Remove Cybercrime Remove Security Defenses Remove Technology
article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

The increasing sophistication of these technologies has made it harder than ever to distinguish real content from fake. A study by the Massachusetts Institute of Technology (MIT) presented in 2019 revealed that deepfakes generated by AI could deceive humans up to 60% of the time. As the technology evolves, so will its misuse.

article thumbnail

New AI Threats Emerge as FraudGPT Creator Unleashes DarkBERT and DarkBART

eSecurity Planet

New AI-powered cybercrime tools suggest that the capability of AI hacking tools may be evolving rapidly. The creator of FraudGPT, and potentially also WormGPT , is actively developing the next generation of cybercrime chatbots with much more advanced capabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Commenting on the SANS Threat Intelligence Summit 2021 Presentations – An Analysis and Practical Recommendations

Security Boulevard

The dissemination phase consists of active processing and dissemination of the processed data for the purpose of communicating the actionable intelligence for the purpose of ensuring that an organizations defense is actively aware of the threats facing its infrastructure and security defense mechanisms.

article thumbnail

Black Hat AI Tools Fuel Rise in Business Email Compromise (BEC) Attacks

eSecurity Planet

They found a tool called WormGPT “through a prominent online forum that’s often associated with cybercrime,” Kelley wrote in a blog post. ” The security researchers tested WormGPT to see how it would perform in BEC attacks. . Promotion of jailbreaks for AI platforms.

article thumbnail

SploitScan: Find Latest CVE Documentation and Exploitation With All Details

Hacker's King

Technology is also evolving rapidly in this fast-evolving world, where everything is changing briskly. It quickly spots common security flaws like misconfigurations, outdated sof, such as, and weak passwords, helping you test systems efficiently and thoroughly. Modular Architecture: SploitScan is highly flexible.

article thumbnail

SploitScan: Find Latest CVE Documentation and Exploitation With All Details

Hacker's King

Technology is also evolving rapidly in this fast-evolving world, where everything is changing briskly. It quickly spots common security flaws like misconfigurations, outdated sof, such as, and weak passwords, helping you test systems efficiently and thoroughly. Modular Architecture: SploitScan is highly flexible.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Recent updates to HIPAA regulations may address new technologies and evolving threats in the healthcare industry. The act also covers various forms of cybercrime, including malware distribution and data theft. Recent amendments to the CFAA may include updates to address new cybercrime techniques and technological advancements.