Introduction
At a recent Cyber Security & Cloud Expo Europe session, Raviv Raz, Cloud Security Manager at ING, shared about the realm of AI-driven cybercrime. Drawing from his vast experience, Raz highlighted the dangers of AI in the wrong hands and stressed the importance of taking this issue seriously. For those eager to safeguard against cyber threats, learning about AI-powered cybercrime is crucial.

OUTPREPARED II: Leading Cybersecurity Strategy in the Age of AI
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
The Perfect Cyber Weapon
Raz explored the concept of “the perfect cyber weapon” that operates silently, without any command and control infrastructure, and adapts in real-time. His vision, though controversial, highlighted the power of AI in the wrong hands and the potential to disrupt critical systems undetected.

EDTM Commercial Tin Side Detector (TS1320) Handheld UV Tool with Stencil Insert & Protective Boot for Accurate Detection on Float, Laminated, Tempered, and Specialty Glass – Drop-Tested, Made in USA
TS1320 Commercial Tin Side Detector Rugged, Accurate Tin Side Detection — Built for Heavy-Duty Commercial Use – The…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
AI in the Hands of Common Criminals
Raz shared the story of a consortium of banks in the Netherlands that built a proof of concept for an AI-driven cyber agent capable of executing complex attacks. This demonstration showcased that AI is no longer exclusive to nation-states, and common criminals can now carry out sophisticated cyberattacks with ease.

TensaOne Hidden Camera Detectors – Mini Security Device for Audio Video Wireless Threats, Hotel Safety, Home Privacy and GPS Tracker Detection, Pen RF Spy Cam Voice Recorder Bug Finder for Travelers
MULTI-MODE SWEEPER FOR FULL COVERAGE: 4-in-1 tool scans for Bluetooth, wireless, and radio frequency threats. Use RF mode,…
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
Malicious AI Techniques
Raz discussed AI-powered techniques such as phishing attacks, impersonation, and the development of polymorphic malware. These techniques allow cybercriminals to craft convincing messages, create deepfake voices, and continuously evolve malware to evade detection.


The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software
As an affiliate, we earn on qualifying purchases.
As an affiliate, we earn on qualifying purchases.
The Urgency for Stronger Defenses
Raz’s presentation served as a wake-up call for the cybersecurity community, emphasizing the need for organizations to continually bolster their defenses. As AI advances, the line between nation-state and common criminal cyber activities becomes increasingly blurred.
Looking Towards the Future
In this new age of AI-driven cyber threats, organizations must remain vigilant, adopt advanced threat detection and prevention technologies, and prioritize cybersecurity education and training for their employees. The evolving threat landscape demands our utmost attention and innovation.