Artwork

Content provided by CovertSwarm. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CovertSwarm or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 34 - The AI Impersonation with Ron Eddings

24:50
 
Share
 

Manage episode 458270948 series 3341467
Content provided by CovertSwarm. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CovertSwarm or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In this second episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm’s Academy Hive Leader, Iain Jackson, for an eye-opening, innovative, and unsettling episode.

This time, Ron’s voice is cloned live on air. Using cutting-edge AI impersonation tools, Iain demonstrates how attackers can weaponize synthetic voices to breach organizational defenses, this time by cloning our host's voice. They’ll dissect the mechanics behind this tactic and reveal why phishing got much more personal.

While many still fixate on stopping email-based scams, Iain will expose the vulnerabilities in voice-based verification systems. From bypassing phone-based security protocols to exploiting human trust in familiarity, this conversation is a wake-up call.

They’ll also explore the role of a psychological phenomenon named the uncanny valley, where slight imperfections in synthetic voices or behaviors can trigger a gut feeling that something isn’t right. Trusting this instinct could be the key to spotting and stopping scammers before they succeed.

Tune in to discover how CovertSwarm’s relentless testing methodology mirrors techniques used by your worst cyber nightmares and why it’s essential to pressure-test every layer of your defenses against threats that blur the line between the digital and the social.

Hosted by Hacker Valley.

--

Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year.

They subscribe to CovertSwarm.

  continue reading

36 episodes

Artwork
iconShare
 
Manage episode 458270948 series 3341467
Content provided by CovertSwarm. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CovertSwarm or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In this second episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm’s Academy Hive Leader, Iain Jackson, for an eye-opening, innovative, and unsettling episode.

This time, Ron’s voice is cloned live on air. Using cutting-edge AI impersonation tools, Iain demonstrates how attackers can weaponize synthetic voices to breach organizational defenses, this time by cloning our host's voice. They’ll dissect the mechanics behind this tactic and reveal why phishing got much more personal.

While many still fixate on stopping email-based scams, Iain will expose the vulnerabilities in voice-based verification systems. From bypassing phone-based security protocols to exploiting human trust in familiarity, this conversation is a wake-up call.

They’ll also explore the role of a psychological phenomenon named the uncanny valley, where slight imperfections in synthetic voices or behaviors can trigger a gut feeling that something isn’t right. Trusting this instinct could be the key to spotting and stopping scammers before they succeed.

Tune in to discover how CovertSwarm’s relentless testing methodology mirrors techniques used by your worst cyber nightmares and why it’s essential to pressure-test every layer of your defenses against threats that blur the line between the digital and the social.

Hosted by Hacker Valley.

--

Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year.

They subscribe to CovertSwarm.

  continue reading

36 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play