InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From Chatbots to Cyber Threats: The Real Risk of Malicious AI

Presented by

Piotr Wojtyla, Head of Threat Intel & Platform and Callie Baron, Sr. Content Marketing Manager, Threat Intelligence

About this talk

Generative AI is reshaping cybersecurity—for better and for worse. Tools like ChatGPT, Gemini, and Claude are revolutionizing productivity, but threat actors can use these same tools to amplify attacks. Understanding this duality is critical to building effective defenses. Join the experts behind our white paper, Inside the AI Arms Race, as they discuss the ways GPT technology is being exploited by cybercriminals and what organizations can do to stay ahead of malicious AI. We’ll also explore the growing threat of malicious GPTs like WormGPT and FraudGPT—purpose-built models designed explicitly for cybercrime. In this session, you’ll learn: - How attackers can exploit trusted AI platforms to generate convincing malicious content. - The risks posed by dark web GPTs, engineered specifically to facilitate attacks. - AI-driven defense strategies to strengthen detection, accelerate response, and anticipate emerging threats. Don’t miss this critical session! Register now to learn what it takes to win the AI arms race.
Abnormal AI

Abnormal AI

16840 subscribers147 talks
Abnormally-Precise, Cloud-Native Email Security
Learn more about new approaches to email security to stop advanced business email compromise attacks that bypass traditional, threat intelligence-based email security solutions. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated and costly attacks.
Related topics