Tag: deep-fake
-
Forschung gegen Deepfakes – Fraunhofer-Institut bekämpft Desinformation
Tags: deep-fakeFirst seen on security-insider.de Jump to article: www.security-insider.de/projekt-vampir-deepfakes-rage-bait-jugendliche-a-e1ee06725a32146e698b3dd15149dfa3/
-
Deepfakes offenbar zunehmend auch mit unbekannten Ärzten
Gefälschte Videos von Ärzten verbreiten sich laut Bundesärztekammer. Bislang traf es vor allem Promi-Mediziner wie Eckart von Hirschhausen. First seen on golem.de Jump to article: www.golem.de/news/cybercrime-deepfakes-offenbar-zunehmend-auch-mit-unbekannten-aerzten-2605-208507.html
-
Deepfakes Are Exposing Gaps in Cyber Insurance Policies
Deepfake attacks are exposing gaps in cyber insurance policies and traditional security controls. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/deepfakes-are-exposing-gaps-in-cyber-insurance-policies/
-
Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired
Meta’s smart glasses promise privacy “designed for you” – but everything they record was being beamed off to workers in Nairobi to label by hand. When those workers blew the whistle, Meta sacked all 1,108 of them. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-466/
-
Sumsub erweitert Deepfake-Erkennung mit adaptivem KI-System zur Betrugsprävention
Mit einem adaptiven Deepfake-Detektor setzt Sumsub jetzt auf Echtzeit-Lernen, um KI-gestützten Betrug frühzeitig zu erkennen und Unternehmen besser zu schützen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sumsub-erweitert-deepfake-erkennung-mit-adaptivem-ki-system-zur-betrugspraevention/a45015/
-
‘Think before sharing,’ Giorgia Meloni says as AI-made lingerie image of her goes viral
Italian prime minister had received wave of criticism from people who believed deepfake pictures of her were realItaly’s prime minister, Giorgia Meloni, has criticised the circulation of AI-generated deepfake images of her, including one depicting her in lingerie, after they were widely shared online.Meloni <a href=”https://www.facebook.com/share/1Ccr5Sx9iV/?mibextid=wwXIfr”>wrote on Facebook on Tuesday: “In recent days, several fake…
-
Deepfakes: Laut BSI-Bericht überschätzen Nutzer eigene Fähigkeit zur Erkennung
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/deepfakes-laut-bsi-bericht-ueberschaetzen-nutzer-eigene-faehigkeit-zur-erkennung
-
BSI-Cybersicherheitsmonitor zeigt: Selbstüberschätzung bei Deepfakes wird zum Sicherheitsrisiko
Nur so lässt sich sicherstellen, dass Vertrauen in die eigene Kompetenz auf tatsächlichen Fähigkeiten basiert und nicht auf gefährlicher Selbstüberschätzung. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bsi-cybersicherheitsmonitor-zeigt-selbstueberschaetzung-bei-deepfakes-wird-zum-sicherheitsrisiko/a44937/
-
Nutzer überschätzen eigene Fähigkeit, Deepfakes zu erkennen
Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat kürzlich einen Vorab-Bericht zum jährlichen Cybersicherheitsmonitor 2026 veröffentlicht. Das Fokusthema der am 11. Mai erscheinenden gemeinsamen Erhebung des BSI mit der Polizeilichen Kriminalprävention der Länder und des Bundes (ProPK) lautet ‘Online-Betrug und Künstliche Intelligenz”. Die bereits vorliegenden Ergebnisse zeigen vor allem im Bereich Deepfakes eine erhebliche Diskrepanz:…
-
Brinker Introduces a Novel Approach to Deepfake Detection
WILMINGTON, Delaware, 29th April 2026, CyberNewswire First seen on hackread.com Jump to article: hackread.com/brinker-introduces-a-novel-approach-to-deepfake-detection/
-
Brinker Introduces a Novel Approach to Deepfake Detection
WILMINGTON, Delaware, 29th April 2026, CyberNewswire First seen on hackread.com Jump to article: hackread.com/brinker-introduces-a-novel-approach-to-deepfake-detection/
-
BlueNoroff kapert Krypto-Wallets per Zoom-Meeting
BlueNoroff attackiert Krypto-CEOs mit gefälschten Zoom-Meetings. KI-Deepfakes und Clipboard-Hacks führen in unter 5 Minuten zum vollen Systemzugriff. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/bluenoroff-krypto-wallets-zoom
-
BlueNoroff kapert Krypto-Wallets per Zoom-Meeting
BlueNoroff attackiert Krypto-CEOs mit gefälschten Zoom-Meetings. KI-Deepfakes und Clipboard-Hacks führen in unter 5 Minuten zum vollen Systemzugriff. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/bluenoroff-krypto-wallets-zoom
-
Best AI Deepfake and Scam Detection Tools for Security in 2026
Explore the best AI deepfake detection tools to spot fake videos, images, and audio in 2026. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/cybersecurity/best-ai-deepfake-detection-tools/
-
Deepfake Voice Attacks are Outpacing Defenses: What Security Leaders Should Know
Three seconds of audio is all it takes to clone a voice for fraud. Adaptive Security shows how deepfake calls trick employees into sending real money”, and why most defenses don’t catch them. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/deepfake-voice-attacks-are-outpacing-defenses-what-security-leaders-should-know/
