www.cybersecuritydive.com Open in urlscan Pro
2606:4700:4400::ac40:93a0  Public Scan

URL: https://www.cybersecuritydive.com/news/generative-ai-artificial-intelligence-cyber-threat/715531/?&web_view=true
Submission: On June 14 via manual from NL — Scanned from NL

Form analysis 8 forms found in the DOM

Name: signup-inter-formPOST /signup/

<form id="signup-inter-form" class="form-basic" name="signup-inter-form" action="/signup/" method="POST">
  <input type="hidden" name="signup_box_location" value="interstitial">
  <input type="hidden" name="signup_initial_url_path" value="">
  <h1> Don’t miss tomorrow’s Cybersecurity industry news </h1>
  <p class="interstitial-text"> Let Cybersecurity Dive’s free newsletter keep you informed, straight from your inbox. </p>
  <p class="form-error__message" id="interstitial-error"></p>
  <div id="form-interstitial">
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_fd5a39_email">
    <div id="newsletter-list-section">
    </div>
    <div id="interstitial-consent-container">
      <input name="user_consent" value="1" id="id_user_consent" type="checkbox">
      <span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
        <a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
    </div>
  </div>
  <input id="signup-inter-submit" class="email_submit submit button" type="submit" data-role="none" value="Subscribe today">
</form>

GET /search/

<form action="/search/" method="GET" data-ajax="false">
  <label for="search-desktop">
    <span class="screen-reader-text search">Search</span>
  </label>
  <input id="search-desktop" type="search" name="q" placeholder="Search" data-role="none">
  <button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-drawer">
    <img src="/static/img/menu_icons/search.svg?320116291121" alt="search" height="16" width="16" loading="lazy">
  </button>
  <img class="close" src="/static/img/menu_icons/close.svg?273117231121" width="16" height="16" alt="close search" loading="lazy">
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST" target="_blank">
  <label for="id_c1b4e5_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_c1b4e5_email">
  </label>
  <input type="hidden" name="signup_box_location" value="inline">
  <input type="hidden" name="signup_initial_url_path" value="/news/generative-ai-artificial-intelligence-cyber-threat/715531/">
  <input type="hidden" name="js_enabled" value="1" id="id_c1b4e5_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-inline" value="1" class="checkbox">
      <label for="id_user_consent-inline">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_b15ac0_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_b15ac0_email">
  </label>
  <input type="hidden" name="signup_box_location" value="elevated_footer">
  <input type="hidden" name="signup_initial_url_path" value="/news/generative-ai-artificial-intelligence-cyber-threat/715531/">
  <input type="hidden" name="js_enabled" value="1" id="id_b15ac0_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
      <label for="id_user_consent-elevated_footer">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_b01294_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_b01294_email">
  </label>
  <input type="hidden" name="signup_box_location" value="sidebar">
  <input type="hidden" name="signup_initial_url_path" value="/news/generative-ai-artificial-intelligence-cyber-threat/715531/">
  <input type="hidden" name="js_enabled" value="1" id="id_b01294_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-sidebar" value="1" class="checkbox">
      <label for="id_user_consent-sidebar">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_147249_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_147249_email">
  </label>
  <input type="hidden" name="signup_box_location" value="elevated_footer">
  <input type="hidden" name="signup_initial_url_path" value="/news/generative-ai-artificial-intelligence-cyber-threat/715531/">
  <input type="hidden" name="js_enabled" value="1" id="id_147249_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-elevated_footer" value="1" class="checkbox">
      <label for="id_user_consent-elevated_footer">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

GET /search/

<form action="/search/" method="GET" data-ajax="false">
  <label for="search-mobile">
    <span class="screen-reader-text">Search</span>
    <input id="search-mobile" type="search" name="q" placeholder="Search" data-role="none">
  </label>
  <button type="submit" value="" data-role="none" class="search-button-front analytics t-search-navigation-mobile">
    <img src="/static/img/menu_icons/search.svg?320116291121" width="15" height="15" alt="search">
  </button>
</form>

