公式動画ピックアップ

AAPL   ADBE   ADSK   AIG   AMGN   AMZN   BABA   BAC   BL   BOX   C   CHGG   CLDR   COKE   COUP   CRM   CROX   DDOG   DELL   DIS   DOCU   DOMO   ESTC   F   FIVN   GILD   GRUB   GS   GSK   H   HD   HON   HPE   HSBC   IBM   INST   INTC   INTU   IRBT   JCOM   JNJ   JPM   LLY   LMT   M   MA   MCD   MDB   MGM   MMM   MSFT   MSI   NCR   NEM   NEWR   NFLX   NKE   NOW   NTNX   NVDA   NYT   OKTA   ORCL   PD   PG   PLAN   PS   RHT   RNG   SAP   SBUX   SHOP   SMAR   SPLK   SQ   TDOC   TEAM   TSLA   TWOU   TWTR   TXN   UA   UAL   UL   UTX   V   VEEV   VZ   WDAY   WFC   WK   WMT   WORK   YELP   ZEN   ZM   ZS   ZUO  

  公式動画&関連する動画 [From Prompts to Profits: How AI is Revolutionizing Cybercrime]

Cybercrime has gone corporate. In this episode, Caden dives into three real-world stories that prove you no longer need deep coding knowledge to launch a massive malicious campaign. By leveraging the power of AI and paid advertisements, "Script Kiddies" are now siphoning sensitive data at scale. Inside this video, we break down: The "Tampered Chef" Campaign: How attackers used Google Ads to push a functional but malicious "App Suite PDF editor". We explain how the software stayed silent for weeks before activating Luma Stealer to siphon credentials and session cookies. The Audio File Camouflage: A deep dive into a sneaky technique where malware is broken into harmless-looking .m4a audio chunks. You’ll see how a simple batch script stitches these "puzzle pieces" together to form a fully functional stealer. The "Helpdesk" Social Engineering Trap: A look at the first recorded malicious use of Adaptix C2, an open-source red-teaming tool. We detail how a simple Teams call pretending to be IT led to DLL side-loading and memory-only beacons. What you will learn: How AI is used to generate malicious code and clean-looking websites. Why traditional "search page results" are no longer a gauge for safety. How Unit 42 and Cortex XDR use behavioral threat prevention and XQL hunting queries to identify and stop these "quiet" attacks in real-time. The threat landscape is changing, but with a combination of human expertise and AI-powered prevention, you can stay ahead of the curve. 🕒 Timestamps: 0:00 - The declining bar for entry in cybercrime 0:45 - Case Study 1: The App Suite PDF Editor 1:50 - How Luma Stealer bypasses MFA and steals cookies 3:45 - Case Study 2: Hiding code in .m4a files 5:30 - Malware as a Service (MaaS) explained 7:15 - Case Study 3: The Adaptix C2 helpdesk scam 9:00 - Behavioral Threat Prevention vs. Encoded PowerShell 10:45 - How human expertise plus AI stays ahead 🔍 Keywords & Tags: #CyberSecurity #AI #Malware #LumaStealer #AdaptixC2 #SocialEngineering #Unit42 #CortexXDR #InfoSec #Phishing #TechSupportScam #ScriptKiddie
 303      2