The use of Genai agents and the one to combat the fraud generated by him
Many of today’s fraudsters are understanding how to use it to automate and structure the frauds that are unique to every person they aim for. If fraudsters can analyze your data, learn your models, trace your interests, and use whom you believe – how can you fight them?
According to Sas’s innovated speakers, Mauro Souza from Sas and Lucas Paul of Gmwit Consulting, the best way to combat empowered fraud he is with him. “He has to fight for evil for good,” said Souza, a SAS system engineer.
Energy phishing fraud he can rely on data analysis, personalization, content creation, degree and automation, Souza explains. “While traditional phishing attacks rely on social engineering techniques, Phishing attacks led by it rely on machinery learning techniques.”
PHISHING FRIENDS WITH ENERGY He includes:
- Audio and Conversational Frauds.
- Realistic deep content.
- Comprotted by custom business -compromised attacks.
- Automated posts and social media profiles.
“We have fraudsters who use it against us,” Souza said. “We have to do something to fight again.”
Souza and Paul continued to explain how Sas and GMWit are using him and him generating agents to identify and prevent these types of fraud. Genai’s fighting techniques include:
- Identifying rare deviation patterns.
- Simulation of many vector attacks.
- Actively analyzing fraud networks.
- Generating synthetic data for training and validity.
- Predicting the impact of possible fraud.

Fighting the deception of him with the agents of him
Paul, GMW’s leading technology official, shared a demonstration of his agent, his team built to fight fraud using the SAS intelligence decision. The agent was trained using 100,000 examples of Phishing electronic posts compared to real email, he explained.
Plain told the audience how he asks the agent to analyze new emails, identify phishing fraud, and explain his findings. The factors in the analysis, according to the agent, include:
- Offers that are too good to be true.
- Grammatical errors.
- Dangerous fields.
- Urgent tone or request to do something immediately.
Palin said it is common in Brazil to receive many emails from the government asking citizens to register and register for various things, and the fraudsters have copied these emails for phishing fraud.
“I can ask him to analyze that line in a row and give me an analysis, Paul said.” This shows me models, risks and recommendations. “
Paul demonstrates how easy it is to create a rule in SAS intelligent decision -making. “When I create an alarm, it is possible to connect with a database and approach investigator Visual Sas, see all the details and take some actions,” he said.
Even with the best technology, Souza told the audience that education and training are essential to continue fighting fraud. If fraudsters can penetrate your organization through advanced phishing frauds, intended for employees or customers, it is important to train those individuals to recognize fraud and how to use tools to fight it.