Recipe for Chaos? | Dr. Jenn Ferreras
N-Grams, Quantum, and Malware – A Recipe for Chaos?
Presenter: Dr. Jenn Ferreras
How are malware analysts using pattern analysis today?
Malware analysts have long relied on n-grams to identify patterns in malicious code. By breaking binaries or scripts into smaller sequences, analysts can spot similarities, track malware families, and detect evasive techniques used by attackers.
What happens when quantum computing enters the picture?
This session asks a big question. What if we combine classical n-gram analysis with quantum computing techniques? Does it unlock dramatically better malware detection, or does it introduce more complexity than clarity?
What is this talk about?
This fast paced, no fluff talk takes a chaotic but fun dive into the intersection of quantum algorithms and traditional malware analysis. The goal is not hype, but exploration of what might actually be possible as quantum research continues to evolve.
Could quantum improve polymorphic malware detection?
Polymorphic malware constantly changes its structure to evade detection. This session explores whether quantum approaches could help identify malicious patterns earlier, even before the malware fully morphs.
What challenges are discussed?
Alongside the potential benefits, the talk also examines practical limitations, false assumptions, and where quantum approaches may introduce more noise than signal in real world detection workflows.
Who should watch this talk?
This session is designed for malware analysts, security researchers, data scientists, and anyone curious about the future of detection techniques at the intersection of classical and emerging technologies.
What should attendees expect?
Expect a lively discussion that blends theory, skepticism, and curiosity. The goal is to separate meaningful ideas from science fiction while having a little fun along the way.
Sign Up for WWHF
Register for this year’s Wild West Hackin Fest here:
https://wildwesthackinfest.com/register/
Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills.
#cybersecurity #malwareanalysis #quantumcomputing #infosec #securityresearch #threatdetection #reverseengineering #emergingtech #cyberawareness
///Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/
Originally from From WWHF: N-Grams, Quantum, and Malware – A Recipe for Chaos? | Dr. Jenn Ferreras ( :-{ı▓ #WWHF #BHIS #cyberresearch
07.03.2026 12:20
👍 0
🔁 0
💬 0
📌 0
Talkin' Bout [infosec] News 2026-03-09 #infosec #news
Join us LIVE on Mondays, 4:30pm EST.
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
https://bhisnews.transistor.fm
Chat with us on Discord! -
https://discord.gg/bhis
🔴live-chat
🔗 Register for FREE webcasts, summits, and workshops -
https://poweredbybhis.com
Brought to you by:
Black Hills Information Security
https://www.blackhillsinfosec.com
Antisyphon Training
https://www.antisyphontraining.com/
Active Countermeasures
https://www.activecountermeasures.com
Wild West Hackin Fest
https://wildwesthackinfest.com
#livestream #infosec #news #BHIS #podcast #Cybersecurity #infosecnews
Originally from BHIS: Talkin' Bout [infosec] News 2026-03-09 #infosec #news ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
07.03.2026 09:34
👍 0
🔁 0
💬 0
📌 0
Webinar - CMMC Challenges and Misunderstandings
The defense supply chain is struggling with CMMC implementation, and it’s not because the requirements are inherently complex. The problem is misinformation, scope creep, and upstream contractors who don’t understand when CMMC actually applies. During our next webinar, our experts will cover the misunderstandings that are creating the most problems for contractors and subcontractors, from CUI marking confusion to unnecessary Level 2 requirements.
In this live session, we will cover:
- Understanding what CUI really means and when protection is actually required
- Distinguishing between ITAR, classified information, and legitimate CUI
- Identifying when CMMC Level 2 certification is truly necessary
- Managing upstream contractors who are overreaching with CMMC requirements
- Controlling scope creep in your compliance program
- Ensuring external service provider compliance without overcomplicating the process
Join us for an in-depth session with Director of Advisory Services Chris Camejo and Compliance Practice Lead Lee Quinton that addresses the real challenges you’re facing in your CMMC journey. They’ll dig into the specific issues that are causing delays, increasing costs, and creating compliance headaches across the defense industry. Designed for contractors, subcontractors, and service providers, this webinar will provide practical, actionable guidance to navigate CMMC requirements effectively.
Get the clarity your CMMC program needs to succeed. Let’s tackle your CMMC questions together!
