{"id":253694,"date":"2023-10-10T07:15:50","date_gmt":"2023-10-10T11:15:50","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/es\/?p=309760"},"modified":"2025-07-01T18:00:30","modified_gmt":"2025-07-02T01:00:30","slug":"microsoft-warns-the-age-of-ai-powered-cyber-attacks-has-already-begun","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/microsoft-warns-the-age-of-ai-powered-cyber-attacks-has-already-begun\/","title":{"rendered":"Microsoft warns: the era of AI-driven cyberattacks has already begun"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Artificial intelligence has proven to bring us many benefits, but it also opens new battlefronts. In this case, Microsoft has stepped forward to warn us about what is already happening: <strong>hackers are using artificial intelligence to make their attacks more effective<\/strong>.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Kaspersky VPN\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-m\/p\/a8799b41-3219-4945-89af-acb3790fadc3\/2557259389\/kaspersky-vpn-connection-icon.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Kaspersky VPN<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/kaspersky-vpn-connection.en.softonic.com\/mac\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/kaspersky-vpn-connection.en.softonic.com\/mac\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Tom Burt, a top executive at Microsoft focused on security, has confirmed that cybercriminals are developing more sophisticated and harmful strategies thanks to the use of <strong>artificial intelligence<\/strong>. As he explained to <a href=\"https:\/\/www.wsj.com\/articles\/hackers-with-ai-are-harder-to-stop-microsoft-says-42d94da2#\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">The Wall Street Journal<\/a>, hackers are already employing AI-based tools to refine their tactics, such as in the case of <strong>phishing<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Phishing <\/strong>is one of the most commonly used tactics by hackers to gain access to our information. As the name suggests, attackers try to make the victim &#8220;take the bait&#8221; using fraudulent websites, fake emails, or even social engineering. In this case, AI is helping create increasingly believable &#8220;hooks,&#8221; in addition to enhancing the malicious programs used.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1007\" height=\"720\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2023\/10\/Phishing-scam-050923-1024x732-1.jpg\" alt=\"\" class=\"wp-image-253700\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2023\/10\/Phishing-scam-050923-1024x732-1.jpg 1007w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2023\/10\/Phishing-scam-050923-1024x732-1-300x214.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2023\/10\/Phishing-scam-050923-1024x732-1-768x549.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/3\/2023\/10\/Phishing-scam-050923-1024x732-1-150x107.jpg 150w\" sizes=\"auto, (max-width: 1007px) 100vw, 1007px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\">These &#8220;improvements&#8221; in hackers&#8217; techniques have added a new level of difficulty for companies, making it increasingly challenging to defend against attacks. Not only that, but the quantity of attacks has also increased. If we observe the period between November 2022 and June 2023, we will see that the number of ransomware attacks has <strong>doubled<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Through ransomware, cybercriminals focus their strategies on <strong>stealing data and then blackmailing<\/strong>, demanding a ransom in exchange for not leaking the data online. To defend themselves, companies are also turning to AI to enhance their security barriers and &#8220;fight fire with fire,&#8221; as Lane Bess, CEO of AI Deep Instinct, points out.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On the other hand, U.S. cybersecurity and national security authorities have already warned about the danger this poses to <strong>government computer systems<\/strong>. Last month, top executives from technology companies such as Mark Zuckerberg, Elon Musk, and Bill Gates met in a closed-door session with U.S. senators to discuss AI and its increasingly necessary regulation.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Kaspersky VPN\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-m\/p\/a8799b41-3219-4945-89af-acb3790fadc3\/2557259389\/kaspersky-vpn-connection-icon.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Kaspersky VPN<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/kaspersky-vpn-connection.en.softonic.com\/mac\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/kaspersky-vpn-connection.en.softonic.com\/mac\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft warns: hackers are using artificial intelligence to make their attacks more effective.<\/p>\n","protected":false},"author":9211,"featured_media":253697,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":1},"categories":[1015],"tags":[2717,1072],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-253694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-app-subdomain-redirectionmicrosoft-365","tag-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/253694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9211"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=253694"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/253694\/revisions"}],"predecessor-version":[{"id":317335,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/253694\/revisions\/317335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/253697"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=253694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=253694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=253694"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=253694"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=253694"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=253694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}