{"id":10409,"date":"2015-09-25T06:00:13","date_gmt":"2015-09-25T13:00:13","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10409"},"modified":"2015-09-24T17:58:24","modified_gmt":"2015-09-25T00:58:24","slug":"will-you-be-at-derbycon-this-year","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/09\/will-you-be-at-derbycon-this-year\/","title":{"rendered":"Will You Be at DerbyCon This Year?"},"content":{"rendered":"<p>Palo Alto Networks Senior Malware Researcher Richard Wartell is speaking at this year\u2019s <a href=\"https:\/\/www.derbycon.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">DerbyCon<\/a> in Kentucky. If you\u2019ll be there, don\u2019t forget to attend his\u00a0session:<\/p>\n<p><!--more--><\/p>\n<p><strong><a href=\"https:\/\/www.derbycon.com\/derbycon-2015-schedule-and-abstract\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Malware is Hard, Let\u2019s Go Shopping!<br \/>\n<\/a><\/strong>Sunday, September 27<br \/>\n9:30am<\/p>\n<p>Abstract: Working in malware detection and reverse engineering, Richard Wartell sees some of the intelligent choices malware authors make, but more often he sees the hilariously poor code they write. During this talk Richard will demonstrate how to reverse engineer real world malware, and he will focus on samples with interesting and comical mistakes, as well as dissect samples that are impressive and well written.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks Senior Malware Researcher Richard Wartell is speaking at this year\u2019s DerbyCon in Kentucky. If you\u2019ll be there, don\u2019t forget to attend his\u00a0session:<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[133,131],"tags":[1469,1470],"coauthors":[709],"class_list":["post-10409","post","type-post","status-publish","format-standard","hentry","category-events","category-malware-2","tag-derbycon","tag-richard-wartell"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10409"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10409\/revisions"}],"predecessor-version":[{"id":10413,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10409\/revisions\/10413"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10409"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}