A new report released by Crowdstrike in Year 2 said that the attacks called Voice Phishing have grown stunning by 5 % in year 2. Vishing is a cyber attack that uses phone calls or voice messages to deceive people and receive sensitive information.
A new report released by Crowdstrike in Year 2 said that the attacks called Voice Phishing have grown stunning by 5 % in year 2. Vishing is a cyber attack that uses phone calls or voice messages to deceive people and receive sensitive information.
Change the focus of hackers from software to humans
Stephanie Karadz, a global cyber crisis manageme official at IBM, says cybercriminals are now more likely to resort to social engineering and deceit. “Software can be updated, but humans are not more and more difficult to ignore a phone call than deleting a suspicious email,” he says.
He adds that in numerous social experimes, his team has always been able to infiltrate the company’s support departme.
The ery of artificial ielligence io the field
The emergence of advanced artificial ielligence tools has made the conditions much more favorable for attackers. Using “Audio Dip -Phone” technology, criminals can now imitate people’s voices carefully and, for example, coact the voice of a manager, family member or even user.
Security researcher Suraj Satanaraian warns about the power of these tools: “With a few seconds recorded sound, these models can do a complete conversation with tone, acce and natural emotions.” He emphasizes that this capability has brought social engineering to a new stage.
The actual example of this threat was an attack in which a researcher from Palo Alto Networks was targeted by fake voice calls with his daughter’s voice.
How to protect ourselves?
Satanaras recommends that people with their relatives define a specific security password or phrase so that they can be ideified in times of coact. Also, the Ideity of the Coractor must be approved through other channels, especially when the request for money, password, or sensitive information is raised.
He also offers companies to train employees and not to make sure the call number or Caller ID display. Implemeing “zero trust” policies in working communication can also be very effective.




