{"id":79087,"date":"2024-09-10T13:00:36","date_gmt":"2024-09-10T16:00:36","guid":{"rendered":"https:\/\/abes.org.br\/?p=79087"},"modified":"2024-08-22T21:05:57","modified_gmt":"2024-08-23T00:05:57","slug":"cibercrime-usa-ia-para-ampliar-ameacas","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/cibercrime-usa-ia-para-ampliar-ameacas\/","title":{"rendered":"Cybercrime uses AI to amplify threats"},"content":{"rendered":"<p style=\"text-align: center;\"><i>Attacks are now incorporating AI into their arsenal of weapons, making the work of security teams even more difficult<\/i><\/p>\n<p>A recent article from Help Net Security claims that \u201cAI-powered phishing attacks are fooling even the most alert users.\u201d Meanwhile, SlashNext\u2019s The State of Phishing 2024 report identifies a staggering 8,56% increase in malicious emails over the past 12 months and a 4,151% increase in malicious emails since the launch of ChatGPT.<u><\/u><u><\/u><\/p>\n<p>\u201cThis increase can be attributed to AI-driven automation adopted by cybercriminals, who create and send phishing emails by learning from massive datasets of previous emails. Cybercriminals using AI convincingly mimic the style, look and tone of corporate communications, increasing the chances of deceiving recipients,\u201d said Caio Sposito, country manager for Brazil at Arcserve, the world\u2019s most experienced provider of immutable backup, recovery and storage solutions for unified data resilience against ransomware.<u><\/u><u><\/u><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79089 alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime.jpg\" alt=\"\" width=\"266\" height=\"266\" \/><\/p>\n<p>After noting that phishing is just one of several types of cybercrime that are on the rise, Caio Sposito emphasizes that companies need to adopt a multilayered approach to data protection, including the adoption of comprehensive and effective security programs. \u201cAll company employees need to understand this multi-threat scenario, which also involves other dangers such as malware, ransomware and social engineering,\u201d warns the executive.<u><\/u><u><\/u><\/p>\n<p>Details such as using strong and different passwords for each platform, and using encryption and secure methods for data transmission are of the utmost importance, as is the adoption of specific cybersecurity policies, including the use of personal and company devices. The worst-case scenario should also be anticipated, defining who should be informed and how to proceed in the event of a suspected security breach, ransomware attack or other cyber incident.<u><\/u><u><\/u><\/p>\n<p>\u201cSince IT teams are often overwhelmed, it may be an interesting alternative to outsource internal security training,\u201d recommends the executive, who believes that implementing immutable storage is vital. This feature allows backups to be saved in the write-once-read-many (Worm) format, in which data is written only once, preventing unauthorized users from making any changes or deletions.<u><\/u><u><\/u><\/p>\n<p>\u201cAI will continue to evolve, constantly generating threats and vulnerabilities. Successfully addressing the new challenges presented by cybercriminals involves planning and implementing a solid security strategy, adopting defenses that also incorporate AI-driven capabilities,\u201d predicts Caio Sposito.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ataques passam a incorporar IA em seu arsenal de armas, tornando ainda mais dif\u00edcil o trabalho das equipes de seguran\u00e7a Recente artigo da Help Net Security afirma que \u201cos ataques de phishing impulsionados por IA enganam at\u00e9 os usu\u00e1rios mais atentos.&#8221; Enquanto isso, o relat\u00f3rio The State of Phishing 2024 da SlashNext identifica um aumento [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":79093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[5958,5957,620],"class_list":["post-79087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-cibercrime-com-ia","tag-phishing-impulsionados","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cibercrime usa IA para ampliar amea\u00e7as - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/cibercrime-usa-ia-para-ampliar-ameacas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibercrime usa IA para ampliar amea\u00e7as - ABES\" \/>\n<meta property=\"og:description\" content=\"Ataques passam a incorporar IA em seu arsenal de armas, tornando ainda mais dif\u00edcil o trabalho das equipes de seguran\u00e7a Recente artigo da Help Net Security afirma que \u201cos ataques de phishing impulsionados por IA enganam at\u00e9 os usu\u00e1rios mais atentos.&#8221; Enquanto isso, o relat\u00f3rio The State of Phishing 2024 da SlashNext identifica um aumento [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/cibercrime-usa-ia-para-ampliar-ameacas\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-10T16:00:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"839\" \/>\n\t<meta property=\"og:image:height\" content=\"470\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Cibercrime usa IA para ampliar amea\u00e7as\",\"datePublished\":\"2024-09-10T16:00:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/\"},\"wordCount\":474,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IA-cibercrime-1.jpg\",\"keywords\":[\"Cibercrime com IA\",\"phishing impulsionados\",\"Ransomware\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/\",\"name\":\"Cibercrime usa IA para ampliar amea\u00e7as - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IA-cibercrime-1.jpg\",\"datePublished\":\"2024-09-10T16:00:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IA-cibercrime-1.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IA-cibercrime-1.jpg\",\"width\":839,\"height\":470},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/cibercrime-usa-ia-para-ampliar-ameacas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibercrime usa IA para ampliar amea\u00e7as\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime uses AI to amplify threats - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/cibercrime-usa-ia-para-ampliar-ameacas\/","og_locale":"en_US","og_type":"article","og_title":"Cibercrime usa IA para ampliar amea\u00e7as - ABES","og_description":"Ataques passam a incorporar IA em seu arsenal de armas, tornando ainda mais dif\u00edcil o trabalho das equipes de seguran\u00e7a Recente artigo da Help Net Security afirma que \u201cos ataques de phishing impulsionados por IA enganam at\u00e9 os usu\u00e1rios mais atentos.&#8221; Enquanto isso, o relat\u00f3rio The State of Phishing 2024 da SlashNext identifica um aumento [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/cibercrime-usa-ia-para-ampliar-ameacas\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-09-10T16:00:36+00:00","og_image":[{"width":839,"height":470,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime-1.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Cibercrime usa IA para ampliar amea\u00e7as","datePublished":"2024-09-10T16:00:36+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/"},"wordCount":474,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime-1.jpg","keywords":["Cibercrime com IA","phishing impulsionados","Ransomware"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/","url":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/","name":"Cybercrime uses AI to amplify threats - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime-1.jpg","datePublished":"2024-09-10T16:00:36+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime-1.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IA-cibercrime-1.jpg","width":839,"height":470},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/cibercrime-usa-ia-para-ampliar-ameacas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Cibercrime usa IA para ampliar amea\u00e7as"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-20 08:25:48","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/79087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=79087"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/79087\/revisions"}],"predecessor-version":[{"id":79094,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/79087\/revisions\/79094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/79093"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=79087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=79087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=79087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}