{"id":78938,"date":"2024-09-04T14:10:03","date_gmt":"2024-09-04T17:10:03","guid":{"rendered":"https:\/\/abes.org.br\/?p=78938"},"modified":"2024-08-20T20:42:19","modified_gmt":"2024-08-20T23:42:19","slug":"trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/","title":{"rendered":"Trend Micro warns of growth of AI-based malicious tools in the criminal underworld"},"content":{"rendered":"<p style=\"text-align: center;\"><i>Cybersecurity leader deploys capabilities to stop deepfakes and protect resilience <\/i><i>of business<\/i><\/p>\n<p>Trend Micro&#039;s Threat Research Group, a global leader in cybersecurity, warns of the significant increase in AI-based tools available on the so-called dark web. Concerned about this advance, the company has just launched the\u00a0<a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/free-tools.html\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/free-tools.html&amp;source=gmail&amp;ust=1724239421669000&amp;usg=AOvVaw1OPUz9qTjwEMqNZntio_9U\">Trend Micro Deepfake Inspector<\/a>, new detection technology\u00a0<i>deepfake<\/i>\u00a0which is now available to consumers as a free download and will soon be included on the Trend Vision One\u2122 platform.<\/p>\n<p>Internet users can take advantage of Trend Micro Deepfake Inspector to protect themselves against scammers who use face-swapping technology during live video calls. In addition to using a variety of advanced methods to detect AI-generated content and adopting techniques such as image noise and color analysis, the solution evaluates user behavioral elements, providing a much more assertive approach against the action\u00a0<i>deepfak<\/i>and.<\/p>\n<p>\u201cThese new tools <i>deepfake<\/i>\u00a0make it easier for cybercriminals to carry out social engineering scams and attempts to circumvent security, which is why we are implementing new features to detect deepfakes and other forms of fraud that use artificial intelligence, aiming to protect our customers and consumers in general\u201d, highlights Kevin Simzer, COO of Trend Micro.<\/p>\n<p>Detecting and defeating AI-based attacks is essential to improving enterprise attack surface risk management and reducing digital risk for consumers. In a recent Trend Micro survey, 711% of respondents expressed a negative opinion about <i>deepfakes<\/i>, believing that one of its main uses is fraud. One\u00a0<i>deepfake<\/i>\u00a0If left undetected, it can lead to financial impacts, job losses, legal challenges, damage to the company&#039;s reputation, identity theft, and harm to mental and physical health.<\/p>\n<p><strong>The abuse of Generative AI by cybercrime<\/strong><\/p>\n<p>The commercialization of Generative AI tools in\u00a0<i>deepweb<\/i>\u00a0is growing at the same rate as the use of enterprise AI \u2013 and it is becoming cheaper and more accessible every day, allowing criminals of all skill levels to launch large-scale attacks with greater ease, tricking victims into extortion, identity theft, fraud or disinformation.<\/p>\n<p>According to researchers, just a few weeks after the release of the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/back-to-the-hype-an-update-on-how-cybercriminals-are-using-genai\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/back-to-the-hype-an-update-on-how-cybercriminals-are-using-genai&amp;source=gmail&amp;ust=1724239421670000&amp;usg=AOvVaw1KS9w6q-OUUZgJmIioDMD5\">report on Generative AI<\/a>, we can already see the emergence of more sophisticated tools for creating\u00a0<i>deepfak<\/i>e. Threat actors are proliferating offerings of Large Scale Language Models (LSLs).\u00a0<i>Large Language Models\u00a0<\/i>or LLMs), which criminally use deep learning algorithms and other technologies to increase the volume and extent of their reach.<\/p>\n<div id=\"attachment_78939\" style=\"width: 507px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-78939\" class=\"wp-image-78939\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/unnamed-3-1.png\" alt=\"\" width=\"497\" height=\"381\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/unnamed-3-1.png 497w, https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/unnamed-3-1-480x368.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 497px, 100vw\" \/><p id=\"caption-attachment-78939\" class=\"wp-caption-text\">Screenshots from Swapface&#039;s demo video showing how the software works<\/p><\/div>\n<p>Apps called Deepfake AI, SwapFace, and AvatarAI VideoCallSpoofer have also been made available. If their ads are to be believed, these apps could replace a face in a video with an entirely different one taken from just one or a few photos, though there are some key differences in how each offering works. While Deepfake AI supports recorded videos, SwapFace, for example, is implemented as a live video filter, even offering support for popular video streaming tools like Open Broadcast Software (OBS).<\/p>\n<p>These bots are specifically trained with malicious data, which includes malicious source code, methods, techniques, and other criminal strategies. \u201cThe need for such capabilities arises from the fact that commercial LLMs are programmed to refuse to comply with a request if it is considered malicious. In addition, attackers are often afraid to directly access services like ChatGPT for fear of being tracked and exposed,\u201d explains Fl\u00e1vio Silva, cybersecurity expert at Trend Micro.<\/p>\n<p>Fl\u00e1vio also points out that Jailbreak-as-a-service front-ends can supposedly bypass this censorship, as they wrap the user&#039;s malicious questions in a special prompt designed to trick a commercial LLM into giving an unfiltered answer.