Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google’s AI coding agent Jules is now out of beta

    August 7, 2025

    Poco M7 Plus 5G India Launch Date Declaration: Expected Price, Specification

    August 7, 2025

    Air France and KLM reveal data violations affecting customers

    August 7, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Clement Domingo: “We are not using AI properly to protect ourselves”
    Security

    Clement Domingo: “We are not using AI properly to protect ourselves”

    PineapplesUpdateBy PineapplesUpdateJuly 18, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Clement Domingo: “We are not using AI properly to protect ourselves”
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Clement Domingo: “We are not using AI properly to protect ourselves”

    Next Kasparksi horizon On 1 July in Madrid, Clement Domingo, Ethical Hacker and Cybercity Egilists, Cybercrime Landscape states that now the legitimate startup looks like the world: collaborative and even structured outfits with team-building culture.

    How a criminal startup works

    “A cybercrime startup is similar to a classic Startup, but dedicated to cyber crime in a very efficient way, tells through email. What we call most of the colleagues, which allows them to operate around the world and attack any organization or unit. In most cases, the startup holds 20% of the ransom and the partner takes 80%. ,

    These are companies such, as they give details, provide all the necessary equipment and procedures to commit cyber crime, such as the thefts stealing credentials, the best markets on the dark web, the best markets, human resources, finance, conversations and more.

    “To give you an idea,” says Domingo, “they work like almost any other company: they have offices, good equipment and even do team building Activities … if you think about it … then it’s crazy! Their infrastructure depends on the degree of maturity Ransomware Group. Some are very advanced. For example, many people in cybercrime ecosystem work behind the bulletproof host (BHP), so their infrastructure, even if they provide malware, command and control or any other malicious element, because it is something that does not matter to the vendors behind it, as they pay in the crippely. Talking about cybercrime infrastructure can be overwhelming; You realize that they really know how to work and hide….

    Cybercrime “Pool”

    As Domingo accepts, cybercrime is rapidly uncertain, and he provides a shocking and frightening facts: “I can testify that they are getting smaller and small … the average is 13 years old!”

    Then, thanks to other activity partners to face a process of “mature”. A training phrase to find out how far they are capable of going.

    But the important revelation is that, in more than some cases – and there is a danger according to Domingo – it is that “some of them do not do this for money, but for glory, to be able to say this to be able to say:” Look at which company I was able to hack! “But the loss is very big.”

    Once they discovered the world of cyber crime and at the top, that many companies, especially small, are ready to pay some dollars or thousands of dollars, “they already start taking this activity seriously, which motivates them to dedicate themselves professionally”. At this point, “Glory and money appeal for something, but for others it is only ideology. As far as I have seen in all struggles around the world, many are done to protest or claim something,” they say.

    How to stop this “mine”

    “This is a very complex question,” accepts Domingo. In his opinion, there are many ways to enter this world: through video game cheating code or programming, not mentioning hours of costs on some discords or telegram channels; “Joe, by the way, is the new dark web,” he notes.

    “I can say that many infiltration I can say that some people join groups because they want to learn how to do the program or only because they are eager. Then, at least, they get the approach, which over time, crystallizing in proposals to download a particular program, or if they will be ready to do another. It is simple how they enter this world.”

    Cybercrime: A young people attracted to cyber education are an important tool to combat this unprecedented growth. “This is very important. If these children saw earlier that interesting things can be done in cyberspace, then perhaps they do not revolt in the first place. But to do so, our governments and schools should have programs to train them and in places where they can learn while having fun, because cybernetics and artificial intelligence are fun when you know all their abilities when you know.”

    “In my daily work as a moral hacker, I go to many schools and also meet young people to tell them about my background and tried to awaken the desire to become moral hackers,” he says.

    AI’s influence on cybercrime

    AI our entire ecosystem, giving shape to our world again, “and the cyber criminal knows.”

    Domingo admits that they are using AI in their attacks and the way they interact with their goals. It is very easy to host or make your own dark evil – whatever you want, whatever you can think – an AI that will be the brain of your cyber crime. When I see what is happening now, I should accept that we are not using AI properly because it is too early, and then we will complain or regret it when it is too late. All the big companies competing in the AI ecosystem are the first to launch this new version of LLM/AI, as well as the voices, face, or whatever can happen in seconds, to save it, they are passionate without protecting it! What do cyber criminals do? Logical talk: Use it against us.

    But companies also need to keep in mind some of it. “Many people think that there is AI magic, so they can apply new AI-operated applications without acquiring the basics. Therefore, it is easy for cyber criminals to misuse it. Recently, we have seen how some companies used AI, which was used with 123456, how did some companies use AI, how did some companies use AI, like McDonald’s. Did. “

    How Cyber Criminal has determined financial demand

    “Most of the time, cybercrime ecosystem has a” humble cyber agreement “. What does it mean? If a company is attacked, they will be asked between 1 to 10% of their annual revenue. However, they can also trust what they study, listen, or see them in the media, which motivates them to hack and demand a range.”

    Clement Domingo also noted that SMEs are being attacked in recent months, because in their opinion, “Some lower-level cyber criminals have felt that attacking these companies and asking for a low amount is more interesting to attack a large and ask for a higher amount.”

    So is it possible to stay one step ahead of them? “Of course this is possible!” He answers, clearly. And they argue: “This is what we call CTI (Cyber Threat Intelligence): the ability to detect all illegal signs and analyze many parameters in a specific domain and also allow us to understand the geopolitical ecosystem and one step further.”

    So his advice here is: “To defend our industries, our internet freedom and defeat these cyber criminals, you need to think like an attacker. But, to be honest, they are much better than us because we do not fight with the same cyber weapons. Because many professionals rely on technical aspects.

    Clement Domingo properly protect
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHackers continued attempting to exploit the forkad signal app: report
    Next Article iPados 26 is turning my ipad air into ultraopeportable laptop
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Air France and KLM reveal data violations affecting customers

    August 7, 2025
    Security

    Windows tips to reduce ransomware danger

    August 7, 2025
    Security

    Why I stopped recommending the pre -made SSD for Windows PC – and what to buy instead

    August 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Google’s AI coding agent Jules is now out of beta

    August 7, 2025

    Poco M7 Plus 5G India Launch Date Declaration: Expected Price, Specification

    August 7, 2025

    Air France and KLM reveal data violations affecting customers

    August 7, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.