{"id":71269,"date":"2024-01-10T14:02:09","date_gmt":"2024-01-10T17:02:09","guid":{"rendered":"https:\/\/abes.org.br\/?p=71269"},"modified":"2024-01-03T15:06:20","modified_gmt":"2024-01-03T18:06:20","slug":"trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/","title":{"rendered":"Trend Micro predicts a multiplication of attacks driven by Artificial Intelligence in 2024"},"content":{"rendered":"<p style=\"text-align: center;\"><em>The Security Predictions report points to an explosion in the use of Generative AI in cybercrime, mainly in phishing and credential theft<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-71270 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg\" alt=\"\" width=\"496\" height=\"278\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg 496w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA-480x269.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 496px, 100vw\" \/><\/p>\n<p>The use of Artificial Intelligence (AI), especially generative tools, in virtual scams will grow significantly in the coming years. The study &quot;<strong>Critical Scalability: Security Predictions for 2024<\/strong>, gives\u00a0<strong>Trend Micro<\/strong>, a global leader in cybersecurity, envisions a tsunami of sophisticated social engineering attacks, with tactics based on Generative AI tools fueled by credential theft.<\/p>\n<p>According to the report, the widespread availability and improved quality of Generative AI, along with the use of Generative Adversarial Networks (GANs), will shake up the phishing market in 2024. This transformation will enable the creation of hyper-active audio and video content. realistic \u2013 scammers will be able to pose as important executives, such as CEOs, to request money transfers \u2013 driving a new wave of Business Email Compromise (BEC) attacks, also known as \u201cCEO Fraud\u201d, in addition to virtual kidnappings, among other modalities of blows.<\/p>\n<p>\u201cAI and LLM (Large Language Models) capabilities, effective in any language, pose a significant threat as they eliminate traditional indicators of phishing, such as strange formatting or grammatical errors, making them extremely difficult to detect. Companies must adopt modern security controls to elevate their defenses and ensure resilience against these tactics,\u201d highlights Eric Skinner, vice president of Market Strategy at Trend Micro.<\/p>\n<p>Trend researchers say the prospect of ever-higher profits<strong>*<\/strong>\u00a0motivates cybercriminals to develop nefarious Generative AI tools for these campaigns, in addition to using legitimate tools to steal credentials and VPNs to hide identities.<\/p>\n<p>AI models themselves could also be targets in 2024. While AI models\u00a0<em>Machine Learning<\/em>\u00a0Cloud-based data sets are much more attractive, as Generative AI and LLM datasets are more difficult to influence, datasets that are more focused on what they are trained on can be selected for data compromise attacks with different objectives, from exfiltration of confidential information to blocking fraud filters and connected vehicles. These attacks already cost less than US$ 100 to carry out.<\/p>\n<p>These trends can, in turn, lead to improvements in the regulatory process, even encouraging the cybersecurity sector to take matters into its own hands. \u201cOver the next year, the cyber industry will begin to outpace the government when it comes to developing AI-specific security regulatory policies,\u201d says Greg Young, vice president of Cyber Security at Trend Micro. \u201cThe industry is moving quickly to self-regulate on an opt-in basis,\u201d he adds.<\/p>\n<p>The Trend Micro Forecasts report also highlights for 2024:<\/p>\n<p><strong>Increase in worm attacks<\/strong>\u00a0(a type of malware that multiplies on its own) cloud native, which targets vulnerabilities and misconfigurations and uses a high degree of automation to impact multiple containers, accounts and services, with minimal effort;<\/p>\n<p><strong>Need for investment in cloud security<\/strong>, crucial for organizations to resolve security gaps, with emphasis on the vulnerability of cloud-native applications and protection from automated attacks. Proactive measures, including robust defense mechanisms and thorough security audits, are essential to mitigate risks;<\/p>\n<p><strong>Increase in supply chain attacks<\/strong>, which will target not only Upstream (original) open source software components, but also telecommunications Security Management System (SIM) resources, essential for fleet and inventory systems. Cybercriminals should also exploit software supply chains through CI\/CD systems (<em>Continuous Integration\/ Continuous Delivery<\/em>, i.e., with continuous integration and delivery), with a specific focus on third-party components.<\/p>\n<p><strong>Growth of attacks on private blockchains<\/strong>, resulting from vulnerabilities in the implementation of a series of private blockchains. Hackers can use these weaknesses to modify, replace or delete entries and then demand a ransom. Alternatively, they could try to encrypt the entire blockchain if it is possible to take control of enough points.