Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
TV & Film
History
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/2d/eb/68/2deb68c4-2f22-311e-86b5-86bdde7557d1/mza_13092477901838151059.jpg/600x600bb.jpg
AI Security Ops
Black Hills Information Security
33 episodes
23 hours ago
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation). Brought to you by the experts at Black Hills Information Security https://blackhillsinfosec.com -------------------------------------------------- About Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/ About Derek Banks - https://blackhillsinfosec.com/team/derek-banks/ About Brian Fehrman - https://blackhillsinfosec.com/team/brian-fehrman/ About Bronwen Aker - https://blackhillsinfosec.com/team/bronwen-aker/ About Ben Bowman - https://blackhillsinfosec.com/team/ben-bowman/
Show more...
Education
News,
Tech News
RSS
All content for AI Security Ops is the property of Black Hills Information Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation). Brought to you by the experts at Black Hills Information Security https://blackhillsinfosec.com -------------------------------------------------- About Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/ About Derek Banks - https://blackhillsinfosec.com/team/derek-banks/ About Brian Fehrman - https://blackhillsinfosec.com/team/brian-fehrman/ About Bronwen Aker - https://blackhillsinfosec.com/team/bronwen-aker/ About Ben Bowman - https://blackhillsinfosec.com/team/ben-bowman/
Show more...
Education
News,
Tech News
https://img.transistorcdn.com/sjQm1GrfUYymnl01hE8Rjnw7fv3BV8tEd-a30jXi8R0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZmZk/YmM2Yjg1MTc3MDg3/MWNjN2E4YThmZjc3/ZGI1OC5wbmc.jpg
Malware in the Age of AI | EP 18
AI Security Ops
32 minutes
3 months ago
Malware in the Age of AI | EP 18

🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – 

https://poweredbybhis.com


Malware in the Age of AI | Episode 18

In Episode 18, hosts Joff Thyer, Derek Banks and Brian Fehrman discuss the rise of AI-powered malware. From polymorphic keyloggers like Black Mamba to the use of ChatGPT, WormGPT, and fine-tuned LLMs for cyberattacks, the team will explain how generative AI is reshaping the security landscape.

They'll break down the real risks vs. hype, including prompt injection, jailbreaking, deepfakes, and AI-driven fraud, while also sharing strategies defenders can use to fight back.

The discussion highlights both the ethical implications and the critical need for defense-in-depth as threat actors use AI to accelerate their attacks.


#AI #Cybersecurity #Malware #AIThreats #Deepfakes #LLM #InfoSec #AIinSecurity #GenerativeAI #Hacking


----------------------------------------------------------------------------------------------

Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/

Derek Banks - https://www.blackhillsinfosec.com/team/derek-banks/

Brian Fehrman - https://www.blackhillsinfosec.com/team/brian-fehrman/

Bronwen Aker - http://blackhillsinfosec.com/team/bronwen-aker/

Ben Bowman - https://www.blackhillsinfosec.com/team/ben-bowman/

  • (00:00) - Intro
  • (01:15) - Black Mamba polymorphic AI keylogger
  • (02:47) - Can Chat GPT5 generate malware for us?
  • (03:42) - Guardrail circumvention technique #1
  • (04:16) - Guardrail circumvention technique #2
  • (05:30) - Guardrail circumvention technique #3
  • (05:59) - Guardrail circumvention technique #4
  • (06:30) - Using an Abliterated Model
  • (08:32) - AI models have democratized software creation
  • (11:20) - Polymorphic keyloggers are not new
  • (12:03) - AI makes it faster to iterate polymorphic malware
  • (12:33) - AI is able to analyze source code and find more vulnerabilities
  • (15:16) - How scared should we be? (hype vs reality)
  • (16:10) - Knowing enough to ask the right questions is important
  • (17:41) - Significant risks of AI fraud and social engineering
  • (19:32) - Business email compromise
  • (21:10) - How defenders can use AI
  • (24:28) - Audio deepfakes have become easier to create
  • (25:06) - Ethical concerns for pentesters using AI
  • (29:26) - In one sentence, how will AI change malware production in the near future?
AI Security Ops
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation). Brought to you by the experts at Black Hills Information Security https://blackhillsinfosec.com -------------------------------------------------- About Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/ About Derek Banks - https://blackhillsinfosec.com/team/derek-banks/ About Brian Fehrman - https://blackhillsinfosec.com/team/brian-fehrman/ About Bronwen Aker - https://blackhillsinfosec.com/team/bronwen-aker/ About Ben Bowman - https://blackhillsinfosec.com/team/ben-bowman/