BTC $62360.1590
ETH $3157.9177
BNB $584.1815
SOL $134.7380
stETH $3155.2763
XRP $0.5057
DOGE $0.1406
TON $5.2504
ADA $0.4530
AVAX $33.2149
wstETH $3679.9658
TRX $0.1188
WETH $3154.2740
WBTC $62306.4033
DOT $6.5042
BCH $452.5282
LINK $13.9112
MATIC $0.6983
UNI $7.5794
LTC $83.4930
ICP $13.1908
DAI $0.9998
FDUSD $1.0004
CAKE $2.6700
NEAR $6.8065
RNDR $7.6920
IMX $2.0044
ETC $27.0784
HBAR $0.1033
STX $2.3670
MNT $1.0276
FIL $5.9051
OKB $51.1969
PEPE $0.0000
VET $0.0382
WIF $2.7301
TAO $399.6160
ATOM $7.9717
KAS $0.1111
MKR $2788.9916
GRT $0.2483
USDE $0.9993
FET $2.1180
AR $35.4053
XMR $125.2637
INJ $25.1448
XLM $0.1101
BTC $62360.1590
ETH $3157.9177
BNB $584.1815
SOL $134.7380
stETH $3155.2763
XRP $0.5057
DOGE $0.1406
TON $5.2504
ADA $0.4530
AVAX $33.2149
wstETH $3679.9658
TRX $0.1188
WETH $3154.2740
WBTC $62306.4033
DOT $6.5042
BCH $452.5282
LINK $13.9112
MATIC $0.6983
UNI $7.5794
LTC $83.4930
ICP $13.1908
DAI $0.9998
FDUSD $1.0004
CAKE $2.6700
NEAR $6.8065
RNDR $7.6920
IMX $2.0044
ETC $27.0784
HBAR $0.1033
STX $2.3670
MNT $1.0276
FIL $5.9051
OKB $51.1969
PEPE $0.0000
VET $0.0382
WIF $2.7301
TAO $399.6160
ATOM $7.9717
KAS $0.1111
MKR $2788.9916
GRT $0.2483
USDE $0.9993
FET $2.1180
AR $35.4053
XMR $125.2637
INJ $25.1448
XLM $0.1101
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • AI may go to the dark side in the next five years


    Finnish experts believe that attackers will start using AI to carry out deadly effective phishing attacks.

    Prepared by Finnish security company WithSecure, the Finnish Transport and Communications Agency, and the Federal Emergency Management Agency, the report analyzes current trends and developments in AI, cyberattacks, and areas where the two intersect. As the authors of the report say, attacks using AI are currently very rare and are carried out in such a way that researchers and analysts cannot observe them.

    And even though now neural networks are not able to “think through” and launch cyber attacks, researchers believe that in the next five years, attackers will develop AI algorithms that can independently find vulnerabilities, plan and conduct malicious campaigns, bypass security systems and collect information from hacked devices.

    According to WithSecure, the first AIs for cyberattacks will come from state hackers, and then fall into the hands of smaller groups that will begin to use them en masse. Therefore, information security specialists should already start working on systems that will have to protect against such attacks.

    The authors of the report noted that cyber-attacks using AI will be especially effective in the area of impersonation, a tactic that is most often used during phishing and vishing attacks.

    Author DeepWeb
    The political motives of the new group make Israeli companies nervous
    Palo Alto Networks: Vice Society is one of the most influential ransomware groups of 2022

    Comments 0

    Add comment