BTC $66157.0605
ETH $3160.9620
BNB $600.0523
SOL $153.7382
XRP $0.5487
stETH $3158.2980
DOGE $0.1576
TON $5.5645
ADA $0.5086
AVAX $38.3049
wstETH $3680.0518
WBTC $66253.4640
DOT $7.3621
WETH $3160.3315
TRX $0.1121
BCH $509.2779
LINK $15.3526
MATIC $0.7263
UNI $8.0690
ICP $14.6066
LTC $84.3899
DAI $0.9987
CAKE $2.9756
RNDR $9.0447
IMX $2.3823
STX $3.0517
NEAR $6.8843
ETC $27.8833
FDUSD $1.0002
MNT $1.1936
FIL $6.4625
TAO $503.6116
OKB $54.7164
HBAR $0.0881
VET $0.0418
KAS $0.1270
ATOM $8.7670
PEPE $0.0000
GRT $0.2943
WIF $2.7575
FET $2.4107
MKR $2818.4937
INJ $27.8130
USDE $0.9992
THETA $2.3518
XLM $0.1162
CORE $2.5749
BTC $66157.0605
ETH $3160.9620
BNB $600.0523
SOL $153.7382
XRP $0.5487
stETH $3158.2980
DOGE $0.1576
TON $5.5645
ADA $0.5086
AVAX $38.3049
wstETH $3680.0518
WBTC $66253.4640
DOT $7.3621
WETH $3160.3315
TRX $0.1121
BCH $509.2779
LINK $15.3526
MATIC $0.7263
UNI $8.0690
ICP $14.6066
LTC $84.3899
DAI $0.9987
CAKE $2.9756
RNDR $9.0447
IMX $2.3823
STX $3.0517
NEAR $6.8843
ETC $27.8833
FDUSD $1.0002
MNT $1.1936
FIL $6.4625
TAO $503.6116
OKB $54.7164
HBAR $0.0881
VET $0.0418
KAS $0.1270
ATOM $8.7670
PEPE $0.0000
GRT $0.2943
WIF $2.7575
FET $2.4107
MKR $2818.4937
INJ $27.8130
USDE $0.9992
THETA $2.3518
XLM $0.1162
CORE $2.5749
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • In 2023, attacks using neural networks will become a new reality

    The use of artificial intelligence in cyber attacks is becoming a new milestone in information security. As AI technology advances, attackers are using it to launch sophisticated and effective attacks. AI-based cyberattacks can be divided into 5 types:

    Improved persistent threat. APT is a covert threat, usually backed by a nation-state or government-sponsored group, that gains unauthorized access to a computer network and goes undetected for an extended period of time. APT groups often use artificial intelligence to avoid detection and target their prey.

    Deepfake attacks. In them, hackers use videos or images generated by neural networks to impersonate real people and run fraud or misinformation campaigns.

    AI-based malware. Such malware can operate on its own and adapt to changing conditions. It also helps avoid detection.

    Phishing. Using natural language processing (NLP) and machine learning (ML), attackers can create more convincing phishing emails and messages designed to trick people into revealing their personal details.

    DDoS attacks. Here, artificial intelligence is used to identify and exploit vulnerabilities in the network, allowing the cybercriminal to increase the scope and impact of the attack.

    AI-based cybersecurity threats are of great concern to both organizations and individuals because they can bypass traditional security measures and cause significant damage.

    It was previously reported that cybercriminals, some with little or no programming experience, were using ChatGPT to create malware and phishing emails that could be used for espionage, ransomware, spam and other malicious campaigns.

    Author DeepWeb
    3.3 million people affected by ransomware attack on Regal Medical Group
    New Stealc malware provides a wide range of data theft capabilities

    Comments 0

    Add comment