Artificial intelligence (AI) is a problem for cybersecurity

Related

Digital Reserve成为2026香港Web3嘉年华二级展位赞助商

Digital Reserve已确认加入2026香港Web3嘉年华,将作为二级展位赞助商为大会提供支持 Digital Reserve 是一家澳洲持牌的加密货币出入金与交易平台,深耕行业多年、穿越多轮牛熊周期,凭借对华人市场的深刻理解、完善的银行通道与高质量服务,持续为专业客户提供稳定、顺畅的数字资产流动解决方案。更多信息: https://digitalreserve.net/ 香港Web3嘉年华是由万向区块链实验室与HashKey Group联合推出的Web3活动品牌,由W3ME承办,自2023年起于每年4月在香港会议展览中心举办,聚焦行业热点话题与政策趋势,是亚洲规模最大、最受关注的Web3行业盛会之一。 2026香港Web3嘉年华将于4月20日-23日在香港会议展览中心盛大举行。自2023年首届举办以来,香港Web3嘉年华已飞速成长为全球最具影响力的加密峰会之一,为全球东西方交流构建了一个高规格、高质量、高纵深的平台。过往三届盛会累计吸引超10万名现场参会者,汇聚超350个前沿项目参加,邀请超1200位演讲嘉宾分享,并衍生超400场周边活动,成功构建了一个以大会为核心、辐射全港的活力生态圈。 目前,香港特别行政区财政司司长陈茂波,香港证监会中介机构部执行董事叶志衡,万向区块链董事长、Hashkey Group董事长兼CEO肖风,香港特别行政区立法会议员(科技创新界)邱达根,Solana Foundation总裁Lily Liu,MatrixPort创始合伙人及首席商务官Cynthia Wu,Animoca...

卓锐证券成为2026香港Web3嘉年华白金赞助商

Hong Kong, 5th March 2026, 卓锐证券已确认加入2026香港Web3嘉年华,将作为白金赞助商为大会提供支持。 卓锐证券(香港)有限公司(中央编号:BRE865)是香港证监会认可持牌法团,持有第1、2、4、5、9类牌照。作为全港增速TOP1的持牌虚拟资产券商*,卓锐证券专注构建合规安全的交易生态,实现传统资产与加密货币的无缝流动。通过自主研发的一站式交易平台“ZR”,投资者只需一个账户,即可借助AI赋能的机构级视野,灵活配置股票、ETF及加密货币。了解更多:https://www.zr.hk/ 香港Web3嘉年华是由万向区块链实验室与HashKey Group联合推出的Web3活动品牌,由W3ME承办,自2023年起于每年4月在香港会议展览中心举办,聚焦行业热点话题与政策趋势,是亚洲规模最大、最受关注的Web3行业盛会之一。 2026香港Web3嘉年华将于4月20日-23日在香港会议展览中心盛大举行。自2023年首届举办以来,香港Web3嘉年华已飞速成长为全球最具影响力的加密峰会之一,为全球东西方交流构建了一个高规格、高质量、高纵深的平台。过往三届盛会累计吸引超10万名现场参会者,汇聚超350个前沿项目参加,邀请超1200位演讲嘉宾分享,并衍生超400场周边活动,成功构建了一个以大会为核心、辐射全港的活力生态圈。 目前,香港特别行政区财政司司长陈茂波,香港证监会中介机构部执行董事叶志衡,万向区块链董事长、Hashkey Group董事长兼CEO肖风,香港特别行政区立法会议员(科技创新界)邱达根,Solana Foundation总裁Lily Liu,MatrixPort创始合伙人及首席商务官Cynthia...

Sui stablecoin USDsui debuts as new backbone for on-chain payments and DeFi

Backed by institutional-grade infrastructure and strong demand for digital...

Share

With cybersecurity, we mean protection against digital attacks, and even in this field, the hottest topic now is artificial intelligence (AI). 

Trend Micro reveals it in its latest annual “predictions report” for 2024. 

