BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
BTC $51740.4000
ETH $3112.6552
BNB $388.4861
SOL $103.4699
XRP $0.5425
ADA $0.5914
AVAX $37.4726
TRX $0.1377
DOGE $0.0861
wstETH $3608.1939
LINK $18.7122
DOT $7.9253
WETH $3099.5051
UNI $11.0991
MATIC $0.9984
WBTC $51892.2111
IMX $3.2035
ICP $12.4694
LTC $70.1056
BCH $267.9077
CAKE $3.1362
FIL $8.1161
ETC $27.2027
KAS $0.1709
RNDR $7.2125
DAI $1.0003
HBAR $0.1094
ATOM $10.3766
INJ $35.7526
TON $2.0791
OKB $50.2401
VET $0.0451
FDUSD $1.0003
LDO $3.3874
GRT $0.2891
ARB $1.9019
STX $2.5976
XMR $129.3498
TIA $16.7710
XLM $0.1165
ENS $22.8347
NEAR $3.7109
APEX $2.4753
WEMIX $2.0914
MKR $2051.3393
RETH $3421.4719
ALGO $0.2075
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • In 2023, attacks using neural networks will become a new reality

    The use of artificial intelligence in cyber attacks is becoming a new milestone in information security. As AI technology advances, attackers are using it to launch sophisticated and effective attacks. AI-based cyberattacks can be divided into 5 types:

    Improved persistent threat. APT is a covert threat, usually backed by a nation-state or government-sponsored group, that gains unauthorized access to a computer network and goes undetected for an extended period of time. APT groups often use artificial intelligence to avoid detection and target their prey.

    Deepfake attacks. In them, hackers use videos or images generated by neural networks to impersonate real people and run fraud or misinformation campaigns.

    AI-based malware. Such malware can operate on its own and adapt to changing conditions. It also helps avoid detection.

    Phishing. Using natural language processing (NLP) and machine learning (ML), attackers can create more convincing phishing emails and messages designed to trick people into revealing their personal details.

    DDoS attacks. Here, artificial intelligence is used to identify and exploit vulnerabilities in the network, allowing the cybercriminal to increase the scope and impact of the attack.

    AI-based cybersecurity threats are of great concern to both organizations and individuals because they can bypass traditional security measures and cause significant damage.

    It was previously reported that cybercriminals, some with little or no programming experience, were using ChatGPT to create malware and phishing emails that could be used for espionage, ransomware, spam and other malicious campaigns.

    Author DeepWeb
    3.3 million people affected by ransomware attack on Regal Medical Group
    New Stealc malware provides a wide range of data theft capabilities

    Comments 0

    Add comment