DiscoverSecurity BreachDark AI Speeding Hacker Evolution
Dark AI Speeding Hacker Evolution

Dark AI Speeding Hacker Evolution

Update: 2025-05-16
Share

Description

Send us a text

In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people?

I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused on vulnerabilities and the threat landscape, discussing these topics led to deeper dives on a range of topics that also included breaking down IT/OT silos, artificial intelligence, the dark web and patching strategies. 

Listen as we discuss:

  • The transformation of threat actors and how they've been able to cut timelines for exploiting vulnerabilities to 15 days.
  • How hackers are using Dark Web versions of ChatGPT to design more effective credential and data harvesting schemes.
  • Why the security of every software platform, especially those embedded within industrial assets, cannot be assumed.
  • How the legacy dynamic of many OT assets has led hackers to exploit vulnerabilities that have been around for as long as five years.
  • Addressing patching challenges by breaking down silos and getting a deeper understanding of the unique elements of each OT environment.
  • How threat detection needs to evolve, especially with state-sponsored hackers executing "quieter" strategies for attacking manufacturing and critical infrastructure. 

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Inspiring Tech Leaders - The Technology Podcast
Interviews with Tech Leaders and insights on the latest emerging technology trends.

Listen on: Apple Podcasts   Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Dark AI Speeding Hacker Evolution

Dark AI Speeding Hacker Evolution

Eric Sorensen