Cybersecurity: the problem of artificial intelligence (AI)

The risks, as usual, are many and of different types, but one of the focuses that the report concentrates on is the so-called generative artificial intelligence (GenAI). 

From a cybersecurity perspective, generative AI will increase the level and effectiveness of social engineering baits produced by scammers to try to lure potential victims. 

The Trend Micro report predicts that by 2024 voice cloning will be at the center of targeted scams, in addition to already being a powerful tool for identity theft and social engineering. 

In addition to this, there are other techniques that exploit artificial intelligence such as spear phishing, harpoon whaling, and virtual kidnappings, which are just the tip of the iceberg of the role that generative AI can play within computer criminal schemes.

Although in 2023 the WormGPT based on the LLM (Large Language Model) was shut down, they predict that a greater quantity of its spawns will populate the dark web. Furthermore, scammers will always find new ways to exploit artificial intelligence for their cybercriminal activities.

Furthermore, the legislation to regulate the use of generative artificial intelligence has yet to be approved, therefore it is essential for defenders to implement zero trust policies and establish a vigilant mindset for their respective companies, in order to avoid falling prey to scams based on AI.

The problems related to blockchain

In addition to AI, other problems could also arise from private blockchains. 

The report argues that the blockchain will serve as a new hunting ground for scammers, especially private blockchains that more and more companies are turning to in order to reduce costs. 

In fact, private blockchains generally have to face fewer stress tests and do not reach the same level of resilience as decentralized and permissionless public blockchains. 

These latest ones indeed face constant attacks, and over time they face and effectively overcome so many stress tests that they end up being secure. However, cybercriminals will probably prefer less secure private ones. 

In the crypto and Web3 field, Trend Micro also identifies threats related to decentralized autonomous organizations (DAO) governed by self-executing smart contracts hosted on public blockchains.

Some problems in this regard have already been observed, for example, in those who use smart contracts as a weapon to add levels of complexity to crimes related to cryptocurrencies against decentralized finance platforms (DeFi).

The other problems

The report adds to these threats also those related to artificial intelligence/machine learning (AI/ML) and the cloud. 

Machine learning actually always has to do with AI, even if not necessarily with the above-mentioned generative artificial intelligence. 

The cloud, on the other hand, is the remote storage of data on third-party online platforms. 

The report states that, as cloud adoption becomes increasingly critical for businesses, they must look far beyond malware and routine vulnerabilities in their computer systems. 

They argue that in 2024 cloud environments will be a playground for custom-made worms to exploit cloud technologies, with incorrect configurations serving as an easy entry point for attackers.

In addition, the possible poisoning of data stored in the cloud will also make machine learning (ML) models vulnerable, and a compromised ML model can open the doors to the disclosure of confidential data, or the writing of malicious instructions, or the provision of distorted content that could lead to user dissatisfaction or potential legal repercussions.

Artificial Intelligence (AI) and scams: cybersecurity in danger

In the crypto field, the main problem probably won’t be pure cyber attacks, which have always existed and will always exist, but mainly target the most vulnerable systems.

The main problem could be scams, and scammers could greatly enhance their social engineering techniques thanks to GenAI. 

In fact, several fake videos created with artificial intelligence have already circulated in 2023, and they are hardly recognizable as such, in which unaware VIPs were seen promoting real scams. 

Reproducing the image and voice of a famous character with AI to make them say whatever you want is no longer so difficult, and the VIP can intervene to block the spread of these videos only when they have already been published and distributed online. 

The key point, still widely underestimated by many, is not to recognize whether a digital content is authentic or not, but to verify which was the primary source that first published and distributed it online. 

If the primary source cannot be found, or if it is found to be an unreliable source, that content should be ignored without even bothering to examine it to determine if it is false or not. Only if the primary source is found and is reliable is it worth examining, and if the source is credible, this alone may be enough to imagine that it could be true. 

However, this is a process that almost always ordinary people do not do, and unfortunately nowadays a good part of information professionals do not do either, whose main job should be precisely this (identifying and verifying sources).