Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of whitelisthackers GmbH
Forums it-sa Expo Knowledge Forum E

Attack of the machines - Artificial intelligence gives cyber criminals “superpowers”

How to plan and execute targeted attacks with AI, from phishing to malware generation and deepfakes.

calendar_today Wed, 23.10.2024, 17:00 - 17:30

event_available On site

place Forum, Booth 9-103

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Education and training Awareness / Phishing / Fraud

Key Facts

  • Identify and exploit vulnerability
  • Staging Deepfakes
  • Generate Malware

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

For cybercriminals, the available Large Language Models (LLMs) represent an enticing arsenal of tools to make their malicious activities more efficient and targeted.
With their help, customized emails can be created, as well as realistic faces and voices of well-known individuals, making them appear so convincing that they can specifically target certain people or departments within a company. This is particularly effective because they generate credible stories and scenarios that entice victims to disclose sensitive information or facilitate direct interactions for information gathering.

On a technical level, LLMs can be used for generating advanced malware. They can also analyze code fragments or simulate security protocols to identify potential vulnerabilities or gaps in systems that could be exploited by cybercriminals.

These and other attack possibilities, as well as the potential of artificial intelligence, will be presented in detail during the lecture.
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.