Common Information
Type | Value |
---|---|
Value |
Artificial Intelligence - T1588.007 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) For example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | How Organizations Are Fulfilling CISA’s Secure by Design Pledge | ||
Details | Website | 2024-11-17 | 0 | AI Model Robustness: A New Frontier in Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | Artificial Intelligence and Security: A Predestined Partnership | ||
Details | Website | 2024-11-17 | 0 | Cybersecurity in Autonomous Vehicles: Safeguarding the Future of Mobility | ||
Details | Website | 2024-11-17 | 15 | Hunting for Default Credentials: A Deeper Dive into the Toolkit | ||
Details | Website | 2024-11-17 | 0 | Thousands of suspicious SIM cards active abroad to be blocked | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 0 | From Reactive to Proactive: Leveraging Cyber Scenarios for Resilient Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | From Detection to Response: The Power of XDR in Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | The Security illusion: Why Two-Factor Authentication is No Longer Enough | ||
Details | Website | 2024-11-17 | 0 | AI’s Game-Changing Impact on Mobile Security | ||
Details | Website | 2024-11-17 | 0 | Susquehanna Raises Target to $90 Amid Strong Q3 Performance and AI-Driven Cybersecurity Growth | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 2 | 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders | ||
Details | Website | 2024-11-17 | 0 | ChatGPT Security Risks for Business: The Essential Checklist for Protection | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-16 | 3 | What Does Google’s Cybersecurity Forecast for 2025 Reveal? | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity 2024: Emerging Trends and Challenging Threats to Look Out for | ||
Details | Website | 2024-11-16 | 0 | The Importance Of Data Privacy In The Digital Age | ||
Details | Website | 2024-11-16 | 0 | GZR Observer Daily — Nov 16, 2024 | ||
Details | Website | 2024-11-16 | 0 | Exploring Side-Channel Attacks: Understanding the Risks and Defenses | ||
Details | Website | 2024-11-16 | 0 | A Comprehensive Guide to Best IoT Courses in Delhi: Achieve More with Bytecode Cyber Security | ||
Details | Website | 2024-11-16 | 0 | Why Database Security Is Essential for Modern Businesses | ||
Details | Website | 2024-11-16 | 0 | Artificial Intelligence, Redesigning the Future: | ||
Details | Website | 2024-11-16 | 0 | Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | Top 5 Technologies to Learn In 2024 | ||
Details | Website | 2024-11-16 | 0 | IGP: Police to tap FBI, China cops for expertise on new squad to fight AI, deepfake cybercrime | #cybercrime | #infosec | National Cyber Security Consulting |