Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Deepfakes set to deceive at DEF CON
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Deepfakes set to deceive at DEF CON
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
NewsdeepfakeCybersecurity EventsAI

Deepfakes set to deceive at DEF CON

Tony Glover
August 7, 2024 at 6:24 AM
By Tony Glover Tony Glover
Share
Deepfakes taking over DEF CON
SHARE

Deepfakes taking over DEF CON

It looks as if deepfakes will be the hot topic at the big international hacker conference DEF CON in Las Vegas next week, just as they took center stage at InfoSecurity Europe in London in June.

Visitors to DEF CON’s Artificial Intelligence (AI) village will be encouraged to create their own highly professional deepfake videos of fellow conference attendees by cybersecurity company Bishop Fox’s red team. The purpose is to educate conference goers about the growing dangers now posed to all organizations by deepfake calls purporting to come from senior executives or highly-trusted members of staff.

“Rapid technological advancements, including open-source software and consumer-grade GPUs, are lowering the barriers to entry and enabling attackers to develop machine learning models to impersonate your Chief Executive Officer, Chief Financial Officer, Company Directors, and other public figures in your organization. This can lead to network compromises, spread of misinformation, and financial fraud costing tens of millions of dollars,” said Bishop Fox red team operator Brandon Kovacs in a LinkedIn post ahead of next week’s show in Las Vegas.

Together with Bishop Fox colleague and DEF CON Social Engineering Capture the Flag champion Alethe Denis, he claims to have created a “Deepfake Turing Test”. The original Turing test, originally called “The Imitation Game” by English mathematician and computer scientist Alan Turing in 1950, was defined as a test of a machine’s ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. The 2024 “Turing Test” involved Kovacs posing as his female colleague Denis in a deepfake so convincing that it would fool even her children, using artificial intelligence and public information that already exists on the internet to clone her.

“We took a cinematic approach”

“We took a cinematic approach – including use of a professional DSLR camera, lens, lighting, wig, green screen, three-dimensional props and production software – to infer the video and voice models locally in real-time using consumer grade GPUs. The final result transforms myself into Alethe, making it appear like I am sitting in her home office,” said Kovacs.

Kovacs and Denis then routed the outputs of the deepfake video and voice as the camera and microphone inputs for Microsoft Teams. According to Kovacs, Dennis’s unsuspecting offspring were thoroughly gulled by the deepfake to the extent that they thought they were conferencing with their mother.

The US Defense Advanced Research Agency (DARPA), founded in 1957 after the Soviets stole a technological march on the West with the launch of the Sputnik satellite, is also warning that the sophisticated technology now freely available to threat actors has created a real-time threat for all types of organizations.

“The speed, scale, and breadth at which massive disinformation campaigns can unfold require computational defenses and automated algorithms to help humans discern what content is real and what’s been manipulated or synthesized, why, and how,” says DARPA.

DARPA’s research into detecting, attributing, and characterizing deep fakes has already resulted in hundreds of analytics and methods that can help organizations and individuals protect themselves. But, as Kovacs and Dennis claim to have proven, the rapid pace of AI development means that threat actors are able to stay one step ahead of all but the best-defended organizations.

TAGGED: infosecurity europe, corporate espionage, Cybersecurity, def con, hackers, hacking conference, artificial intelligence, bishop fox red, microsoft teams, las vegas, misinformation, turing test, deepfake, us defense advanced research agency, financial fraud
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Ukraine and Russia cyber warfare Ukraine takes down Russia’s financial services
Next Article blind side cyber attacks Sharp rise in blindside cyber-attacks
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
GovernmentGeopoliticsNewsCyber Espionage

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
Cyber EspionageSurveillanceSpywareNewsChina

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?