{"id":984,"date":"2025-03-09T15:02:00","date_gmt":"2025-03-09T15:02:00","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=984"},"modified":"2025-03-09T15:14:23","modified_gmt":"2025-03-09T15:14:23","slug":"vishing-and-ai-the-new-frontier-of-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/","title":{"rendered":"Vishing and AI: The New Frontier of Cyber Threats"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is <\/span><b>vishing<\/b><span style=\"font-weight: 400;\">\u2014a form of phishing that occurs over voice communication. With AI-powered voice synthesis and deepfake technology, cybercriminals are now executing vishing attacks that are more sophisticated and convincing than ever before.<\/span><\/p>\n<p><b>What\u2019s The Difference Between Phishing, Smishing &amp; Vishing?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">These two scams are closely related versions of social engineering.\u00a0<\/span><\/p>\n<p><b>Phishing<\/b><span style=\"font-weight: 400;\"> is an attempt to trick you over email messages and get you to divulge sensitive information. A hacker will try to steal your bank account information, passwords, usernames, or credit card numbers. They may target any other sensitive data and will masquerade as a reputable entity, which can entice the victim. The most common examples of phishing are on-path attacks and cross-site scripting.<\/span><b> Smishing<\/b><span style=\"font-weight: 400;\"> involves sending fraudulent SMS messages to get people to release sensitive information or download malicious software. Some attacks may also occur via instant messaging, so becoming familiar with their vectors is essential. It\u2019s challenging to spot phishing attacks in the wild. A classic example is the popular Nigerian Prince email, a form of advanced phishing.<\/span><\/p>\n<p><b>Vishing<\/b><span style=\"font-weight: 400;\"> calls might come from an actual person or use automated robocall technology or some combination of both. The caller may know nothing about you, or they may provide information such as your address or even the last four digits of your Social Security number to win your trust.<\/span><\/p>\n<h4><b>Common Vishing Techniques<\/b><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impersonation of Trusted Entities<\/b><span style=\"font-weight: 400;\"> Attackers often pose as banks, government agencies, or IT support teams, tricking victims into divulging confidential information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>VoIP Spoofing<\/b><span style=\"font-weight: 400;\"> Cybercriminals manipulate caller IDs to make their calls appear legitimate, increasing the chances of success.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>AI-Powered Deepfake Voices<\/b><span style=\"font-weight: 400;\"> AI can now replicate voices with startling accuracy, making it possible for attackers to impersonate colleagues, family members, or executives.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Robocalls and AI Chatbots<\/b><span style=\"font-weight: 400;\"> Automated AI-driven calls can scale attacks, reaching thousands of potential victims in a short time.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Video Phishing<\/b> <span style=\"font-weight: 400;\">An attacker can use a video deepfake over a <\/span><a href=\"https:\/\/fortune.com\/2022\/09\/03\/live-deepfakes-detect-methods-zoom-fraud\/\"><span style=\"font-weight: 400;\">Zoom call<\/span><\/a><span style=\"font-weight: 400;\"> to engage and convince victims to share confidential information (such as credentials) or manipulate them into carrying out unauthorized financial transactions. Attackers can use video deepfakes on video calls to trick victims into sharing confidential information or making unauthorized transactions.<\/span><\/li>\n<\/ol>\n<h5><b>How AI is Enhancing Vishing Attacks<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">AI-driven advancements are making vishing more dangerous than ever. Here are some ways AI is being used:<\/span><\/p>\n<h6><b>1. Deepfake Audio<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">With deep learning algorithms, attackers can clone voices from just a few seconds of recorded speech. This allows them to impersonate high-profile individuals, such as CEOs or government officials, to manipulate employees or customers.<\/span><\/p>\n<h6><b>2. Natural Language Processing (NLP)<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">AI-powered chatbots and voice assistants can engage in convincing, real-time conversations, reducing the likelihood of detection. They can respond dynamically to questions, mimicking human behavior.<\/span><\/p>\n<h6><b>3. AI-Powered Scam Call Automation<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">AI allows fraudsters to generate and analyze massive datasets, identifying the best strategies to target individuals based on their online behavior, leaked data, or publicly available information.<\/span><\/p>\n<h5><b>Defending Against AI-Powered Vishing<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">With the rise of AI-enhanced vishing, individuals and organizations must take proactive measures to protect themselves:<\/span><\/p>\n<h6><b>1. Verify Caller Identities<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">Never trust caller ID alone. If you receive a suspicious call, hang up and call back using a verified number.<\/span><\/p>\n<h6><b>2. Use Voice Biometrics and Authentication<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">Organizations should implement multi-factor authentication (MFA) and voice biometric verification to prevent unauthorized access.<\/span><\/p>\n<h6><b>3. Employee and Public Awareness Training<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">Cybersecurity training programs should educate individuals about AI-powered scams and how to spot social engineering tactics.<\/span><\/p>\n<h6><b>4. AI-Based Fraud Detection<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">Companies can fight AI with AI by using machine learning-based fraud detection systems that analyze voice patterns and detect anomalies.<\/span><\/p>\n<h6><b>5. Limit Publicly Available Personal Information<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">Cybercriminals use social media and data breaches to gather information for personalized attacks. Reducing your digital footprint can lower your risk.<\/span><\/p>\n<h5><b>Examples<\/b><\/h5>\n<p><span style=\"color: #000000;\"><b>The $3 million impersonation scam<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">In August 2022, a South Korean doctor received a series of phone calls from individuals claiming to be law enforcement officials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The criminals claimed to be prosecutors having proof that the doctor\u2019s bank accounts were used for money laundering. Unless he cooperated with the investigation, they would arrest him.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They even sent out a fake arrest warrant by text messages, something official law enforcement would never do. Under the pressure of these threats, the doctor ended up transferring a total of US$ 3 million.