Computer

Cyber ​​attacks in 2024, the growth of GenAI

Generative artificial intelligence it is a tool with infinite potential that can completely redesign the world of technology, both in terms of productivity and both for entertainment.

But the proliferation of these new AI solutions is not only used for “beneficial” purposes and the flip side of the coin clearly shows how through these systems also cyber attacks can level up and become an even more tangible threat.

For this reason, the forecasts are not at all surprising Trend Micro which indicate an exponential growth in prices by 2024 hacker attacks carried out by generative AIa trend that unfortunately seems destined to become increasingly important in the field of cyber security.

How cyber threats are changing with AI

Given the ever-increasing diffusion of generative artificial intelligences and given the potential of these tools, it is clear that a large number of companies are investing in this sectorimagining this technology as a real tool to rethink productivity.

However, what is not yet clear is that it should be done reprogram these investments also aiming at IT security which, more than ever, is at risk precisely because of artificial intelligence.

These tools, in fact, on the one hand have greatly simplified the work of people, who can count on being very efficient smart assistants ready to carry out any task assigned to them.

On the other hand, however, the same potential can also be exploited by digital attackers who will have a weapon on their side for steal data and personal information in an even simpler way, even delegating the crime to the AI ​​which, clearly, will simply carry out what is requested without judging whether it is right or wrong.

At the same time, artificial intelligence can also become one identity theft toolwith the possibility of clone people’s voices and create increasingly elaborate and truly difficult to recognize scams.

Especially now that digital identity of people is a central topic of real life and life behind a screen, a malicious use of these innovations could lead to even greater chaos.

The other negative factor of these tools leads irremediably to another of the hot topics of recent years: the fake news.

An AI is not only capable of generating “credible” fake news but is also capable of giving life to deepfake images and videos which could be so convincing as to undermine people’s reputations, even succeeding in influence public opinion regarding those topics deemed sensitive, such as electionsfor example, the war in the Middle East or the one in Ukraine.

In view of the elections in the USA, according to experts, software based on generative artificial intelligence will add to the already decidedly high “noise” of disinformationa truly terrifying possibility that could affect the outcome of the votes and become a sort of propaganda 2.0ready to confuse people further.

Predictions for the future

Since the dawn of the idea of generative artificial intelligencemany have considered this technology to be a double-edged sword which, excluding a certain type of catastrophe filmography, can radically change the course of history.

Second an FBI reportthis type of crime is destined for truly impressive growth in the coming years, which is why the experts’ advice is to take action from today, trying to limit the damage and predict (and prevent) any unwanted side effects.

Easier said than done, mostly in the absence of targeted policies who have a clear vision of the problem (and the opportunities that arise from the use of these technologies) and who know develop a system of standards e di impediments aimed at regulate the use of AI and, physically, what they can or cannot do.

It is a necessary gesture which, naturally, could impose temporary brakes on the spread of these technologies but which, in the end, could prove to be the only solution to imagine them as a tool for doing goodrather than as a weapon ready to turn against those who use it.

To know more:

  • Artificial Intelligence: what it is and what it can do for us
  • Computer security: guide to safe browsing on the web

Leave a Reply

Your email address will not be published. Required fields are marked *