What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity.
Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead.
Impactful Moments:
00:00 - Introduction
01:56 - Iain shares his journey with AI
03:29 - Demonstrating voice cloning in real-time
06:31 - Risks of automated synthetic voice attacks
09:46 - Impact of AI on social engineering tactics
11:00 - Importance of "vibe checks" in cybersecurity
15:17 - Real-world phishing and HR scam example
20:00 - Uncanny Valley: Defense against AI deception
23:37 - The future of AI in adversary emulation
Links:
Connect with our guest, Iain Jackson: / iain-j-98578a238
Learn more about CovertSwarm here: https://covertswarm.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
/ hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Поделиться в:
Доступные форматы для скачивания:
Скачать видео mp4
Информация по загрузке:
Скачать аудио mp3
Похожие видео
array(20) {
["FrUZB9aswDc"]=>
object(stdClass)#7651 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "FrUZB9aswDc"
["related_video_title"]=>
string(55) "Championing the Human in Cybersecurity with Julie Haney"
["posted_time"]=>
string(28) "11 месяцев назад"
["channelName"]=>
NULL
}
["-8zrQggsVJU"]=>
object(stdClass)#7655 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-8zrQggsVJU"
["related_video_title"]=>
string(180) "«Я понял, что это конец»: как создатель «Алисы» уволился из «Сбера», эмигрировал и строит AI-стартап"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
["QI7oUwNrQ34"]=>
object(stdClass)#7649 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "QI7oUwNrQ34"
["related_video_title"]=>
string(86) "Цепи Маркова — математика предсказаний [Veritasium]"
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
NULL
}
["7xZIZnMUbZU"]=>
object(stdClass)#7660 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7xZIZnMUbZU"
["related_video_title"]=>
string(160) "АДВОКАТ: Как помешать полицейским использовать эту новую технологию для слежки за вами"
["posted_time"]=>
string(22) "13 дней назад"
["channelName"]=>
NULL
}
["Se91Pn3xxSs"]=>
object(stdClass)#7643 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Se91Pn3xxSs"
["related_video_title"]=>
string(70) "You Have 3 Years Left BEFORE Everything Gets Rewritten | Emad Mostaque"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["Uy6PPMRhm2E"]=>
object(stdClass)#7662 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Uy6PPMRhm2E"
["related_video_title"]=>
string(93) "Building Trust, Collaboration, and a People-First Culture with Jen Easterly, Director of CISA"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["hFS7xONBJSE"]=>
object(stdClass)#7647 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "hFS7xONBJSE"
["related_video_title"]=>
string(57) "Bryce Case Jr. AKA YTCracker - Anonymous Hacker | SRS #85"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["Fl5sm9noHJo"]=>
object(stdClass)#7661 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Fl5sm9noHJo"
["related_video_title"]=>
string(182) "Россия без иномарок и айфонов: последствия утильсбора и техсбора | Экономика, налоги, цены, смартфон"
["posted_time"]=>
string(24) "13 часов назад"
["channelName"]=>
NULL
}
["7MIoFxwawc0"]=>
object(stdClass)#7637 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7MIoFxwawc0"
["related_video_title"]=>
string(51) "What Does a Former Black Hat Hacker Carry Everyday?"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["3D6gaawXwfk"]=>
object(stdClass)#7654 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "3D6gaawXwfk"
["related_video_title"]=>
string(27) "Using AI to become a Hacker"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["htez3rhhPO8"]=>
object(stdClass)#7650 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "htez3rhhPO8"
["related_video_title"]=>
string(65) "FREE Ethical Hacking course (70 hours & includes Kali Linux labs)"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
NULL
}
["AsnaqTCA95o"]=>
object(stdClass)#7658 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AsnaqTCA95o"
["related_video_title"]=>
string(45) "Email Phishing / Spoofing with Inbox Delivery"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["lyjmjSVmQAQ"]=>
object(stdClass)#7644 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lyjmjSVmQAQ"
["related_video_title"]=>
string(103) "Как ИИ без тормозов помогает преступникам | Первый отдел"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
["OCjh8AULc8Y"]=>
object(stdClass)#7642 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "OCjh8AULc8Y"
["related_video_title"]=>
string(70) "2025 Ethical Hacker Roadmap with lots of free training (NOT Sponsored)"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
NULL
}
["4ahIeL3U2g4"]=>
object(stdClass)#7640 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4ahIeL3U2g4"
["related_video_title"]=>
string(177) "«Макс» — только начало: Кремль закладывает фундамент для цифрового железного занавеса | Разборы"
["posted_time"]=>
string(21) "1 день назад"
["channelName"]=>
NULL
}
["eYaHmlHriXE"]=>
object(stdClass)#7641 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "eYaHmlHriXE"
["related_video_title"]=>
string(122) "Учимся учиться: осваиваем основы кибербезопасности с Ричем Грином"
["posted_time"]=>
string(25) "4 недели назад"
["channelName"]=>
NULL
}
["nJ30BExZlEw"]=>
object(stdClass)#7638 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "nJ30BExZlEw"
["related_video_title"]=>
string(115) "OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!"
["posted_time"]=>
string(25) "4 месяца назад"
["channelName"]=>
NULL
}
["75TXqu951xA"]=>
object(stdClass)#7639 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "75TXqu951xA"
["related_video_title"]=>
string(36) "Is AI Replacing Cyber Security Jobs?"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["MuSIys2AOzw"]=>
object(stdClass)#7627 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "MuSIys2AOzw"
["related_video_title"]=>
string(147) "Есть ли у вас все необходимое, чтобы попасть в сферу кибербезопасности в 2024 году?"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
NULL
}
["SV3JI_j2tZc"]=>
object(stdClass)#7628 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "SV3JI_j2tZc"
["related_video_title"]=>
string(0) ""
["posted_time"]=>
string(25) "4 недели назад"
["channelName"]=>
NULL
}
}