-
KI-generierte Fälschungen – Deepfakes aufdecken: So arbeiten IT-Forensiker
First seen on security-insider.de Jump to article: www.security-insider.de/deepfakes-aufdecken-so-arbeiten-it-forensiker-a-fdb86166fef5c1620260f5584b355549/
-
KI-Fälschungen sind visuell kaum noch erkennbar – Wie IT-Forensiker Deepfakes aufdecken
First seen on security-insider.de Jump to article: www.security-insider.de/deepfake-erkennung-it-forensik-ki-bildmanipulation-a-be9e8751da2bc39a5b176fe90816ba03/
-
9 Identity-Based Threats Redefining Cybersecurity in 2026 (Beyond Credential Stuffing)
Tags: ai, attack, authentication, credentials, cybersecurity, deep-fake, identity, mfa, phishing, threatDiscover the 9 most dangerous identity-based threats in 2026, from AI phishing attacks and deepfake authentication bypass to MFA fatigue and harvest-now-decrypt-later quantum threats. Learn why legacy authentication fails against each one and how phishing-resistant, passwordless authentication changes the equation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing/
-
9 Identity-Based Threats Redefining Cybersecurity in 2026 (Beyond Credential Stuffing)
Tags: ai, attack, authentication, credentials, cybersecurity, deep-fake, identity, mfa, phishing, threatDiscover the 9 most dangerous identity-based threats in 2026, from AI phishing attacks and deepfake authentication bypass to MFA fatigue and harvest-now-decrypt-later quantum threats. Learn why legacy authentication fails against each one and how phishing-resistant, passwordless authentication changes the equation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/9-identity-based-threats-redefining-cybersecurity-in-2026-beyond-credential-stuffing/
-
Shadow AI, deepfakes, and supply chain compromise are rewriting the financial sector threat playbook
Financially motivated attacks continued to drive the bulk of cyber incidents against banks, insurers, and payment processors in 2025. Approximately 90% of breaches affecting … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/22/financial-sector-cyber-threats-report/
-
The FTC’s AI portfolio is about to get bigger
The commission is preparing to enforce key parts of a new law against sexual deepfakes and searching for ways to block AI-driven scamming using voice clones. First seen on cyberscoop.com Jump to article: cyberscoop.com/ftc-ai-portolio-getting-bigger-take-it-down-voice-cloning/
-
USA auf Platz 1: Globaler Deepfake-Betrug hat 2,19 Milliarden US-Dollar erreicht
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/usa-platz-1-global-deepfake-betrug-219-milliarden-us-dollar
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…
-
The Deepfake Nudes Crisis in Schools Is Much Worse Than You Thought
An analysis by WIRED and Indicator found nearly 90 schools and 600 students around the world impacted by AI-generated deepfake nude images”, and the problem shows no signs of going away. First seen on wired.com Jump to article: www.wired.com/story/deepfake-nudify-schools-global-crisis/
-
The deepfake dilemma: From financial fraud to reputational crisis
Tags: ai, authentication, business, ceo, communications, control, cyber, data-breach, deep-fake, exploit, finance, fraud, malicious, phone, resilience, risk, threat, toolDeepfakes as tools for financial fraud: Deepfakes have quickly become a powerful enabler of financial fraud. This is largely because most business communication channels, like video and voice calls, remain unauthenticated. A single convincing audio or video call, seemingly from a trusted executive, can bypass established controls in minutes. Employees in these scenarios often follow…
-
Täuschend echt, gefährlich nah: Wie Deepfakes Unternehmen ins Visier nehmen
Die beste Verteidigung bleibt deshalb der Mensch: Mitarbeitende, die verstehen, wie Angriffe funktionieren, die innehalten, hinterfragen und bewusst entscheiden. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/taeuschend-echt-gefaehrlich-nah-wie-deepfakes-unternehmen-ins-visier-nehmen/a44522/
-
12 cyber industry trends revealed at RSAC 2026
Tags: access, ai, application-security, authentication, awareness, business, ciso, cloud, control, cyber, cybersecurity, data, deep-fake, defense, detection, edr, endpoint, firewall, gartner, governance, identity, infrastructure, insurance, metric, microsoft, monitoring, mssp, phishing, programming, risk, risk-management, service, siem, skills, soc, software, startup, technology, threat, tool, trainingLegacy security vendors have the inside track on AI, for now: As far as AI technology consumption for cybersecurity, most CISOs I spoke with were open-minded while leaning toward their existing vendors, at least in the short term. This may buy legacy security vendors a bit, but not much time.Remember what happened in the cloud…

