{"id":709,"date":"2024-09-30T11:28:27","date_gmt":"2024-09-30T11:28:27","guid":{"rendered":"https:\/\/catedraciber.etsisi.upm.es\/?p=709"},"modified":"2024-12-02T11:25:02","modified_gmt":"2024-12-02T11:25:02","slug":"asi-fue-el-meetup-%f0%9f%a4%96","status":"publish","type":"post","link":"https:\/\/catedraciber.etsisi.upm.es\/en\/asi-fue-el-meetup-%f0%9f%a4%96\/","title":{"rendered":"As\u00ed fue el Meetup \ud83e\udd16"},"content":{"rendered":"<p>Ayer tuvimos el placer de reunirnos en la C\u00e1tedra de Ciberseguridad INCIBE-ETSISI\/UPM para el meetup <em>Malware: From the Old School to Generative AIs<\/em>. Durante el evento, varios expertos compartieron c\u00f3mo la inteligencia artificial est\u00e1 cambiando la forma en la que se analiza el malware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Charlas: <\/h3>\n\n\n\n<p>Empezamos con <strong>Gerardo Fern\u00e1ndez Navarrete<\/strong> de Virus Total, que nos explic\u00f3 c\u00f3mo est\u00e1n usando la IA para acelerar la ingenier\u00eda inversa de malware. Mostr\u00f3 c\u00f3mo la herramienta <em>Gemini<\/em> y un plugin para IDA Pro pueden facilitar el trabajo a los analistas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?resize=1024%2C448&#038;ssl=1\" alt=\"\" class=\"wp-image-714\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?resize=1024%2C448&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?resize=300%2C131&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?resize=768%2C336&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?resize=1536%2C672&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?resize=18%2C8&amp;ssl=1 18w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA3.jpeg?w=1601&amp;ssl=1 1601w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Luego, <strong>Jos\u00e9 Miguel Holgu\u00edn<\/strong> de S2 Grupo nos ense\u00f1\u00f3 c\u00f3mo los modelos GPT est\u00e1n empezando a jugar un papel importante en el an\u00e1lisis de malware. Con ejemplos pr\u00e1cticos, dej\u00f3 claro que esta tecnolog\u00eda va a cambiar muchas de las tareas del d\u00eda a d\u00eda en el sector.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"482\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?resize=1024%2C482&#038;ssl=1\" alt=\"\" class=\"wp-image-715\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?resize=1024%2C482&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?resize=300%2C141&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?resize=768%2C362&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?resize=1536%2C724&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?resize=18%2C8&amp;ssl=1 18w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA2.jpeg?w=1677&amp;ssl=1 1677w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Por \u00faltimo, <strong>Juan Tapiador<\/strong> de la Universidad Carlos III nos habl\u00f3 de <em>Hive<\/em>, un malware multiplataforma que se dio a conocer por Wikileaks. Explic\u00f3 c\u00f3mo funciona y por qu\u00e9 sigue siendo relevante en el an\u00e1lisis de ciberseguridad hoy en d\u00eda.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"402\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=1024%2C402&#038;ssl=1\" alt=\"\" class=\"wp-image-716\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=1024%2C402&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=300%2C118&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=768%2C301&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=1536%2C603&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=2048%2C804&amp;ssl=1 2048w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA4.jpeg?resize=18%2C7&amp;ssl=1 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Mesa redonda y networking<\/h3>\n\n\n\n<p>Despu\u00e9s de las charlas, tuvimos una peque\u00f1a mesa redonda con los ponentes, donde respondieron preguntas de los asistentes y discutieron sobre su visi\u00f3n de las IAs aplicadas al malware, tanto en lo que concierne a su an\u00e1lisis como a su creaci\u00f3n. <\/p>\n\n\n\n<p>Terminamos la tarde con una sesi\u00f3n de networking, comida y bebida para intercambiar ideas y hacer contactos, ya que creemos en una comunidad unida en la que las ideas fluyan. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"405\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=1024%2C405&#038;ssl=1\" alt=\"\" class=\"wp-image-717\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=1024%2C405&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=300%2C119&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=768%2C303&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=1536%2C607&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=2048%2C809&amp;ssl=1 2048w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2024\/09\/APAISADA1.jpeg?resize=18%2C7&amp;ssl=1 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>","protected":false},"excerpt":{"rendered":"<p>Ayer tuvimos el placer de reunirnos en la C\u00e1tedra de Ciberseguridad INCIBE-ETSISI\/UPM para el meetup Malware: De la vieja escuela a las IAs generativas. Durante el evento, varios expertos compartieron c\u00f3mo la inteligencia artificial est\u00e1 cambiando la forma en la que se analiza el malware. Charlas: Empezamos con Gerardo Fern\u00e1ndez Navarrete de Virus Total, que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","hentry","category-hoja-de-ruta"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":6,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"predecessor-version":[{"id":720,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts\/709\/revisions\/720"}],"wp:attachment":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}