Name: signupPOST /signup/

<form class="form js-form-email-validate" name="signup" action="/signup/" method="POST">
  <label for="id_e2e598_email" class="email-input js-email-input">
    <span class="screen-reader-text">Email:</span>
    <input type="email" name="email" placeholder="Work email address" class="email" required="" id="id_e2e598_email">
  </label>
  <input type="hidden" name="signup_box_location" value="integrated_menu">
  <input type="hidden" name="signup_initial_url_path" value="/news/generative-ai-artificial-intelligence-cyber-threat/715531/">
  <input type="hidden" name="js_enabled" value="1" id="id_e2e598_js_enabled">
  <ul class="signup-list list-no-bullets">
    <li>
      <label><span class="screen-reader-text">Select user consent:</span></label>
      <input type="checkbox" name="user_consent" id="id_user_consent-integrated_menu" value="1" class="checkbox">
      <label for="id_user_consent-integrated_menu">
        <span class="signup-user-consent_box">
          <span> By signing up to receive our newsletter, you agree to our <a href="https://www.industrydive.com/terms-of-use/" target="_blank">Terms of Use</a> and
            <a href="https://www.industrydive.com/privacy-policy/" target="_blank">Privacy Policy</a>. You can unsubscribe at anytime. </span>
        </span>
      </label>
    </li>
  </ul>
  <button class="button button--medium signup-button" type="submit" value="Sign up">Sign up</button>
  <label class="error email_error" style="display:none;">A valid email address is required.</label>
  <label class="error newsletter-error" style="display:none;">Please select at least one newsletter.</label>
</form>

Text Content

Skip to main content

CONTINUE TO SITE ➞



DON’T MISS TOMORROW’S CYBERSECURITY INDUSTRY NEWS

Let Cybersecurity Dive’s free newsletter keep you informed, straight from your
inbox.



By signing up to receive our newsletter, you agree to our Terms of Use and
Privacy Policy. You can unsubscribe at anytime.

 * Deep Dive
 * Library
 * Events
 * Press Releases
 * Topics

Sign up
 * Search
 * Sign up

Search
 * Strategy
 * Breaches
 * Vulnerability
 * Cyberattacks
 * Threats
 * Leadership & Careers
 * Policy & Regulation


An article from


GENERATIVE AI IS A LOOMING CYBERSECURITY THREAT

Researchers have not identified any AI-engineered cyberattack campaigns, yet,
but they say it’s only a matter of time before an AI system is dominant enough
in the market to draw attention.

Published May 8, 2024
By
Jen A. Miller
and
Naomi Eide
 * 
 * 
 * 
 * 
 * 
 * 


dem10 via Getty Images

IBM X-Force hasn’t seen any AI-engineered campaigns, yet, but mentions of AI and
ChatGPT are proliferating on the dark web. 

The X-Force Threat Intelligence Index 2024 report identified over 800,000
references to the emerging technology on illicit and dark web forums last
year. While X-Force does expect AI-enabled attacks in the near term, the real
threat will emerge when AI enterprise adoption matures.

Right now, there are simply too many AI systems at play. 

Though OpenAI’s ChatGPT has become synonymous with generative AI, a competition
is afoot to determine which large language models are the most effective and
transparent. In a test of 10 popular AI models, Google’s Gemini outpaced
competitors, followed by OpenAI’s GPT-4 and Meta’s Llama 2. The test, created by
Vero AI, measures the visibility, integrity, optimization, legislative
preparedness, effectiveness and transparency of models. 




Businesses are leaning on their cloud and software providers to facilitate AI
adoption. Coca-Cola has a $1.1 billion partnership with Microsoft to use its
cloud and generative AI services. And General Mills used Google’s PaLM 2 model
to deploy a private generative AI tool to its employees. 

To this point, cybercriminals are focused on ransomware, business email
compromise and cryptojacking, X-Force found. But the threat intelligence firm
expects that when a single AI technology reaches 50% market share — or when
there are no more than 3 primary AI offerings — the cybercrime ecosystem will
start developing tools and attacks to go after AI. 


AI CAN BOOST ALREADY DOMINANT ATTACK CAMPAIGNS

In February, Microsoft reported that hackers from North Korea, Iran and Russia
were using Open AI to mount cybersecurity attacks, which the company then said
they shut down. 

That’s not surprising, Melissa Ruzzi, director of artificial intelligence at
AppOmni, said. Generative AI can turbo boost social engineering and phishing
attacks. 

Threat actors can tailor sophisticated phishing attacks by scraping data about
users from all corners of the internet, matching pieces of information that
might seem similar to know more about a person. For example, they could identify
an Instagram handle that isn’t exactly a person’s real name. 

This isn’t just about sending spoof emails either, Ruzzi said. AI can be used to
pretend to be a real person applying for a job at a company, which includes a
nicely written cover letter and a PDF resume. 

Hackers can also use AI to determine how long a position has been open “so they
can see how desperate you are,” she said. 



Keep up with the story. Subscribe to the Cybersecurity Dive free daily
newsletter

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.


Threat actors can use generative AI to crack passwords, increase the launch
volume of previously successful attacks, and get around cybersecurity defenses,
she added. The sky is, unfortunately, the limit.


AI COULD BE USED TO BEND THE TRUTH

Generative AI is also being used to fuel disinformation and misinformation
campaigns, said Adam Meyers, CrowdStrike’s senior vice president of counter
adversary operations. In the Crowdstrike 2024 Global Threat Report, the company
tracked AI images related to the Israel and Hamas war. 

While the faked images are relatively easy to spot — in some faked images,
people having six fingers, for example — it’s still being used, and most likely
will continue to be refined through 2024 to disrupt elections. According to
Crowdstrike’s research, more than 42% of the global population will be voting in
presidential, parliamentary and/or general elections this year. 

“We’re already seeing the use of generative AI deep fakes for misinformation,”
Meyers said, including fake President Biden robocalls that were deployed during
the recent New Hampshire primaries. 

That doesn’t mean corporate cybersecurity professionals are off the hook,
because attacks won’t just be contained in the political arena. 

If someone can make a deep fake of a country president, said Meyers, they can
also potentially make a deep fake of a company president. A malicious actor
could use that deep fake on a Zoom call to get employees to do things like make
money transfers, and time it to when the hackers know, via social engineering,
that the president will be unavailable at that time.

“The volume of attacks that they can create and the quality of the attacks is
really starting to get kind of scary,” Ruzzi said.

 * post
 * share
 * post
 * print
 * email
 * license

Filed Under: Vulnerability, Threats


CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX

Get the free daily newsletter read by industry experts

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



EDITORS’ PICKS

 * Win McNamee via Getty Images
   
   
   NIST RELEASES DRAFT OVERHAUL OF ITS CORE CYBERSECURITY FRAMEWORK
   
   It marks the first major update to federal risk guidance since 2014 and
   incorporates new issues, including supply chain security and threats to small
   business.
   
   By David Jones • Aug. 9, 2023

 * Ruben Sprich/Reuters
   
   
   CHANGE HEALTHCARE’S DRAWN-OUT RECOVERY CATCHES FLAK FROM CYBER EXPERTS
   
   At least 100 services remain offline four weeks after the UnitedHealth Group
   detected an intrusion in its medical claims clearinghouse. Experts say the
   impacts are unprecedented.
   
   By Matt Kapko • March 21, 2024


GET THE FREE NEWSLETTER

Subscribe to Cybersecurity Dive for top news, trends & analysis

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



MOST POPULAR

 1. Snowflake-linked attacks are testing the cloud’s shared responsibility
    status quo
 2. Microsoft will take full ownership for security failures in House testimony
 3. Critical PHP CVE is under attack — research shows it’s easy to exploit
 4. Pure Storage comes forward as an early victim of Snowflake-linked attacks


LIBRARY RESOURCES

 * Playbook
   Fighting Fraud: The Threat - and Promise - of Generative AI Custom content
   for Mastercard
 * Trendline
   The growing use of AI in banking Supported by ServiceNow
 * Webinar - on demand
   Enhance Your Cyber Resilience and Strengthen Your Data Protection Custom
   content for Cohesity

View all


COMPANY ANNOUNCEMENTS

 * Jason Lish, Global CISO of Cisco, Joins MightyID Advisory Board From MightyID

View all | Post a press release


WHAT WE’RE READING

 * ProPublica Microsoft Refused to Fix Flaw Years Before SolarWinds Hack
 * 404 Media Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to
   Cops
 * The New York Times The Aftermath of a U.K. Cyberattack: Blood Shortages and
   Delayed Operations

View all


EVENTS

 * 03 AUG
   Conference Black Hat USA 2024: The World’s Premier Technical Cybersecurity
   Conference Presented by Black Hat


INDUSTRY INTEL

 * The 2024 Guide to Open Source Security and Risk Webinar - on demand •
   Provided by Synopsys




CYBERSECURITY DIVE NEWS DELIVERED TO YOUR INBOX

Get the free daily newsletter read by industry experts

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.



COMPANY ANNOUNCEMENTS

View all | Post a press release
Jason Lish, Global CISO of Cisco, Joins MightyID Advisory Board
From MightyID
June 05, 2024

Want to share a company announcement with your peers?

Get started ➔

Editors’ picks
 * Win McNamee via Getty Images
   
   
   NIST RELEASES DRAFT OVERHAUL OF ITS CORE CYBERSECURITY FRAMEWORK
   
   It marks the first major update to federal risk guidance since 2014 and
   incorporates new issues, including supply chain security and threats to small
   business.
   
   By David Jones • Aug. 9, 2023

 * Ruben Sprich/Reuters
   
   
   CHANGE HEALTHCARE’S DRAWN-OUT RECOVERY CATCHES FLAK FROM CYBER EXPERTS
   
   At least 100 services remain offline four weeks after the UnitedHealth Group
   detected an intrusion in its medical claims clearinghouse. Experts say the
   impacts are unprecedented.
   
   By Matt Kapko • March 21, 2024

Latest in Vulnerability
 * Rust Foundation leads the charge to improve critical systems security
   By David Jones
 * SolarWinds file-transfer vulnerability ripe for exploitation, researchers
   warn
   By David Jones
 * Critical PHP CVE is under attack — research shows it’s easy to exploit
   By David Jones
 * Cyber risk is rising for poorly configured OT devices
   By David Jones

--------------------------------------------------------------------------------

 * 
 * 
 * 
 * 

EXPLORE

 * About
 * Editorial Team
 * Contact Us
 * Newsletter
 * Article Licensing
 * Press Releases
 * What We’re Reading

REACH OUR AUDIENCE

 * Advertising
 * Post a press release

RELATED PUBLICATIONS

 * CIO Dive

--------------------------------------------------------------------------------

image/svg+xml
Industry Dive is an Informa business
© 2024 Industry Dive. All rights reserved. | View our other publications |
Privacy policy | Terms of use | Take down policy.
Cookie Preferences / Do Not Sell
Search
 * Home
 * Topics
   * Strategy
   * Breaches
   * Vulnerability
   * Cyberattacks
   * Threats
   * Leadership & Careers
   * Policy & Regulation
 * Deep Dive
 * Library
 * Events
 * Press Releases


GET CYBERSECURITY DIVE IN YOUR INBOX

The free newsletter covering the top industry headlines

Email:
 * Select user consent: By signing up to receive our newsletter, you agree to
   our Terms of Use and Privacy Policy. You can unsubscribe at anytime.

Sign up A valid email address is required. Please select at least one
newsletter.