NIST Unveils Guidelines to Spot Deepfakes of Faces

The National Institute of Standards and Technology (NIST) has released new guidelines aimed at detecting deepfake images of human faces. These guidelines provide a framework for identifying synthetic media generated by artificial intelligence, which can be used to deceive individuals and manipulate public opinion. The rise of deepfake technology poses significant cybersecurity and privacy risks, as malicious actors can create realistic but fake images and videos to impersonate individuals or spread misinformation. NIST's guidelines focus on technical methods to analyze facial features, inconsistencies, and artifacts that are common in deepfake images. This initiative supports organizations and security professionals in enhancing their defenses against synthetic media threats. The guidelines also emphasize the importance of continuous research and development to keep pace with evolving deepfake generation techniques. By adopting these standards, companies can improve their detection capabilities, protect user identities, and maintain trust in digital communications. This development is crucial in the broader context of cybersecurity, where artificial intelligence tools are increasingly used both for defense and attack purposes. The NIST guidelines represent a proactive step towards mitigating the risks associated with AI-generated synthetic media and safeguarding digital authenticity.

This Cyber News was published on www.infosecurity-magazine.com. Publication date: Thu, 21 Aug 2025 09:15:25 +0000


Cyber News related to NIST Unveils Guidelines to Spot Deepfakes of Faces

NIST Unveils Guidelines to Spot Deepfakes of Faces - The National Institute of Standards and Technology (NIST) has released new guidelines aimed at detecting deepfake images of human faces. These guidelines provide a framework for identifying synthetic media generated by artificial intelligence, which ...
5 days ago Infosecurity-magazine.com
Meet the UC Berkeley professor tracking election deepfakes - Not in recent history has a technology come along with the potential to harm society more than deepfakes. The manipulative, insidious AI-generated content is already being weaponized in politics and will be pervasive in the upcoming U.S. Presidential ...
1 year ago Venturebeat.com
AI, Deepfakes and Digital ID: The New Frontier of Corporate Cybersecurity - iD. The emergence of deepfakes fired the starting pistol in a cybersecurity arms race. Deepfakes will intensify the already acute pressure placed on trust and communication in the public sphere. Because of this focus, what risks being missed is the ...
1 year ago Cyberdefensemagazine.com
Accelerating Safe and Secure AI Adoption with ATO for AI: stackArmor Comments on OMB AI Memo - We appreciate the opportunity to comment on the proposed Memo on Agency Use of Artificial Intelligence. Ensuring agencies have access to adequate IT infrastructure,. We base our remarks on our experience helping US Federal agencies transform their ...
1 year ago Securityboulevard.com
CMMC v2.0 vs NIST 800-171: Understanding the Differences - The NIST SP 800-171 lays out the requirements for any non-federal agency that handles controlled unclassified information, or other sensitive federal information. DFARS does not address the CMMC at all but a new clause is currently being drafted for ...
1 year ago Securityboulevard.com
NIST Fortifies Chatbots and Self-Driving Cars Against Digital Threats - In a landmark move, the US National Institute of Standards and Technology has taken a new step in developing strategies to fight against cyber-threats that target AI-powered chatbots and self-driving cars. The Institute released a new paper on ...
1 year ago Infosecurity-magazine.com
What is the NIST Cybersecurity Framework? Definition from SearchSecurity - The NIST Cybersecurity Framework provides guidance on how to manage and reduce IT infrastructure security risk. NIST created the CSF to help private sector organizations in the United States develop a roadmap for critical infrastructure ...
1 year ago Techtarget.com
AI and deepfakes: How to be AI-savvy - Webroot Blog - Services like Webroot’s identity protection help you monitor for suspicious identity theft activity, keeping an eye on things like the Dark Web, financial transactions, and credit bureau data. So, how can you protect yourself from AI-driven scams ...
10 months ago Webroot.com
How AI can be hacked with prompt injection: NIST report - As AI proliferates, so does the discovery and exploitation of AI cybersecurity vulnerabilities. Prompt injection is one such vulnerability that specifically attacks generative AI. In Adversarial Machine Learning: A Taxonomy and Terminology of Attacks ...
1 year ago Securityintelligence.com
How the New NIST 2.0 Guidelines Help Detect SaaS Threats - The SaaS ecosystem has exploded in the six years since the National Institute of Standards and Technology's cybersecurity framework 1.1 was released. Back in 2016-2017, when version 1.1 was initially drafted, SaaS held a small but significant place ...