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This case highlights the effectiveness of vishing attacks that exploit authority and fear. Individuals should be cautious of unsolicited calls from supposed officials and verify identities through official channels before taking any action.<\/span><\/p>\n<p><span style=\"color: #000000;\"><b>The Fake Bailout Scam<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">More recently, in January 2025, an elderly couple in Massachusetts fell victim to a fraudulent phone call from a supposed lawyer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They were falsely informed that a close family member had been arrested, and needed US$ 10,000 for bail. Without verifying the claim, they withdrew the requested amount and handed it to a courrier (who was not actually part of the scam).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was only later that they discovered that their family member had never been arrested. But by that time, the US$ 10,000 was gone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Scammers will often use emotional manipulation during vishing attacks to trick their victims into taking immediate action. This case highlights once again the importance of rational thinking, and verifying claims through secondary channels.<\/span><\/p>\n<p><span style=\"color: #000000;\"><b>Deepfake Video<\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">A finance worker at a multinational firm in Hong Kong was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company\u2019s chief financial officer in a video conference call. The elaborate scam saw the worker duped into attending a video call with what he thought were several other members of staff, but all of whom were in fact deepfake recreations.<\/span><\/p>\n<h5><b>Conclusion<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The integration of AI into vishing attacks represents a growing cybersecurity challenge. As AI technology continues to advance, so too will the sophistication of cybercriminals. Organizations and individuals must remain vigilant, adopt new security measures, and leverage AI defensively to stay ahead of these emerging threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is no longer just an IT issue &#8211; it\u2019s a fundamental aspect of our digital lives. By staying informed and implementing strong security practices, we can reduce the risks posed by AI-enhanced vishing attacks.<\/span><\/p>\n<h5><b>Monitoring Remote Sessions<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Security monitoring is crucial for preventing ransomware attacks as it enables early detection, identification of vulnerabilities, monitoring for anomalies, data protection, and compliance with regulatory requirements.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v7<\/span><\/a><span style=\"font-weight: 400;\"> will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><span style=\"color: #000000;\"><b>Sources:<\/b><\/span><\/p>\n<p><a href=\"https:\/\/business.bofa.com\/en-us\/content\/what-is-vishing.html\"><span style=\"font-weight: 400;\">https:\/\/business.bofa.com\/en-us\/content\/what-is-vishing.html<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.digitalhealth.net\/2025\/03\/nhs-cyber-security-concerns-raised-about-move-to-windows-11\/\"><span style=\"font-weight: 400;\">https:\/\/www.digitalhealth.net\/2025\/03\/nhs-cyber-security-concerns-raised-about-move-to-windows-11\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.terranovasecurity.com\/blog\/examples-vishing\"><span style=\"font-weight: 400;\">https:\/\/www.terranovasecurity.com\/blog\/examples-vishing<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.itgovernance.co.uk\/blog\/what-is-vishing-definition-examples-and-prevention\"><span style=\"font-weight: 400;\">https:\/\/www.itgovernance.co.uk\/blog\/what-is-vishing-definition-examples-and-prevention<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/endpoint-security\/sophisticated-vishing-campaigns-take-world-by-storm\"><span style=\"font-weight: 400;\">https:\/\/www.darkreading.com\/endpoint-security\/sophisticated-vishing-campaigns-take-world-by-storm<\/span><\/a><\/p>\n<p><a href=\"https:\/\/edition.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html\"><span style=\"font-weight: 400;\">https:\/\/edition.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/threat-intelligence\/phishing-vs-smishing-vs-vishing\/\"><span style=\"font-weight: 400;\">https:\/\/www.sentinelone.com\/cybersecurity-101\/threat-intelligence\/phishing-vs-smishing-vs-vishing\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication. With AI-powered voice synthesis and deepfake technology, cybercriminals are now executing vishing attacks that are more sophisticated and convincing than ever before. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":986,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vishing and AI: The New Frontier of Cyber Threats - Blogs<\/title>\n<meta name=\"description\" content=\"Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vishing and AI: The New Frontier of Cyber Threats - Blogs\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-09T15:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-09T15:14:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/\",\"name\":\"Vishing and AI: The New Frontier of Cyber Threats - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg\",\"datePublished\":\"2025-03-09T15:02:00+00:00\",\"dateModified\":\"2025-03-09T15:14:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vishing and AI: The New Frontier of Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vishing and AI: The New Frontier of Cyber Threats - Blogs","description":"Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Vishing and AI: The New Frontier of Cyber Threats - Blogs","og_description":"Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-03-09T15:02:00+00:00","article_modified_time":"2025-03-09T15:14:23+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/","name":"Vishing and AI: The New Frontier of Cyber Threats - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg","datePublished":"2025-03-09T15:02:00+00:00","dateModified":"2025-03-09T15:14:23+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Cybersecurity threats are evolving, and one of the most concerning developments is the use of AI in social engineering attacks. One such attack is vishing\u2014a form of phishing that occurs over voice communication.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/03\/vishing.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/vishing-and-ai-the-new-frontier-of-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Vishing and AI: The New Frontier of Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=984"}],"version-history":[{"count":4,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/984\/revisions"}],"predecessor-version":[{"id":989,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/984\/revisions\/989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/986"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}