公式動画ピックアップ
AAPL
ADBE
ADSK
AIG
AMGN
AMZN
BABA
BAC
BL
BOX
C
CHGG
CLDR
COKE
COUP
CRM
CROX
DDOG
DELL
DIS
DOCU
DOMO
ESTC
F
FIVN
GILD
GRUB
GS
GSK
H
HD
HON
HPE
HSBC
IBM
INST
INTC
INTU
IRBT
JCOM
JNJ
JPM
LLY
LMT
M
MA
MCD
MDB
MGM
MMM
MSFT
MSI
NCR
NEM
NEWR
NFLX
NKE
NOW
NTNX
NVDA
NYT
OKTA
ORCL
PD
PG
PLAN
PS
RHT
RNG
SAP
SBUX
SHOP
SMAR
SPLK
SQ
TDOC
TEAM
TSLA
TWOU
TWTR
TXN
UA
UAL
UL
UTX
V
VEEV
VZ
WDAY
WFC
WK
WMT
WORK
YELP
ZEN
ZM
ZS
ZUO
公式動画&関連する動画 [From Prompts to Profits: How AI is Revolutionizing Cybercrime]
Cybercrime has gone corporate. In this episode, Caden dives into three real-world stories that prove you no longer need deep coding knowledge to launch a massive malicious campaign. By leveraging the power of AI and paid advertisements, "Script Kiddies" are now siphoning sensitive data at scale.
Inside this video, we break down:
The "Tampered Chef" Campaign: How attackers used Google Ads to push a functional but malicious "App Suite PDF editor". We explain how the software stayed silent for weeks before activating Luma Stealer to siphon credentials and session cookies.
The Audio File Camouflage: A deep dive into a sneaky technique where malware is broken into harmless-looking .m4a audio chunks. You’ll see how a simple batch script stitches these "puzzle pieces" together to form a fully functional stealer.
The "Helpdesk" Social Engineering Trap: A look at the first recorded malicious use of Adaptix C2, an open-source red-teaming tool. We detail how a simple Teams call pretending to be IT led to DLL side-loading and memory-only beacons.
What you will learn:
How AI is used to generate malicious code and clean-looking websites.
Why traditional "search page results" are no longer a gauge for safety.
How Unit 42 and Cortex XDR use behavioral threat prevention and XQL hunting queries to identify and stop these "quiet" attacks in real-time.
The threat landscape is changing, but with a combination of human expertise and AI-powered prevention, you can stay ahead of the curve.
🕒 Timestamps:
0:00 - The declining bar for entry in cybercrime
0:45 - Case Study 1: The App Suite PDF Editor
1:50 - How Luma Stealer bypasses MFA and steals cookies
3:45 - Case Study 2: Hiding code in .m4a files
5:30 - Malware as a Service (MaaS) explained
7:15 - Case Study 3: The Adaptix C2 helpdesk scam
9:00 - Behavioral Threat Prevention vs. Encoded PowerShell
10:45 - How human expertise plus AI stays ahead
🔍 Keywords & Tags:
#CyberSecurity #AI #Malware #LumaStealer #AdaptixC2 #SocialEngineering #Unit42 #CortexXDR #InfoSec #Phishing #TechSupportScam #ScriptKiddie
303
2