<\/p>\n<p>The demand for criminal LLMs is slowly but steadily growing. Older criminal LLMs such as WormGPT and DarkBERT, which were reported to be discontinued last year, are making a comeback. What\u2019s notable about the recent releases of DarkBERT and WormGPT is that both are offered as apps with a \u201cSiri kit\u201d option. This is presumably a voice-enabled option, similar to the recently released AI assistants Humane and Rabbit R1. This also coincides with Apple announcing the feature in the next iPhone update.<br \/>\nClick\u00a0<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/surging-hype-an-update-on-the-rising-abuse-of-genai\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/surging-hype-an-update-on-the-rising-abuse-of-genai&amp;source=gmail&amp;ust=1724239421670000&amp;usg=AOvVaw1M6nwqsMPNfp8b5t8VI73F\">ON HERE<\/a>\u00a0to read more details of the study\u00a0<i>\u201cSurging Hype \u2013 An Update on the Rising Abuse of GenAI<\/i>\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>L\u00edder em seguran\u00e7a cibern\u00e9tica implementa recursos para interromper deepfakes e proteger a resili\u00eancia dos neg\u00f3cios O Setor de Pesquisas de Amea\u00e7as da\u00a0Trend Micro, l\u00edder global em seguran\u00e7a cibern\u00e9tica, alerta para o aumento significativo de ferramentas baseadas em IA dispon\u00edveis na chamada dark web. Preocupada com esse avan\u00e7o, a empresa acaba de lan\u00e7ar o\u00a0Trend Micro Deepfake [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":78940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[5940,573,5939],"class_list":["post-78938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-capturas-de-tela","tag-dark-web","tag-ferramentas-maliciosas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime - ABES\" \/>\n<meta property=\"og:description\" content=\"L\u00edder em seguran\u00e7a cibern\u00e9tica implementa recursos para interromper deepfakes e proteger a resili\u00eancia dos neg\u00f3cios O Setor de Pesquisas de Amea\u00e7as da\u00a0Trend Micro, l\u00edder global em seguran\u00e7a cibern\u00e9tica, alerta para o aumento significativo de ferramentas baseadas em IA dispon\u00edveis na chamada dark web. Preocupada com esse avan\u00e7o, a empresa acaba de lan\u00e7ar o\u00a0Trend Micro Deepfake [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-04T17:10:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/ia-TREND-MICRO.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"891\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime\",\"datePublished\":\"2024-09-04T17:10:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/\"},\"wordCount\":853,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ia-TREND-MICRO.jpg\",\"keywords\":[\"Capturas de tela\",\"dark web\",\"ferramentas maliciosas\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/\",\"name\":\"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ia-TREND-MICRO.jpg\",\"datePublished\":\"2024-09-04T17:10:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ia-TREND-MICRO.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ia-TREND-MICRO.jpg\",\"width\":891,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro warns of the growth of AI-based malicious tools in the criminal underworld - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime - ABES","og_description":"L\u00edder em seguran\u00e7a cibern\u00e9tica implementa recursos para interromper deepfakes e proteger a resili\u00eancia dos neg\u00f3cios O Setor de Pesquisas de Amea\u00e7as da\u00a0Trend Micro, l\u00edder global em seguran\u00e7a cibern\u00e9tica, alerta para o aumento significativo de ferramentas baseadas em IA dispon\u00edveis na chamada dark web. Preocupada com esse avan\u00e7o, a empresa acaba de lan\u00e7ar o\u00a0Trend Micro Deepfake [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-09-04T17:10:03+00:00","og_image":[{"width":891,"height":500,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/ia-TREND-MICRO.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime","datePublished":"2024-09-04T17:10:03+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/"},"wordCount":853,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/ia-TREND-MICRO.jpg","keywords":["Capturas de tela","dark web","ferramentas maliciosas"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/","url":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/","name":"Trend Micro warns of the growth of AI-based malicious tools in the criminal underworld - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/ia-TREND-MICRO.jpg","datePublished":"2024-09-04T17:10:03+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/ia-TREND-MICRO.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/ia-TREND-MICRO.jpg","width":891,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/trend-micro-alerta-para-o-crescimento-de-ferramentas-maliciosas-baseadas-em-ia-no-submundo-do-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Trend Micro alerta para o crescimento de ferramentas maliciosas baseadas em IA no submundo do crime"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-14 07:15:22","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/78938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=78938"}],"version-history":[{"count":2,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/78938\/revisions"}],"predecessor-version":[{"id":78942,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/78938\/revisions\/78942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/78940"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=78938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=78938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=78938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}