Voice Cloning

HHS: Health Care IT Helpdesks Under Attack in Voice Scams
Jeffrey Burt | | cyberattacks in healthcare, Generative AI risks, healthcare, helpdesk, MFA, social engineering, SpearPhishing, Voice Cloning
Scammers are impersonating employees in voice calls to gain access to healthcare organizations' systems and steal money, the agency says ...
Security Boulevard

IBM Shows How Generative AI Tools Can Hijack Live Calls
IBM researchers have discovered a way to use generative AI tools to hijack live audio calls and manipulate what is being said without the speakers knowing. The “audio-jacking” technique – which uses ...
Security Boulevard

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
Tom Eston | | AI, AI-Powered, android, Apple, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Elderly, Episodes, Fraud, google, imessage, Information Security, Infosec, MMS, Podcast, Podcasts, Privacy, RCS, Rich Communication Services, Scams, security, Seniors, SMS, social engineering, technology, Voice Cloning, Weekly Edition
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/6
David Lindner, Director, Application Security | | AI, Attack, CISO, Cybersecurity, Cybersecurity Awareness Month, Scams, Thought Leaders, Voice Cloning
Insight #1 AI voice cloning is a problem: It’s reportedly taken the top spot in scam trends, particularly targeting seniors. “My voice is my passport” can no longer be a thing. ...

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
Tom Eston | | azure, Biden-Harris, china, Cyber Security, Cybersecurity, Cybersecurity Labeling Program, Data breach, Data Privacy, Digital Privacy, Episodes, Influencer, Information Security, Infosec, Mia Dio, Microsoft, phone scams, Podcast, Podcasts, Privacy, Scams, security, security breach, smart devices, technology, TikTok, Voice Cloning, Voice Cloning App, Weekly Edition, White House
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...

Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
Tom Eston | | AI Tools, ATM fraud, Chase Bank, Contactless Payment, Convenience vs Security, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Exynos Chipsets, Hidden Cameras, Information Security, Infosec, mobile device security, PIN Security, Podcast, Podcasts, Privacy, Remote Code Execution, ReSpeacher, Samsung Chipsets, security, Skimmer Technology, social engineering attacks, Tap-Enabled Debit Cards, Tavora, technology, Voice Cloning, Voice over LTE, Weekly Edition, WiFi Calling, zero-day vulnerabilities
In this episode we discuss Google’s discovery of 18 zero-day vulnerabilities in Samsung’s Exynos chipsets. We examine an AI-assisted social engineering campaign that combines emerging technologies with classic techniques. Finally, we look ...