Security Breach

Dark AI Speeding Hacker Evolution

Eric Sorensen

In many instances the biggest challenge facing OT cybersecurity practitioners is knowing where to focus resources, especially their time. In other words, what are the priorities for the enterprise, facility and people?

I recently sat down with Securin's Lead Threat Intelligence Analyst - Aviral Verma. And while I anticipated a conversation focused on vulnerabilities and the threat landscape, discussing these topics led to deeper dives on a range of topics that also included breaking down IT/OT silos, artificial intelligence, the dark web and patching strategies. 

Listen as we discuss:

  • The transformation of threat actors and how they've been able to cut timelines for exploiting vulnerabilities to 15 days.
  • How hackers are using Dark Web versions of ChatGPT to design more effective credential and data harvesting schemes.
  • Why the security of every software platform, especially those embedded within industrial assets, cannot be assumed.
  • How the legacy dynamic of many OT assets has led hackers to exploit vulnerabilities that have been around for as long as five years.
  • Addressing patching challenges by breaking down silos and getting a deeper understanding of the unique elements of each OT environment.
  • How threat detection needs to evolve, especially with state-sponsored hackers executing "quieter" strategies for attacking manufacturing and critical infrastructure. 

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

Promoguy Talk Pills
Agency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...

Listen on: Apple Podcasts   Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

People on this episode