{"id":118681,"date":"2026-03-17T10:00:10","date_gmt":"2026-03-17T03:00:10","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=118681"},"modified":"2026-04-01T15:19:53","modified_gmt":"2026-04-01T08:19:53","slug":"ai-powered-cyberattacks-target-human-trust","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/jp\/ai-powered-cyberattacks-target-human-trust\/","title":{"rendered":"AI-Powered Cyberattacks Target Human Trust"},"content":{"rendered":"<p><span data-contrast=\"auto\">Artificial intelligence is accelerating cyberattacks by automating reconnaissance and enabling highly personalized\u00a0scams, but security experts warn that the true vulnerability\u00a0remains\u00a0human trust. According to\u00a0Righard\u00a0Zwienenberg, modern cyberattacks increasingly manipulate human judgment rather than exploit technical weaknesses.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><strong data-start=\"0\" data-end=\"16\" data-is-only-node=\"\">\u79c1<\/strong>ncreasingly, cybercriminals are using AI tools to scale attacks across the entire lifecycle. For example, attackers can analyze social media, leaked databases, and public records to build victim profiles in minutes. At the same time, generative AI helps craft phishing messages that mimic local language and writing style. Meanwhile, attackers now rely on browser manipulation and AI-assisted business email compromise to guide victims through seemingly legitimate workflows.<\/p>\n<p><span data-contrast=\"auto\">The growing sophistication of scams has also challenged a long-standing assumption: that fraudulent messages are easy to identify. Traditional warning signs such as poor grammar or suspicious links, are becoming less common as AI-generated communication blends seamlessly into everyday corporate messaging.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Phishing\u00a0remains\u00a0particularly effective because it targets human behavior rather than software vulnerabilities. Social engineering exploits psychological triggers such as urgency, familiarity, and authority (factors that technology alone cannot eliminate). Voice cloning technology further amplifies this risk, allowing attackers to impersonate executives or colleagues using short audio samples.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Security leaders increasingly argue that defending against AI-enabled\u00a0scams\u00a0requires a shift in strategy. Instead of focusing solely on technical detection tools, organizations must emphasize process-based verification, including independent approval steps, structured workflows, and cross-channel identity confirmation.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As AI-driven cybercrime continues to evolve, organizations must assume that some attacks will succeed. The most resilient security strategies focus not only on prevention but also on rapid detection, containment, and recovery from socially engineered breaches.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u91cd\u8981\u306a\u30dd\u30a4\u30f3\u30c8:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">AI enables attackers to automate reconnaissance and create highly personalized phishing messages.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Modern\u00a0scams\u00a0increasingly exploit human trust rather than technical vulnerabilities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Voice cloning and multi-channel impersonation are emerging cybercrime techniques.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Organizations must adopt process-based verification and stronger human-centered defenses.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u30bd\u30fc\u30b9\uff1a<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.itnews.asia\/news\/ai-transforms-cyberattacks-but-human-trust-remains-the-weakest-link-624226\"><span data-contrast=\"none\">https:\/\/www.itnews.asia\/news\/ai-transforms-cyberattacks-but-human-trust-remains-the-weakest-link-624226<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is accelerating cyberattacks by automating reconnaissance and enabling highly personalized\u00a0scams, but security experts warn that the true vulnerability\u00a0remains\u00a0human trust. According to\u00a0Righard\u00a0Zwienenberg, modern cyberattacks increasingly manipulate human judgment rather than exploit technical weaknesses.\u00a0 Increasingly, cybercriminals are using AI tools to scale attacks across the entire lifecycle. For example, attackers can analyze social media, leaked databases, and public records to build victim profiles in minutes. At the same time, generative AI helps craft phishing messages that mimic local language and writing style. Meanwhile, attackers now rely on browser manipulation and AI-assisted business email compromise to guide victims through seemingly legitimate workflows. The growing sophistication of scams has also challenged a [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":118683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488,1646,1538],"class_list":["post-118681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai","tag-cyberattacks","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI-Powered Cyberattacks Target Human Trust - Eastgate Software<\/title>\n<meta name=\"description\" content=\"AI-powered cyberattacks are targeting human trust, forcing organizations to rethink cybersecurity strategies and identity verification.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Powered Cyberattacks Target Human Trust\" \/>\n<meta property=\"og:description\" content=\"AI-powered cyberattacks are targeting human trust, forcing organizations to rethink cybersecurity strategies and identity verification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/jp\/ai-powered-cyberattacks-target-human-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T03:00:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:19:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"AI-Powered Cyberattacks Target Human Trust\",\"datePublished\":\"2026-03-17T03:00:10+00:00\",\"dateModified\":\"2026-04-01T08:19:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/\"},\"wordCount\":322,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Ai\",\"Cyberattacks\",\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/\",\"name\":\"AI-Powered Cyberattacks Target Human Trust - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2026-03-17T03:00:10+00:00\",\"dateModified\":\"2026-04-01T08:19:53+00:00\",\"description\":\"AI-powered cyberattacks are targeting human trust, forcing organizations to rethink cybersecurity strategies and identity verification.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"AI-Powered Cyberattacks Target Human Trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-powered-cyberattacks-target-human-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI-Powered Cyberattacks Target Human Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/jp\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI-Powered Cyberattacks Target Human Trust - Eastgate Software","description":"AI-powered cyberattacks are targeting human trust, forcing organizations to rethink cybersecurity strategies and identity verification.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"ja_JP","og_type":"article","og_title":"AI-Powered Cyberattacks Target Human Trust","og_description":"AI-powered cyberattacks are targeting human trust, forcing organizations to rethink cybersecurity strategies and identity verification.","og_url":"https:\/\/wp.eastgate-software.com\/jp\/ai-powered-cyberattacks-target-human-trust\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-03-17T03:00:10+00:00","article_modified_time":"2026-04-01T08:19:53+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"\u57f7\u7b46\u8005":"huongnguyen253","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"AI-Powered Cyberattacks Target Human Trust","datePublished":"2026-03-17T03:00:10+00:00","dateModified":"2026-04-01T08:19:53+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/"},"wordCount":322,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1","keywords":["Ai","Cyberattacks","cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/","url":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/","name":"AI-Powered Cyberattacks Target Human Trust - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1","datePublished":"2026-03-17T03:00:10+00:00","dateModified":"2026-04-01T08:19:53+00:00","description":"AI-powered cyberattacks are targeting human trust, forcing organizations to rethink cybersecurity strategies and identity verification.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"AI-Powered Cyberattacks Target Human Trust"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/ai-powered-cyberattacks-target-human-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"AI-Powered Cyberattacks Target Human Trust"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"\u30b0\u30ed\u30fc\u30d0\u30eb\u30d5\u30a9\u30fc\u30c1\u30e5\u30f3500\u4f01\u696d\u306e\u6226\u7565\u7684\u30d1\u30fc\u30c8\u30ca\u30fc","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"\u30d5\u30aa\u30f3\u30b0\u30a8\u30f3253","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/jp\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/03\/EGS-news-website-1366-x-768px-1-7.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uSd","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/comments?post=118681"}],"version-history":[{"count":4,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118681\/revisions"}],"predecessor-version":[{"id":119476,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118681\/revisions\/119476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media\/118683"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media?parent=118681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/categories?post=118681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/tags?post=118681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}