Business ❯Corporate Security ❯Cyber Threats
Voice Technology
Federal investigators report that the breach exploited AI to replicate Wiles’ voice to deceive her private phone contacts.