<\/p>\n<p>To read a full copy of the report \u201c<strong>Critical Scalability: Trend Micro Security Predictions for 2024\u00a0<\/strong>click<strong>\u00a0<\/strong><a href=\"https:\/\/resources.trendmicro.com\/Critical-Scalability-Trend-Micro-Security-Predictions-for-2024_PT.html\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn%3DBhuLd6MW35nqlouZAU26o-2Fyk01urj72urpLATRePWBqZdB7TG18Uh6e-2F8hH6gkCR8yqpuxWlXxEJkBZSJKGbW7pEldSsu-2B32XCPv7rcqKx0mDd8uvBxAqX0q2IconZDDQxC6lwBo4H9ROGrGMKc4GjW0A-2FT1eT8y3XznwLFRCVo-3DSA4X_YMJdYxCsbA3IVx986czIdcxVDbRuuRZKdewNY-2FQm19Qpl9e89HluYQ-2FB-2BgTgrC1HpU91d0N0RV19VAzUiBcxJofzHlDSIJLDt9E3i3ynI7H5fUv7plHLs4sYG7yECoS9qWvKuALd9R29NkhwqsAyC8KzRTCib7oM-2BiP1GWPSa1XecCcKrEQz-2BuapN4UlpyoWQg61A8n7jnRP3IlLglydpoGNOecLQaqofSFt-2FPPEtcw-3D&amp;source=gmail&amp;ust=1704374370781000&amp;usg=AOvVaw3uGEkpe76C3baG9CZ7hov1\"><strong>ON HERE<\/strong><\/a><strong>.<\/strong><\/p>\n<p><em>* BEC has cost victims more than US$ 2.7 billion in 2021, according to the FBI.<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>O relat\u00f3rio de Previs\u00f5es de Seguran\u00e7a aponta uma explos\u00e3o do uso de IA Generativa pelo cibercrime, principalmente em phishing e roubo de credenciais O uso da Intelig\u00eancia Artificial (IA), especialmente de ferramentas generativas, em golpes virtuais vai crescer significativamente nos pr\u00f3ximos anos. O estudo \u201cCritical Scalability: Previs\u00f5es de Seguran\u00e7a para 2024, da\u00a0Trend Micro, l\u00edder global [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":71270,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[4976,3824,4975,2934],"class_list":["post-71269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-blockchains-privadas","tag-ia-generativa","tag-previsoes-de-seguranca","tag-seguranca-na-nuvem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024 - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024 - ABES\" \/>\n<meta property=\"og:description\" content=\"O relat\u00f3rio de Previs\u00f5es de Seguran\u00e7a aponta uma explos\u00e3o do uso de IA Generativa pelo cibercrime, principalmente em phishing e roubo de credenciais O uso da Intelig\u00eancia Artificial (IA), especialmente de ferramentas generativas, em golpes virtuais vai crescer significativamente nos pr\u00f3ximos anos. O estudo \u201cCritical Scalability: Previs\u00f5es de Seguran\u00e7a para 2024, da\u00a0Trend Micro, l\u00edder global [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-10T17:02:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"828\" \/>\n\t<meta property=\"og:image:height\" content=\"464\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024\",\"datePublished\":\"2024-01-10T17:02:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro-IA.jpg\",\"keywords\":[\"blockchains privadas\",\"IA generativa\",\"Previs\u00f5es de Seguran\u00e7a\",\"seguran\u00e7a na nuvem\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/\",\"name\":\"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024 - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro-IA.jpg\",\"datePublished\":\"2024-01-10T17:02:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro-IA.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Trend-Micro-IA.jpg\",\"width\":828,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024 - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024 - ABES","og_description":"O relat\u00f3rio de Previs\u00f5es de Seguran\u00e7a aponta uma explos\u00e3o do uso de IA Generativa pelo cibercrime, principalmente em phishing e roubo de credenciais O uso da Intelig\u00eancia Artificial (IA), especialmente de ferramentas generativas, em golpes virtuais vai crescer significativamente nos pr\u00f3ximos anos. O estudo \u201cCritical Scalability: Previs\u00f5es de Seguran\u00e7a para 2024, da\u00a0Trend Micro, l\u00edder global [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-01-10T17:02:09+00:00","og_image":[{"width":828,"height":464,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024","datePublished":"2024-01-10T17:02:09+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/"},"wordCount":796,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg","keywords":["blockchains privadas","IA generativa","Previs\u00f5es de Seguran\u00e7a","seguran\u00e7a na nuvem"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/","url":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/","name":"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024 - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg","datePublished":"2024-01-10T17:02:09+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/01\/Trend-Micro-IA.jpg","width":828,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/trend-micro-preve-multiplicacao-de-ataques-impulsionados-por-inteligencia-artificial-em-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Trend Micro prev\u00ea multiplica\u00e7\u00e3o de ataques impulsionados por Intelig\u00eancia Artificial em 2024"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-28 14:20:57","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/71269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=71269"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/71269\/revisions"}],"predecessor-version":[{"id":71271,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/71269\/revisions\/71271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/71270"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=71269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=71269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=71269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}