Artwork

Conteúdo fornecido por Exploit Brokers. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Exploit Brokers ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

HN31 - AI and Crime: How criminals are Exploiting Technology to Deceive

26:36
 
Compartilhar
 

Manage episode 416005304 series 3144149
Conteúdo fornecido por Exploit Brokers. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Exploit Brokers ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tactics.

In this episode:

We discuss a recent incident reported by The Guardian involving AI mimicking BBC presenter Liz Bonnin's voice. Analyze the rise of malware written by AI. Explore the complex relationship between AI advancements and their unintended use in cybercrime. Don't forget to subscribe and hit the bell notification to stay updated with our latest episodes. Your support helps us spread knowledge to more people!

🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age.

Website: https://exploitbrokers.com Newsletter/Socials: https://follow.exploitbrokers.com

### Sources

* Dark Knight Quote: https://www.goodreads.com/quotes/592287-some-men-aren-t-looking-for-anything-logical-like-money-they * BBC Cloned Voice Attack: https://www.theguardian.com/technology/2024/apr/28/bbc-presenters-likeness-used-in-advert-after-firm-tricked-by-ai-generated-voice * Malicious Script: https://www.bleepingcomputer.com/news/security/malicious-powershell-script-pushing-malware-looks-ai-written/

#AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #ArtificialIntelligence #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness

  continue reading

28 episódios

Artwork
iconCompartilhar
 
Manage episode 416005304 series 3144149
Conteúdo fornecido por Exploit Brokers. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Exploit Brokers ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tactics.

In this episode:

We discuss a recent incident reported by The Guardian involving AI mimicking BBC presenter Liz Bonnin's voice. Analyze the rise of malware written by AI. Explore the complex relationship between AI advancements and their unintended use in cybercrime. Don't forget to subscribe and hit the bell notification to stay updated with our latest episodes. Your support helps us spread knowledge to more people!

🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age.

Website: https://exploitbrokers.com Newsletter/Socials: https://follow.exploitbrokers.com

### Sources

* Dark Knight Quote: https://www.goodreads.com/quotes/592287-some-men-aren-t-looking-for-anything-logical-like-money-they * BBC Cloned Voice Attack: https://www.theguardian.com/technology/2024/apr/28/bbc-presenters-likeness-used-in-advert-after-firm-tricked-by-ai-generated-voice * Malicious Script: https://www.bleepingcomputer.com/news/security/malicious-powershell-script-pushing-malware-looks-ai-written/

#AI #CyberCrime #DigitalSecurity #ExploitBrokers #TechNews #CyberSecurity #DataBreach #Malware #Hackers #TechEducation #InformationSecurity #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty #ArtificialIntelligence #TechCrimes #CyberAttack #OnlineSafety #EthicalHacking #InternetSecurity #DigitalFraud #Phishing #Ransomware #AIinSecurity #DataProtection #IdentityTheft #CyberDefense #TechTrends #InnovationInTech #DigitalForensics #TechTalk #SecurityBreach #CyberAwareness

  continue reading

28 episódios

Todos os episódios

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências