Tag: deep-fake
-
From malware to deepfakes, Gen AI is transforming cyberattacks
Generative AI is even helping hackers trick open-source developers into using malicious code, according to Gartner. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ai-cyberattacks-malware-open-source-phishing-gartner/750283/
-
Corporate executives face mounting digital threats as AI drives impersonation
Malicious actors are using deepfakes and voice-cloning technology to target senior executives in both the workplace and personal spaces. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/corporate-executives-threats-ai-impersonation/750064/
-
Smashing Security podcast #420: Fake Susies, flawed systems, and fruity fixes for anxiety
A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically, we think), and high-ranking Republicans start getting invitations to link up with “her” on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady…
-
Researchers Bypass Deepfake Detection With Replay Attacks
An international group of researchers found that simply rerecording deepfake audio with natural acoustics in the background allows it to bypass detection models at a higher-than-expected rate. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-analytics/researchers-bypass-deepfake-detection-replay-attacks
-
Deepfake Scams Are Distorting Reality Itself
The easy access that scammers have to sophisticated AI tools means everything from emails to video calls can’t be trusted. First seen on wired.com Jump to article: www.wired.com/story/youre-not-ready-for-ai-powered-scams/
-
ThreatPlattformen ein Kaufratgeber
Tags: ai, attack, automation, breach, cisa, cloud, crowdstrike, cyber, cyberattack, dark-web, deep-fake, dns, edr, exploit, finance, firewall, gartner, identity, incident response, intelligence, mail, malware, monitoring, network, open-source, phishing, risk, siem, soar, soc, threat, tool, vulnerability, zero-dayThreat-Intelligence-Plattformen erleichtern es, Bedrohungen zu durchdringen und wirksame Abwehrmaßnahmen zu ergreifen.Der erste Schritt zu einem soliden Enterprise-Security-Programm besteht darin, eine geeignete Threat-Intelligence-Plattform (TIP) auszuwählen. Fehlt eine solche Plattform, haben die meisten Security-Teams keine Möglichkeit, Tool-Komponenten miteinander zu integrieren und angemessene Taktiken und Prozesse zu entwickeln, um Netzwerke, Server, Applikationen und Endpunkte abzusichern. Aktuelle Bedrohungstrends machen…
-
ISMG Editors: Are We Less Secure Despite the AI Buzz?
Also: Deepfake Dangers with Veo 3; Claude Opus 4’s Manipulative Edge. In this week’s update, Information Security Media Group editors questioned whether we’re less secure today despite agentic AI and platformization, examined Veo 3’s alarming leap in deepfake realism, and dug into Anthropic’s powerful yet problematic Claude Opus 4. First seen on govinfosecurity.com Jump to…
-
How Can We Solve the ‘Insane’ Deepfake Video Problem?
Google Is Getting Accolades for Veo 3, But the AI Video Tool Has a Darker Side AI enthusiasts are saying Veo 3 is one of Google’s best products. The mind-blowing AI constructs cinematic video clips from text prompts, and the results look real. Veo 3 pushes deepfake capabilities into uncharted territory and introduces new threats…
-
Verteidigung gegen Deepfake-Attacken
Besonders wertvoll ist die Fähigkeit von KI-gestützten Lösungen, eine Abwehr in Echtzeit zu bieten, mit besserem Datenschutz und schnelleren Reaktionszeiten. Dies ist entscheidend, weil die Bedrohungen immer gezielter und gleichzeitig dynamischer werden. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/verteidigung-gegen-deepfake-attacken/a40938/
-
The Hidden Cyber Risks in Your Executive Team’s Digital Footprint
Executive Team’s Digital Footprint Exposure Is Real Executives, board members, and other high-profile users carry more than just influence they carry risk. With access to strategic assets, critical systems, and high-trust communications, these individuals are prime targets for threat actors. And in the age of oversharing, infostealers, and deepfakes, an executive’s digital footprint becomes… First…
-
Digital trust is cracking under the pressure of deepfakes, cybercrime
69% of global respondents to a Jumio survey say AI-powered fraud now poses a greater threat to personal security than traditional forms of identity theft. This number rises to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/23/ai-powered-fraud-threat/
-
Threat intelligence platform buyer’s guide: Top vendors, selection advice
Tags: ai, attack, automation, breach, cloud, computing, credentials, crowdstrike, cyber, cybersecurity, dark-web, data, data-breach, deep-fake, detection, dns, edr, email, endpoint, exploit, finance, firewall, fraud, gartner, google, group, guide, identity, incident response, infrastructure, intelligence, kubernetes, law, malicious, malware, microsoft, mitigation, monitoring, network, open-source, phishing, privacy, risk, service, siem, soar, soc, sophos, sql, supply-chain, technology, threat, tool, vpn, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency (CISA) found that since 2023 the majority of exploits were zero days, meaning exploiting heretofore unknown methods. And according to the latest Verizon Data Breach Investigations report (DBIR), the percentage of AI-assisted malicious emails doubled to 10% of the totals they observed over the past two years, making staying…
-
How to Win Followers and Scamfluence People
Format Boy makes a living teaching Yahoo Boys, notorious West African scammers, how to use AI and deepfake technology to ensnare their next victims. First seen on wired.com Jump to article: www.wired.com/story/format-boy-yahoo-boys-scam-influencers/
-
Security Affairs newsletter Round 524 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials Shields up US…
-
US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S. officials. The FBI warns that ex-government officials are being targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials. The FBI warns of a campaign using smishing and vishing with deepfake texts and AI voice messages impersonating senior…
-
FTC wants a new, segregated software system to police deepfake porn
The Republican chair told Congress that the agency will need specialized software, personnel and expertise to enforce the newly passed Take It Down Act. First seen on cyberscoop.com Jump to article: cyberscoop.com/ftc-take-it-down-act-deepfake-data-software-congress/
-
US Officials Impersonated Via SMS and Voice Deepfakes
The FBI has warned about an ongoing smishing and vishing scheme using AI deepfakes to impersonate US officials First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/us-officials-impersonated-sms/
-
Deepfake attacks could cost you more than money
In this Help Net Security interview, Camellia Chan, CEO at X-PHY, discusses the dangers of deepfakes in real-world incidents, including their use in financial fraud and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/16/camellia-chan-x-phy-defending-against-deepfakes/
-
FTC wants a new, segregated software system to police deepfake porn
The Republican chair told Congress that the agency will need specialized software, personnel and expertise to enforce the newly passed Take It Down Act. First seen on cyberscoop.com Jump to article: cyberscoop.com/ftc-take-it-down-act-deepfake-data-software-congress/
-
FBI warns of ongoing scam that uses deepfake audio to impersonate government officials
Warning comes as the use of deepfakes in the wild are rising. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/05/fbi-warns-of-ongoing-scam-that-uses-deepfake-audio-to-impersonate-government-officials/
-
FBI warns of fake texts, deepfake calls impersonating senior U.S. officials
Texts or deepfaked audio messages impersonate high-level government officials and were sent to current or former senior federal or state government officials and their contacts, the bureau says. First seen on cyberscoop.com Jump to article: cyberscoop.com/fbi-warns-of-ai-deepfake-phishing-impersonating-government-officials/
-
FBI: US officials targeted in voice deepfake attacks since April
The FBI warned that cybercriminals using AI-generated audio deepfakes to target U.S. officials in voice phishing attacks that started in April. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fbi-us-officials-targeted-in-voice-deepfake-attacks-since-april/
-
Deepfake 101: Understanding Digital Deception in Today’s World
As AI makes perfect digital impersonations increasingly accessible, distinguishing reality from fiction becomes harder. This guide breaks down deepfake technology in simple terms and provides practical protection strategies anyone can implement. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/deepfake-101-understanding-digital-deception-in-todays-world/
-
Creating Hyperrealistic Deepfakes: The Challenges of Labeling
Synthesia’s AI avatars revolutionizing digital media with realism and consent. Learn how these advancements impact trust and user experience. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/creating-hyperrealistic-deepfakes-the-challenges-of-labeling/

