Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Deepfake

  1. Home
  2. Deepfake

Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials

The warning came after the department discovered that an impostor attempted to reach out to at least three foreign ministers, a U.S. senator and a governor.

The post Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials appeared first on SecurityWeek.

Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives

The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk.

The post Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives appeared first on SecurityWeek.

The AI Arms Race: Deepfake Generation vs. Detection

AI-generated voice deepfakes have crossed the uncanny valley, fueling a surge in fraud that outpaces traditional security measures. Detection technology is racing to keep up.

The post The AI Arms Race: Deepfake Generation vs. Detection appeared first on SecurityWeek.

Going Into the Deep End: Social Engineering and the AI Flood

AI is transforming the cybersecurity landscape—empowering attackers with powerful new tools while offering defenders a chance to fight back. But without stronger awareness and strategy, organizations risk falling behind.

The post Going Into the Deep End: Social Engineering and the AI Flood appeared first on SecurityWeek.

Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough

Despite massive investment, the explosion of sophisticated malware and deepfake attacks persists because organizations struggle to verify digital identities and establish fundamental trust.

The post Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough appeared first on SecurityWeek.

FBI Warns of Deepfake Messages Impersonating Senior Officials

The FBI says former federal and state government officials are targeted with texts and AI-generated voice messages impersonating senior US officials.

The post FBI Warns of Deepfake Messages Impersonating Senior Officials appeared first on SecurityWeek.

Microsoft Names Suspects in Lawsuit Against AI Hackers

In a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam.

The post Microsoft Names Suspects in Lawsuit Against AI Hackers appeared first on SecurityWeek.

Sophistication of AI-Backed Operation Targeting Senator Points to Future of Deepfake Schemes

Experts believe schemes like this will become more common now that the technical barriers that once existed around generative artificial intelligence have decreased.

The post Sophistication of AI-Backed Operation Targeting Senator Points to Future of Deepfake Schemes appeared first on SecurityWeek.

The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks

When it comes to adversarial use of AI, the real question is whether the AI threat is a deep fake, or whether the deepfake is the AI threat.

The post The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks appeared first on SecurityWeek.

GetReal Labs Emerges From Stealth to Tackle Deepfakes

Incubated for two years by Ballistic Ventures, GetReal Labs has launched to combat manipulated content and deepfakes.

The post GetReal Labs Emerges From Stealth to Tackle Deepfakes appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it