#1 Trending Cybersecurity News & Magazine
Wednesday, September 20, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Ministry of Public Works and Housing Cyber Attack

    OpIndonesia: Ministry of Public Works and Housing Faces DDoS Attack by Garnesia Team

    Araújo e Policastro Advogados Breach

    Araújo e Policastro Advogados Breach Claimed by 8BASE Ransomware Group

    TransUnion cyber attack

    USDoD Quits RansomedVC a Week After Joining, Leaks TransUnion Data

    Dymocks Cyber Attack

    Dymocks Cyber Attack: Over 1 Million Customer Records Exposed on Dark Web

    Retool Data Breach

    Retool Data Breach Linked to Google Authenticator Vulnerability

    Cybercrime competitions

    Inside Cybercrime Tournaments: Players, Incentives, and Impact on Security

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Anime About Hacking

    Get Your Hack On: Top 10 Anime About Hacking for Cybersecurity Buffs

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    Cyble Partner Network

    Cyble Revolutionizes Cybersecurity Collaboration With Launch of Global Partner Program ‘Cyble Partner Network’

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Ministry of Public Works and Housing Cyber Attack

    OpIndonesia: Ministry of Public Works and Housing Faces DDoS Attack by Garnesia Team

    Araújo e Policastro Advogados Breach

    Araújo e Policastro Advogados Breach Claimed by 8BASE Ransomware Group

    TransUnion cyber attack

    USDoD Quits RansomedVC a Week After Joining, Leaks TransUnion Data

    Dymocks Cyber Attack

    Dymocks Cyber Attack: Over 1 Million Customer Records Exposed on Dark Web

    Retool Data Breach

    Retool Data Breach Linked to Google Authenticator Vulnerability

    Cybercrime competitions

    Inside Cybercrime Tournaments: Players, Incentives, and Impact on Security

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Anime About Hacking

    Get Your Hack On: Top 10 Anime About Hacking for Cybersecurity Buffs

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    threat landscape

    The Three Trends to Watch in the Growing Threat Landscape

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    Cyble Partner Network

    Cyble Revolutionizes Cybersecurity Collaboration With Launch of Global Partner Program ‘Cyble Partner Network’

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Will We See an Increase in AI-Generated Cyberattacks?

Quantifying the threat of AI-generated cyberattacks starts with understanding how cybercriminals may use this technology.

Editorial by Editorial
July 16, 2023
in Firewall Daily
0
AI-Generated Cyberattacks
620
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

by Emily Newton

AI’s popularity has skyrocketed in recent years. Generative tools like ChatGPT have captivated individuals and businesses alike, but as the initial hype has faded, darker implications have emerged. Now that AI is more versatile and accessible than ever, will it create a wave of AI-generated cybercrime?

You might also like

ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

Data Not Ours, Says TransUnion After USDoD Claimed to Leak Company Information

Is the International Criminal Court Cybersecurity Incident a Threat to Justice and Security?

AI is a powerful tool for anyone who uses it, including cybercriminals. As this technology advances, security professionals may need to consider how to defend against AI-driven attacks.

How Cybercriminals Can Use AI

Quantifying the threat of AI-generated cyberattacks starts with understanding how cybercriminals may use this technology. Like legitimate uses for intelligent systems, AI cybercrime comes in many forms.

Optimized Phishing

Phishing is one of the most prominent use cases for AI in cybercrime, partly because phishing remains the most common form of cybercrime today. These attacks can be remarkably effective without any help from AI, but generative models can unlock their full destructive potential.

Generative AI can craft convincing, personalized phishing messages the same way it writes blog posts and marketing messages. As a result, social engineering attempts may lack their traditional telltale signs, like misspellings and poor grammar. AI’s speed will also let criminals produce much higher volumes of these messages in less time.

Research has already verified the efficacy of AI-generated phishing. A test at a security conference found that users were far more likely to fall for AI-produced phishing attempts than human-generated ones.

Building New Malware Strains

Generative tools like ChatGPT can write more than just natural language. They can also produce code, opening the door to AI-generated malware strains.

Writing new code is a time-consuming, error-prone process, but AI can streamline it significantly. That’s great news for developers, but these benefits extend to malicious code, too. Cybercriminals can use generative AI to automate the writing or checking process when developing new malware strains.

Since AI works so quickly and effectively, the malware it creates may be more threatening than its human-programmed counterparts.

Cybercriminals could use it to develop and implement new, detection-resistant strains before security researchers have time to adapt. Zero-day exploits are already a widely recognized security concern, but AI could accelerate their emergence as it streamlines malware generation.

Vulnerability Detection

Similarly, cybercriminals can also use AI to find new attack vectors. As cybersecurity has become a more prevalent issue, more businesses have implemented extensive protections. Over half of all organizations have a zero-trust framework in place, but no defense is perfect, and AI helps criminals overcome these barriers.

AI can scan business networks and IT infrastructure to find potential vulnerabilities. Today’s complex cyber defenses leave fewer of these opportunities and make them harder to find, but AI can identify them faster and more accurately than people.

Thanks to AI’s speed and accuracy, these vulnerability scans can shorten attack timelines, even against a well-protected business. As more of these models come as off-the-shelf solutions on the dark web, they will also lower the barrier of entry for advanced attacks.

Deepfakes

While many of these risks involve using AI to exacerbate existing threats, AI can create entirely new ones, too. Deepfakes — AI-generated media resembling real-world video, audio or image content — could pose security challenges if businesses are not prepared.

