Wolfgang Ettlinger & Alexander Hurbean
Skynet wants your Passwords! The Role of AI in Automating Social Engineering
#1about 2 minutes
Understanding the dual role of AI in cybersecurity
Artificial intelligence can be used for both defensive security solutions and for malicious attacks like developing malware.
#2about 3 minutes
The threat of AI-generated deepfakes and voice cloning
Increasingly realistic AI-generated content, such as deepfakes and cloned voices, is being used for CEO fraud and fake kidnapping scams.
#3about 4 minutes
Automating social engineering with autonomous AI agents
Autonomous agents like AutoGPT can be programmed with a single goal to execute complex, multi-step social engineering attacks at scale.
#4about 5 minutes
A framework for automated phishing using LLMs
By jailbreaking models like ChatGPT, attackers can automate the creation of convincing phishing emails by feeding the model target information.
#5about 11 minutes
Building a proof-of-concept AI phishing email generator
A demonstration shows how a tool uses an LLM and service enumeration via DNS records to generate highly targeted phishing emails.
#6about 7 minutes
How to defend against AI-powered attacks
Defenses include user awareness, verification processes like S/MIME and PGP, adopting passkeys, and attempting prompt injection attacks on suspected bots.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
13:23 MIN
Demonstrating deepfake attacks and social engineering
The AI Elections: How Technology Could Shape Public Sentiment
00:05 MIN
How AI accelerates and sophisticates cyber attacks
Tackling the Risks of AI - With AI
03:15 MIN
The perfection of social engineering with generative AI
WWC24 - Chris Wysopal, Helmut Reisinger and Johannes Steger - Fighting Digital Threats in the Age of AI
05:56 MIN
Protecting your online identity from AI-powered scams
WeAreDevelopers LIVE - Accessibility isn't magic, Longevity, Devrel in times of AI and more
12:04 MIN
The evolving cybersecurity landscape with AI
Fireside Chat with Cloudflare's Chief Strategy Officer, Stephanie Cohen (with Mike Butcher MBE)
33:41 MIN
Manipulating AI with prompt injection and hidden commands
WeAreDevelopers LIVE - Is Software Ever Truly Accessible?
22:33 MIN
How attackers use AI to refactor exploits
The AI Security Survival Guide: Practical Advice for Stressed-Out Developers
04:21 MIN
Fundamental AI vulnerabilities and malicious misuse
A hundred ways to wreck your AI - the (in)security of machine learning systems
Featured Partners
Related Videos
Deep Fakes: The Lies We Can’t See
George Proorocu
The AI Elections: How Technology Could Shape Public Sentiment
Martin Förtsch & Thomas Endres
WWC24 - Chris Wysopal, Helmut Reisinger and Johannes Steger - Fighting Digital Threats in the Age of AI
Chris Wysopal, Helmut Reisinger & Johannes Steger
The AI Security Survival Guide: Practical Advice for Stressed-Out Developers
Mackenzie Jackson
Hacking AI - how attackers impose their will on AI
Mirko Ross
A hundred ways to wreck your AI - the (in)security of machine learning systems
Balázs Kiss
Tackling the Risks of AI - With AI
Kai Grunwitz, Klaus Bürg & Tomislav Tipurić
Manipulating The Machine: Prompt Injections And Counter Measures
Georg Dresler
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.


Net Engineer with AI Focus
Speech Processing Solutions GmbH
Remote
€65K
Intermediate
GIT
DevOps
.NET Core
+5





AI & Cybersecurity Platforms Engineer
X-TENTION Informationstechnologie GmbH
€50K
Linux
Ansible
Kubernetes
Elasticsearch

AI & Cybersecurity Platforms Engineer
X-TENTION Informationstechnologie GmbH
€50K
Linux
Ansible
Kubernetes
Elasticsearch

AI Solutions Engineer Traust du dir zu, dass Millionen Kunden deiner KI täglich vertrauen?
Kern & Partner Personalmanagement GmbH - Personalberatung
Sankt Marien, Austria
Remote
€50-70K
Continuous Integration