Originally from From TrustedSec: Webinar - CMMC Challenges and Misunderstandings ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
05.03.2026 12:28
👍 0
🔁 0
💬 0
📌 0
Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app
How to detect and respond to OAuth consent attacks in Google Workspace
Originally from Red Canary: Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app ( :-{ı▓ #threatintel #redcanary #cyberresearch
05.03.2026 10:23
👍 0
🔁 0
💬 0
📌 0
Obviously, you have to call an AI "Jarvis" #ai #podcast
When AI can integrate across projects, systems, and security with a simple text, innovation stops being theoretical — it becomes reality. Watch the full episode "Ten Years: A Decade of Doing This" now! https://youtu.be/zlaWEVnu8Pg
Originally from From TrustedSec: Obviously, you have to call an AI "Jarvis" #ai #podcast ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
04.03.2026 12:31
👍 0
🔁 0
💬 0
📌 0
Learning to Trust AI Agents with Automation w/ Ethan and Derek
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –
https://poweredbybhis.com
What if you could safely harness AI agents to automate real work, without spending a dime?
Join us for a free one-hour BHIS webcast with Ethan Robish and Derek Banks to cut through the hype and learn what coding agents really are, why they’re not just for developers, and how to start for free.
You’ll learn how tools like Opencode work, how to overcome security and trust barriers, and how to give agents the context, skills, and guardrails they need to safely plan, execute, and iterate.
Chat with your fellow attendees in the Black Hills Infosec Discord server:
https://discord.gg/BHIS
in the #🔴live-chat channel.
Originally from BHIS: Learning to Trust AI Agents with Automation w/ Ethan and Derek ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
04.03.2026 09:42
👍 2
🔁 0
💬 0
📌 0
Discord Livestream - AMA: Incident Response
Join us for our next Discord Livestream “AMA: Incident Response” on March 19 at 11:00am ET! Incident Response Practice Lead Ryan Macfarlane will field your questions on what TrustedSec is seeing on IR engagements, common attack vectors, as well as AI threats and how criminal and nation state actors are using it. Ryan is also willing to answer questions about his time as an FBI Cyber agent – questions about aliens will be considered on a case-by-case basis ;) Bring all your incident response questions and connect with our Discord community!
Originally from From TrustedSec: Discord Livestream - AMA: Incident Response ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
03.03.2026 12:33
👍 1
🔁 0
💬 0
📌 0
Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle
Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT
Patrick Wheltle
How can job seekers research companies before applying?
In today’s job market, it is easier than ever to share professional information with companies that may not be legitimate. This talk focuses on how job seekers can use basic research techniques to avoid wasting time or exposing sensitive details to organizations with no real intent to hire.
What is this presentation about?
This session explores a series of methods that can be used to research companies claiming to be hiring qualified applicants. The goal is to help professionals verify legitimacy before submitting resumes, portfolios, or personal data.
What role does OSINT play in job research?
Using open-source intelligence techniques, the talk demonstrates how publicly available information can reveal red flags about a company’s operations, leadership, and credibility. Attendees will learn where to look and what questions to ask when evaluating a potential employer.
What case study is covered?
The presentation includes a real world case study of a company advertising roles with unusually high compensation. On the surface, the opportunity looked promising. However, basic OSINT research revealed deeper concerns.
What was uncovered during the investigation?
The company appeared to have no customers, no public reputation, and no verifiable business activity. Further research uncovered layers of shell companies and raised questions about whether the listed officers were even real individuals.
Why does this matter for job seekers?
Job scams and deceptive hiring practices can lead to identity theft, financial loss, or wasted effort. This session shows how a small amount of investigation can protect professionals from falling into these traps.
Who should watch this talk?
This campfire talk is ideal for job seekers, security professionals, recruiters, and anyone interested in OSINT or online investigation techniques.
What is the takeaway?
Sometimes the truth is hidden in plain sight. Knowing where to look can make all the difference.
Sign Up for WWHF
Register for this year’s Wild West Hackin Fest here:
https://wildwesthackinfest.com/register/
Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills.
#cybersecurity #osint #jobsearch #careeradvice #infosec #onlinesafety #employmentscams #digitalinvestigations #cyberawareness
///Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/
Originally from From WWHF: Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle ( :-{ı▓ #WWHF #BHIS #cyberresearch
03.03.2026 12:32
👍 0
🔁 0
💬 0
📌 0
Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy
By Assaf Morag, Cybersecurity Researcher Haute couture is presented as the most controlled, exclusive, and artisanal corner of the fashion industry. Invitation-only shows. One-of-one garments. Months of handwork. Astronomical prices. But when you step away from the runway narrative and look at couture as a system (materials, labor, knowledge, logistics, and incentives), a different picture […]
The post Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy appeared first on Flare | Threat Exposure Management | Unmatched Visibility into Cybercrime.
Originally from Flare: Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy ( :-{ı▓ #flare #CTI #cyberresearch
03.03.2026 09:29
👍 0
🔁 0
💬 0
📌 0
Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff
Ethics on the Line Balancing Social Engineering Success with Target Protection
Presenter: Jennifer Isacoff
Why do social engineering assessments raise ethical concerns?
Social engineering engagements like phishing and vishing are powerful tools for exposing weaknesses in an organization’s defenses. They work by exploiting human trust. But what happens to the people who fall for them after the test is over?
What is this talk about?
This 15 minute campfire talk explores the ethical challenges of selling and conducting social engineering assessments without causing unintended harm to employees. Even when reports anonymize identities, basic security logs can often reveal who failed, sometimes leading to blame or punishment long after the engagement ends.
Why is this a problem for practitioners?
This creates a difficult question for social engineering professionals. How do you clearly demonstrate risk to a client while protecting the individuals being tested? The tension between accountability and education can undermine trust in both the assessment and the security team.
What ethical questions are discussed?
The session sparks an open discussion around whether mandatory post engagement training is the only ethical path forward, or if engagements can be designed to preserve anonymity while still delivering meaningful value to clients.
What real world experiences inform this talk?
Drawing from real world social engineering engagements, the discussion explores situations where proving impact, such as initial access or credential capture, conflicted with safeguarding individuals from negative consequences.
What solutions are on the table?
Expect a lively debate around practical approaches including creative contract language, log obfuscation strategies, client education, and engagement design choices that prioritize learning over punishment.
Who should attend?
This talk is for social engineering professionals, red teamers, defenders, and newcomers interested in the human side of security testing.
What is the goal of this session?
This is not just about ethics. It is about sustaining trust in the craft of social engineering while responsibly addressing the human factor that makes these attacks so effective.
Bring your stories, ideas, and opinions and let’s hash it out around the campfire.
Sign Up for WWHF
Register for this year’s Wild West Hackin Fest here:
https://wildwesthackinfest.com/register/
Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills.
#cybersecurity #socialengineering #phishing #vishing #infosec #redteam #securityethics #humanfactor #defensivesecurity #cyberawareness
///Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/
Originally from From WWHF: Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff ( :-{ı▓ #WWHF #BHIS #cyberresearch
28.02.2026 12:41
👍 0
🔁 0
💬 0
📌 0
Intro to PAMSkeletonKey for Persistence w/ Ben Bowman
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –
https://poweredbybhis.com
How does PAM abuse fit into a real‑world attack chain?
Join us for a free one‑hour BHIS webinar with Ben Bowman as he introduces PAMSkeletonKey, a tool designed for red teamers and CTF players to explore persistence, lateral movement, and privilege escalation on Linux systems.
Ben will teach why the tool was created, how to use it safely in lab environments, and what this technique means for defenders working to detect or prevent authentication abuse.
You'll learn a practical understanding of Linux PAM (Pluggable Authentication Modules) authentication and how it can be abused to create a skeleton‑key backdoor for persistence.
Get started with PAMSkeletonKey: https://github.com/her3ticAVI/PAMSkeletonKey
Chat with your fellow attendees in the Black Hills Infosec Discord server:
https://discord.gg/BHIS
in the #🔴live-chat channel.
Originally from BHIS: Intro to PAMSkeletonKey for Persistence w/ Ben Bowman ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
28.02.2026 09:54
👍 0
🔁 0
💬 0
📌 0
AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security
We are getting a lot of requests for AI-generated Zoom video attacks! It's ramping up quick. Watch the full episode on LLM attacks now! https://youtu.be/QA_j4ZUYDAs
Originally from From TrustedSec: AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch
26.02.2026 12:48
👍 0
🔁 0
💬 0
📌 0