AI & Social Engineering Attacks - Pentestmag

AI & Social Engineering Attacks

(2 customer reviews)

$33.00

In this issue, we delve deep into various offensive cybersecurity aspects. Whereas this eBook contains mixed content, there are 2 topics that we find particularly interesting: the first one is “AI & Social Engineering Attacks”, while the second one relates to Supply Chain Cybersecurity. Every pentester and offensive security enthusiast will find something interesting in the current issue!


Get the access to all our courses via Subscription

Subscribe

Category: Tag:

Description


Download
FileAction
Supply-Chain-Cybersecurity-1701967427-2.pdfDownload

Dear PenTest Readers,

Welcome to the new edition of PenTest Magazine.

In this issue, we delve deep into various offensive cybersecurity aspects. Whereas this eBook contains mixed content, there are 2 topics that we find particularly interesting: the first one is "AI & Social Engineering Attacks", while the second one relates to Supply Chain Cybersecurity. Every pentester and offensive security enthusiast will find something interesting in the current issue!

We commence our exploration with an in-depth analysis of 'Supply Chain Cyber-Security,' unraveling the complexities and challenges inherent in securing the lifelines of global commerce. From vulnerabilities in third-party dependencies to the imperative of securing every link in the supply chain, our dedicated coverage aims to provide insights into the pivotal role of cybersecurity in preserving the integrity of supply networks.

Transitioning from the supply chain realm, we delve into the intriguing intersection of artificial intelligence and the human mind in 'How AI and Cybersecurity Can Be Used to Control or Manipulate Peoples' Minds.' This thought-provoking piece navigates the ethical terrain of cognitive manipulation, exploring the implications of AI technologies in influencing human behavior and decision-making.

Our exploration continues with 'The Emergence of AI-Powered Voice Deception in Social Engineering Attacks,' where we examine the evolving tactics employed by threat actors in manipulating individuals through sophisticated voice deception techniques. The article dissects the intersection of AI and social engineering, highlighting the potential risks and countermeasures to mitigate this novel form of cyber threat.

This and much more interesting offensive cybersecurity content awaits!

Without further ado,
Let’s dive in the reading process!

PenTest Magazine’s Editorial Team


TABLE OF CONTENTS


The Importance of Supply Chain Security

Ross Moore

Uncover the critical importance of supply chain security in an interconnected world. Delve into the strategic considerations and best practices for securing the supply chain, mitigating risks, and ensuring the resilience of your business.


Subdomain Takeover – Security Risk and Remediation   

Prathibha Muraleedhara

Gain a deep understanding of the security risks associated with subdomain takeover. Explore the impact, automated detection methods, and effective remediation strategies to protect your digital assets from this often-overlooked threat.


Android SSL Pinning Bypass Technique

Divya G , Arun S

Explore the nuances of Android SSL pinning bypass techniques. Understand the potential vulnerabilities and discover countermeasures to enhance the security of Android applications in the face of sophisticated cyber threats.


The Simple Word File - A Hacker's Secret Weapon?

Adam Karim

Delve into a simulated scenario where a seemingly innocuous Word file becomes a hacker's secret weapon. Explore the tactics employed, vulnerabilities exploited, and the lessons learned in defending against this deceptive and prevalent cyber threat.


Supply Chain Cybersecurity

Alameen Karim Merali 

Uncover the vulnerabilities within modern supply chains and explore strategies to fortify cybersecurity defenses. Learn from real-world case studies and industry experts as we navigate the complex landscape of securing the digital backbone of commerce.


How AI and cybersecurity can be used to control or manipulate people's minds

Lochana Koralage, R.R. Vinuka Dunith Medawel

Delve into the intriguing intersection of AI and cybersecurity as we explore how these technologies can be harnessed to either control or manipulate people's minds. Understand the ethical implications and potential safeguards in this thought-provoking analysis.


The Emergence of AI-Powered Voice Deception in Social Engineering Attacks: Navigating a New Threat Landscape

Lochana Koralage, KLW Raveesha, MEAN Sathsarani

Witness the emergence of AI-powered voice deception techniques in social engineering attacks. Explore the tactics employed by cyber adversaries and learn how organizations can defend against this innovative and evolving threat landscape.


Ensuring Application Security in the Workplace

Mabrur Habib

Navigate the challenges of application security in the modern workplace. Gain insights into best practices and strategies for ensuring the robust protection of applications in the ever-changing landscape of cybersecurity threats.


AI in Cybersecurity: A Systematic Review and Research Agenda  

Ahkam Azmi, Shameem Mumthaza, Rahil N.M., Lochana Koralage

Take a systematic journey through the role of AI in cybersecurity. This comprehensive review and research agenda outline the current state of AI integration in cybersecurity and provide insights into future directions and potential advancements.


Advancements in Malware and Phishing Detection

T.M.S.Yasara, U.V.C.Prasad, Ananeya, Lochana Koralage

Safeguard the digital frontier with an in-depth exploration of the latest advancements in malware and phishing detection. Stay ahead of cyber threats by understanding cutting-edge technologies and strategies to protect your digital ecosystem.

2 reviews for AI & Social Engineering Attacks

  1. gcraenen

    Wrong version to download

  2. ZS

    The download is for supply chain management

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023