Introduction
At a recent Cyber Security & Cloud Expo Europe session, Raviv Raz, Cloud Security Manager at ING, shared about the realm of AI-driven cybercrime. Drawing from his vast experience, Raz highlighted the dangers of AI in the wrong hands and stressed the importance of taking this issue seriously. For those eager to safeguard against cyber threats, learning about AI-powered cybercrime is crucial.

OUTPREPARED II: Leading Cybersecurity Strategy in the Age of AI
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
The Perfect Cyber Weapon
Raz explored the concept of “the perfect cyber weapon” that operates silently, without any command and control infrastructure, and adapts in real-time. His vision, though controversial, highlighted the power of AI in the wrong hands and the potential to disrupt critical systems undetected.

SUNNYSONG Digital Ultrasonic Flaw Detector KUT 680, Portable UT Flaw Detector, Multi-Functional Defect Detection and Analysis Tool for Iron and Steel Metallurgy, Metalworking, Quality Inspection
Product Benefit: This digital ultrasonic flaw detector is a versatile tool for steel metallurgy, metal processing, and quality…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
AI in the Hands of Common Criminals
Raz shared the story of a consortium of banks in the Netherlands that built a proof of concept for an AI-driven cyber agent capable of executing complex attacks. This demonstration showcased that AI is no longer exclusive to nation-states, and common criminals can now carry out sophisticated cyberattacks with ease.

64GB Magnetic Voice Activated Recording Device – BUKUCCETA (9880 Hour) Digital Voice Recorder with AI Noise Reduction, Portable Audio Recorder for Lectures, Meetings, and Interviews
【AI-Powered Noise Reduction】Utilizing cutting-edge AI noise cancellation and an upgraded DSP 4.0 chip, this a28io recorder effectively eliminates…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
Malicious AI Techniques
Raz discussed AI-powered techniques such as phishing attacks, impersonation, and the development of polymorphic malware. These techniques allow cybercriminals to craft convincing messages, create deepfake voices, and continuously evolve malware to evade detection.


The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
The Urgency for Stronger Defenses
Raz’s presentation served as a wake-up call for the cybersecurity community, emphasizing the need for organizations to continually bolster their defenses. As AI advances, the line between nation-state and common criminal cyber activities becomes increasingly blurred.
Looking Towards the Future
In this new age of AI-driven cyber threats, organizations must remain vigilant, adopt advanced threat detection and prevention technologies, and prioritize cybersecurity education and training for their employees. The evolving threat landscape demands our utmost attention and innovation.