Source: www.securityweek.com – Author: SecurityWeek News
Ever wonder how cybercriminals infiltrate payment systems and steal funds? Join SecurityWeek and Rachel Tobac, ethical hacker and CEO of Social Proof Security, and Mahmood Khan, CISO, CNA Insurance, for this eye-opening session that pulls back the curtain on how bad actors exploit social engineering tactics, like deepfake technology and Business Email Compromise (BEC), to target your company’s bottom line.
Key Takeaways:
- Live Attack Demonstration: A step-by-step walkthrough of a deepfake and BEC attack, where hackers use email, video, and voice manipulation to impersonate executives or vendors and dupe employees into transferring money to fraudulent accounts.
- Insights on Emerging Threats: Learn how the integration of AI and deepfake technology makes these attacks more convincing and harder to detect, even for vigilant employees.
- Actionable Defense Strategies: Gain practical steps for finance, IT, and security teams to enhance defenses, focusing on key financial processes and roles most vulnerable to high-cost attacks.
Don’t miss this chance to learn how hackers operate and gain the knowledge to strengthen your defenses against deepfake and BEC fraud.
Sponsored by:

More from SecurityWeek News
- In Other News: Cloudflare Abuse, UK and EU Cybersecurity Reports, FBI Gen-AI Alert
- Watch Now: Cyber AI & Automation Summit- All Sessions Available On Demand
- In Other News: OPPC Breach Impacts 1.7M, US Soldier Suspected in Snowflake Hack, Cloudflare Loses Logs
- In Other News: Nvidia Fixes Critical Flaw, Chinese Linux Backdoor, New Details in WhatsApp-NSO Lawsuit
- Trustero Secures $10 Million in Funding to Grow AI-Powered Security and Compliance Platform
- CISA Director Jen Easterly to Step Down
- In Other News: TSA Wants New Cyber Rules, Scam Call Detection in Android, SIM Swappers Arrested
- CISO Forum Virtual Summit: Full Session List On Demand
Latest News
- Apple Pushes Major iOS, macOS Security Updates
- No Doughnuts Today? Cyberattack Puts Krispy Kreme in a Sticky Situation
- BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections
- Google Pays $55,000 for High-Severity Chrome Browser Bug
- Atlassian, Splunk Patch High-Severity Vulnerabilities
- Cleo Vulnerability Exploitation Linked to Termite Ransomware Group
- Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration
- 446,000 Impacted by Center for Vein Restoration Data Breach
Daily Briefing Newsletter
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.
Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.
Original Post URL: https://www.securityweek.com/webinar-today-inside-a-hackers-playbook-how-cybercriminals-use-deepfakes/
Category & Tags: Artificial Intelligence – Artificial Intelligence
Views: 2