"deepfake audio to impersonate the ceo / supplier. depending on the tool, they may stick to pre - scripted speech, or use a more sophisticated “ speech - to - speech ” method where the attacker ’ s voice is translated in near real time to that of their victim. hearing is believing…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.004Spearphishing Voice
91%
"deepfake audio to impersonate the ceo / supplier. depending on the tool, they may stick to pre - scripted speech, or use a more sophisticated “ speech - to - speech ” method where the attacker ’ s voice is translated in near real time to that of their victim. hearing is believing…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.004Spearphishing Voice
73%
"audio attack on your business. all it requires is a short clip of the victim to be impersonated. genai will do the rest. here ’ s how an attack might proceed : - an attacker selects the person they ’ re going to impersonate. it might be a ceo, a cfo or even a supplier. - they fin…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.004Spearphishing Voice
63%
"the chances of a worst - case scenario. it should start with employee training and awareness. these programs should be updated to include deepfake audio simulations to ensure staff known what to expect, what ’ s at stake and how to act. they should be taught to spot the tell - ta…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
61%
"the chances of a worst - case scenario. it should start with employee training and awareness. these programs should be updated to include deepfake audio simulations to ensure staff known what to expect, what ’ s at stake and how to act. they should be taught to spot the tell - ta…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
53%
"deepfake audio to impersonate the ceo / supplier. depending on the tool, they may stick to pre - scripted speech, or use a more sophisticated “ speech - to - speech ” method where the attacker ’ s voice is translated in near real time to that of their victim. hearing is believing…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.004Spearphishing Voice
49%
"faking it on the phone : how to tell if a voice call is ai or not there was a time when we could believe everything we saw and heard. unfortunately, those days are probably long gone. generative ai ( genai ) has democratized the creation of deepfake audio and video, to the point …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.004Spearphishing Voice
47%
"audio attack on your business. all it requires is a short clip of the victim to be impersonated. genai will do the rest. here ’ s how an attack might proceed : - an attacker selects the person they ’ re going to impersonate. it might be a ceo, a cfo or even a supplier. - they fin…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.