{"id":4996,"date":"2023-09-27T19:33:45","date_gmt":"2023-09-27T22:33:45","guid":{"rendered":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/"},"modified":"2023-09-27T19:33:45","modified_gmt":"2023-09-27T22:33:45","slug":"cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia","status":"publish","type":"post","link":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/","title":{"rendered":"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA"},"content":{"rendered":"<div style=\"text-align:justify;\">\n<p>In a packed session at <a href=\"https:\/\/cybersecuritycloudexpo.com\/europe\/\">Cyber Security &amp; Cloud Expo Europe<\/a>, Raviv Raz, Cloud Security Manager at <a href=\"https:\/\/www.ing.com\/\">ING<\/a>, turned the spotlight away from traditional security threats and delved into the world of AI-powered cybercrime.<\/p>\n<p>Raz shared insights from his extensive career, including his tenure as technical director for a web application firewall company. This role exposed him to the rise of the \u201cCyber Dragon\u201d and Chinese cyberattacks, inspiring him to explore the offensive side of cybersecurity. During this time, he not only developed defence tools, but also created attack tools that would later be adopted by the Anonymous hacker collective.<\/p>\n<h4 class=\"wp-block-heading\">\u201cThe perfect cyber weapon\u201d<\/h4>\n<p>One of the most intriguing aspects of Raz\u2019s presentation was his exploration of \u201cthe perfect cyber weapon.\u201d He proposed that this weapon would need to operate in complete silence, without any command and control infrastructure, and would have to adapt and improvise in real-time. The ultimate objective would be to disrupt critical systems, potentially even at the nation-state level, while remaining undetected.<\/p>\n<p>Raz\u2019s vision for this weapon, though controversial, underscored the power of AI in the wrong hands. He highlighted the potential consequences of such technology falling in<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a packed session at Cyber Security &amp; Cloud Expo Europe, Raviv Raz, Cloud Security Manager at ING, turned the spotlight away from traditional security threats and delved into the world of AI-powered cybercrime. Raz shared insights from his extensive career, including his tenure as technical director for a web application firewall company. This role&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[67],"class_list":["post-4996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-inteligencia-artificial","tag-ia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.1 (Yoast SEO v22.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA - 4tuneagencia.digital<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA\" \/>\n<meta property=\"og:description\" content=\"In a packed session at Cyber Security &amp; Cloud Expo Europe, Raviv Raz, Cloud Security Manager at ING, turned the spotlight away from traditional security threats and delved into the world of AI-powered cybercrime. Raz shared insights from his extensive career, including his tenure as technical director for a web application firewall company. This role...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"4tuneagencia.digital\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-27T22:33:45+00:00\" \/>\n<meta name=\"author\" content=\"4tune\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"4tune\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\"},\"author\":{\"name\":\"4tune\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100\"},\"headline\":\"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA\",\"datePublished\":\"2023-09-27T22:33:45+00:00\",\"dateModified\":\"2023-09-27T22:33:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\"},\"wordCount\":207,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png\",\"keywords\":[\"IA\"],\"articleSection\":[\"Intelig\u00eancia artificial\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\",\"name\":\"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA - 4tuneagencia.digital\",\"isPartOf\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png\",\"datePublished\":\"2023-09-27T22:33:45+00:00\",\"dateModified\":\"2023-09-27T22:33:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png\",\"contentUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png\",\"width\":1024,\"height\":704},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/4tuneagencia.digital\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#website\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/\",\"name\":\"4tuneagencia.digital\",\"description\":\"Marketing e Web Designer \",\"publisher\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/4tuneagencia.digital\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\",\"name\":\"4tuneagencia.digital\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png\",\"contentUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png\",\"width\":250,\"height\":250,\"caption\":\"4tuneagencia.digital\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100\",\"name\":\"4tune\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g\",\"caption\":\"4tune\"},\"sameAs\":[\"http:\/\/4tuneagencia.digital\"],\"url\":\"https:\/\/4tuneagencia.digital\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA - 4tuneagencia.digital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/","og_locale":"pt_BR","og_type":"article","og_title":"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA","og_description":"In a packed session at Cyber Security &amp; Cloud Expo Europe, Raviv Raz, Cloud Security Manager at ING, turned the spotlight away from traditional security threats and delved into the world of AI-powered cybercrime. Raz shared insights from his extensive career, including his tenure as technical director for a web application firewall company. This role...","og_url":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/","og_site_name":"4tuneagencia.digital","article_published_time":"2023-09-27T22:33:45+00:00","author":"4tune","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"4tune","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#article","isPartOf":{"@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/"},"author":{"name":"4tune","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100"},"headline":"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA","datePublished":"2023-09-27T22:33:45+00:00","dateModified":"2023-09-27T22:33:45+00:00","mainEntityOfPage":{"@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/"},"wordCount":207,"commentCount":0,"publisher":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#organization"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png","keywords":["IA"],"articleSection":["Intelig\u00eancia artificial"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/","url":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/","name":"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA - 4tuneagencia.digital","isPartOf":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png","datePublished":"2023-09-27T22:33:45+00:00","dateModified":"2023-09-27T22:33:45+00:00","breadcrumb":{"@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#primaryimage","url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png","contentUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png","width":1024,"height":704},{"@type":"BreadcrumbList","@id":"https:\/\/4tuneagencia.digital\/blog\/cyber-security-cloud-expo-o-potencial-alarmante-do-cibercrime-alimentado-por-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/4tuneagencia.digital\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security &amp; Cloud Expo: O potencial alarmante do cibercrime alimentado por IA"}]},{"@type":"WebSite","@id":"https:\/\/4tuneagencia.digital\/blog\/#website","url":"https:\/\/4tuneagencia.digital\/blog\/","name":"4tuneagencia.digital","description":"Marketing e Web Designer ","publisher":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4tuneagencia.digital\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/4tuneagencia.digital\/blog\/#organization","name":"4tuneagencia.digital","url":"https:\/\/4tuneagencia.digital\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png","contentUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png","width":250,"height":250,"caption":"4tuneagencia.digital"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100","name":"4tune","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g","caption":"4tune"},"sameAs":["http:\/\/4tuneagencia.digital"],"url":"https:\/\/4tuneagencia.digital\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/wp-header-logo-630.png","_links":{"self":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts\/4996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/comments?post=4996"}],"version-history":[{"count":0,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts\/4996\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/media\/4997"}],"wp:attachment":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/media?parent=4996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/categories?post=4996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/tags?post=4996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}