Criminals could use deepfakes to make videos or audio messages that look and sound exactly like real, trusted parties. They might impersonate a company’s CEO to direct employees to send sensitive information to a cybercriminal’s email or sow distrust throughout an organization.

Business email compromise is already one of the costliest cybercrimes, and deepfakes could make this type of fraud easier than ever.

Deepfakes could also bypass biometric security or protect cybercriminals’ identities. Since these threats are so new, protections against them are fairly sparse.

AI-Generated Cyberattacks Today and Tomorrow

These cases are more than theoretical threats. Cybercriminals are already starting to use AI to form more sophisticated or effective attacks against businesses and individuals alike. Security firm Zscaler has already witnessed deepfake attacks and says AI drove the 47% rise in phishing attacks the company discovered in 2022.

As AI becomes more versatile and accessible, its role in cybercrime will undoubtedly grow. Cybercriminals started using generative models like ChatGPT almost as soon as the technology became available, and AI is only becoming more powerful. The potential returns for cybercriminals are too great for them to pass up.

AI-generated cybercrime could become the norm in a matter of months as current trends grow. Even if it doesn’t happen that quickly, AI will redefine cybercrime over the next few years. The shift is already taking place.

Defending Against AI-Generated Attacks

As AI-generated cyberattacks grow, the cybersecurity industry must adapt. Specific approaches and protections may vary between organizations, but here are some general steps that shift should include.

Fight Fire With Fire

The best protection against AI attacks is AI itself. Thankfully, cybersecurity is already a leading use case for AI, as 51% of AI adopters use it in security. That trend must grow as businesses try to keep pace with AI-driven advancements in cybercrime.

Security teams can use AI vulnerability detection to find holes in their defenses before criminals do. Similarly, some models can detect deepfakes and other AI-generated content to help protect employees from AI-powered fraud and social engineering. This technology’s speed and accuracy make cybercrime more dangerous, but security professionals can reap the same benefits.

Increased Scrutiny

As AI heightens the risks of phishing and other forms of social engineering, employees should become increasingly skeptical about unusual communications. Stricter policies around acceptable actions — even if an authority figure seemingly asks for them — may be necessary.

Zero-trust is essential as part of this increased scrutiny. All employees should also receive training on how to check messages for AI-generated content and why it’s important to verify before trusting anything.

Adapt to New Norms

Finally, businesses must recognize that AI’s growth will accelerate the rate of change in cybercrime. Adapting to new criminal trends is already a critical part of thorough security, but these trends will change faster with AI.

According to a 2022 report, 42% of organizations today penetration test once every one to two years, but that may have to change. More frequent testing may be necessary to stay on top of rapidly evolving, AI-driven threats.

Outside of these tests, security professionals should monitor the overall cybercrime landscape closely to identify threats similar businesses are facing they may have to account for.

AI Will Redefine Both Cybercrime and Cybersecurity

AI is a revolutionary technology, but that power applies to both good and bad parties. Just as this technology is changing the way businesses operate, it’s opening new opportunities for criminals.

AI has already become a common part of cybercrime. Security teams must adapt to this trend and likewise implement AI to stay safe.

About the author
Emily Newton is a seasoned tech and industrial writer who explores the impact of technology in different industries. She has over six years of experience providing insights on innovative technologies.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: AI and cyebrcrimeAI cyber attackAI cybercrimeThe Cyber ExpressThe Cyber Express News
Previous Post

Cybersecurity Regulations: The Half-Yearly Report Card

Next Post

Usersec Joins Anonymous Russia to Launch Cyber Attack on France

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

American University of Antigua cyber attack
Firewall Daily

ALPHV Ransomware Strikes American University of Antigua, Leaves Detailed Ransom Note

by Vishwa Pandagle
September 20, 2023
TransUnion data leak
Firewall Daily

Data Not Ours, Says TransUnion After USDoD Claimed to Leak Company Information

by Editorial
September 20, 2023
ICC Cybersecurity Incident
Data Breach News

Is the International Criminal Court Cybersecurity Incident a Threat to Justice and Security?

by Ishita Tripathi
September 20, 2023
Microsoft Gaming Data Leak
Firewall Daily

Microsoft’s 38TB Data Blunder: GitHub Leak Exposes 30,000 Internal Messages

by Vishwa Pandagle
September 20, 2023
PeerBerry data breach
Firewall Daily

PeerBerry Data Breach: SiegedSec Hacker Group Claims Responsibility

by Ashish Khaitan
September 20, 2023
Next Post
Cyber Attack on France

Usersec Joins Anonymous Russia to Launch Cyber Attack on France

Latest Issue is Out. Subscribe Now



Follow Us On Google News

Latest Cyber News

3AM Ransomware
Cybersecurity News

3AM Ransomware – A Potential Backup for LockBit Ransomware?

September 19, 2023
Cybersecurity in the Middle East
Cybersecurity News

Evolution of Cybersecurity in the Middle East

September 19, 2023
Ministry of Public Works and Housing Cyber Attack
Firewall Daily

OpIndonesia: Ministry of Public Works and Housing Faces DDoS Attack by Garnesia Team

September 18, 2023
Araújo e Policastro Advogados Breach
Firewall Daily

Araújo e Policastro Advogados Breach Claimed by 8BASE Ransomware Group

September 18, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance