{"id":17762,"date":"2025-03-17T16:00:44","date_gmt":"2025-03-17T15:00:44","guid":{"rendered":"https:\/\/immune.institute\/?post_type=proyecto&#038;p=17762"},"modified":"2025-10-07T10:24:08","modified_gmt":"2025-10-07T08:24:08","slug":"cibersift-inteligencia-artificial-combatir-phishing","status":"publish","type":"proyectos","link":"https:\/\/immune.institute\/en\/proyectos\/cibersift-inteligencia-artificial-combatir-phishing\/","title":{"rendered":"CyberSift: How to leverage AI to combat phishing"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-f72ede8d wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\">Phishing is one of the most common methods used by cybercriminals to gain access to critical data and achieve their goals. This type of crime has a high chance of being successful, so its use is becoming more and more common.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">CiberSift was created with the idea of stopping these fraud attempts by detecting them and preventing them from reaching their destination. In this way, the user does not have to worry and companies can rest assured.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"card card-light wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-1-color\">Carried out by<\/mark><\/strong> Rubens Sanchez<\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Programme<\/strong> <a href=\"https:\/\/cybertalent.immune.institute\/\">Cybertalent: Cybersecurity Entrepreneurship Programme<\/a> | In collaboration with the National Institute for Cybersecurity (INCIBE)<\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Technologies<\/strong> Frontend | Backend | Artificial Intelligence<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">What is the motivation? <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Companies have a great deficit of employees specialised in cybersecurity, due to the lack of professionals in this sector. CiberSift was created to address this major problem that needs to be solved without further delay and to reduce the percentage of companies that suffer successful attacks considerably.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Program aims <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce the problems arising from not having sufficient cyber-security staff.<\/li>\n\n\n\n<li>Improve protection against phishing, one of the most common types of attack.<\/li>\n\n\n\n<li>Reduce user training costs.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-1024x576.jpg\" alt=\"\" class=\"wp-image-17793\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-1024x576.jpg 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-256x144.jpg 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-512x288.jpg 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-768x432.jpg 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-1536x864.jpg 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-2048x1152.jpg 2048w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/IMG_20241003_185108304_HDR-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">Development <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The process for solving this problem includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct free trials to demonstrate the need for and usefulness of a phishing detection tool.<\/li>\n\n\n\n<li>Develop an AI that is able to detect that an email is not legitimate and is a phishing fraud attempt.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Results <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">CyberSift is able to detect emails that may appear legitimate at first glance, reducing the impact of phishing on businesses and employees. It also relieves some of the pressure of not having cyber security specialists on staff, as it takes care of monitoring emails and allows experts to focus their energies on other tasks.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Entrepreneur Rubens Sanchez - Cibesift | CyberTalent Incubator by INCIBER\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/sMlxu_Y2a98?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">CiberSift ofrece un apoyo a la empresa en forma de detector de phishing, asegurando que los correos que llegan a las bandejas de entrada de los empleados son leg\u00edtimos.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>CiberSift ensures that phishing attempts are unsuccessful by monitoring incoming emails before they reach the user. It increases the effectiveness in detecting this type of cyber-attack, strengthening companies' defences.<\/p>","protected":false},"featured_media":17792,"menu_order":0,"template":"","area":[245,247],"class_list":["post-17762","proyectos","type-proyectos","status-publish","has-post-thumbnail","hentry","area-cyber","area-emprendimiento"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/proyectos"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/17792"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=17762"}],"wp:term":[{"taxonomy":"area","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/area?post=17762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}