1 year ago Bleepingcomputer.com
Ensuring a Secure Future: Global Guidelines for AI Security - With the increasing integration of AI into various facets of our lives, concerns about security and ethical considerations have come to the forefront. Establishing global guidelines for AI security is imperative to harness the benefits of this ...
1 year ago Cybersecurity-insiders.com
Deepfakes mean biometric security measures won't be enough The Register - Cyber attacks using AI-generated deepfakes to bypass facial biometrics security will lead a third of organizations to doubt the adequacy of identity verification and authentication tools as standalone protections. Or so says consultancy and market ...
1 year ago Go.theregister.com
Deepfakes mean biometric security measures won't be enough The Register - Cyber attacks using AI-generated deepfakes to bypass facial biometrics security will lead a third of organizations to doubt the adequacy of identity verification and authentication tools as standalone protections. Or so says consultancy and market ...
1 year ago Theregister.com
Deepfake attacks will cost $40 billion by 2027 - Now one of the fastest-growing forms of adversarial AI, deepfake-related losses are expected to soar from $12.3 billion in 2023 to $40 billion by 2027, growing at an astounding 32% compound annual growth rate. Deloitte sees deep fakes proliferating ...
1 year ago Venturebeat.com
NIST: No Silver Bullet Against Adversarial Machine Learning Attacks - NIST has published a report on adversarial machine learning attacks and mitigations, and cautioned that there is no silver bullet for these types of threats. Adversarial machine learning, or AML, involves extracting information about the ...
1 year ago Securityweek.com
FAQ: What Is DFARS Compliance and How Does It Work? - Our intention is to offer a comprehensive perspective on DFARS in the context of cybersecurity, its various clauses, and the intricacies of maintaining compliance as these rules constantly shift and change over time. Size doesn't matter - big global ...
1 year ago Securityboulevard.com
Cybersecurity Standards vs Procedures vs Controls vs Policies - Four interrelated terms used in cybersecurity are Policies, Procedures, Standards, Guidelines, and Controls. Policies are at the top, Standards and Guidelines add detail to policies, Controls are the measured outcome of standards in use, and ...
1 year ago Securityboulevard.com
What Is a Firewall Policy? Ultimate Guide - A firewall policy is a set of rules and standards designed to control network traffic between an organization's internal network and the internet. There are key components to consider, main types of firewall policies and firewall configurations to be ...
1 year ago Esecurityplanet.com
FBI: US officials targeted in voice deepfake attacks since April - This warning is part of a public service announcement issued on Thursday that also provides mitigation measures to help the public spot and block attacks using audio deepfakes (also known as voice deepfakes). The FBI warned that cybercriminals using ...
3 months ago Bleepingcomputer.com
Week in review: Attackers trying to access Check Point VPNs, NIST CSF 2.0 security metrics evolution - RansomLord: Open-source anti-ransomware exploit toolRansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. Attackers are probing Check Point Remote Access VPN devicesAttackers ...
1 year ago Helpnetsecurity.com CVE-2024-24919 CVE-2024-23108 CVE-2023-34992
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
1 year ago Helpnetsecurity.com
Preparing for Q-Day as NIST nears approval of PQC standards - Q-Day-the day when a cryptographically relevant quantum computer can break most forms of modern encryption-is fast approaching, leaving the complex systems our societies rely on vulnerable to a new wave of cyberattacks. While estimates just a few ...
1 year ago Helpnetsecurity.com
The US National Institute of Standards and Technology Announces the Successful Encryption Algorithm for Securing Internet of Things Data - The National Institute of Standards and Technology (NIST) recently announced that ASCON was the winning bid for its Lightweight Cryptography Program. This program was designed to find the best algorithm to protect small Internet of Things (IoT) ...
2 years ago Bleepingcomputer.com
NIST Confusion Continues as Cyber Pros Complain CVE Uploads Stopped - A recent rise in software vulnerability exploits has come as the US National Vulnerability Database, the world's most comprehensive vulnerability database, experiences its most significant crisis in history. After experiencing a vulnerability ...
1 year ago Infosecurity-magazine.com
New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol - PRESS RELEASE. Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks. The latest internet security protocol, known as TLS 1.3, provides state-of-the-art protection, but ...
1 year ago Darkreading.com

Cyber Trends (last 7 days)