{"id":342974,"date":"2025-06-26T12:00:55","date_gmt":"2025-06-26T10:00:55","guid":{"rendered":"https:\/\/sauldie.org\/de\/adversarial-ai-cybersecurity-angriffe\/"},"modified":"2025-06-26T12:00:55","modified_gmt":"2025-06-26T10:00:55","slug":"adversarial-ai-cybersecurity-attacks","status":"publish","type":"post","link":"https:\/\/risawave.org\/en\/adversarial-ai-cybersecurity-angriffe\/","title":{"rendered":"Adversarial AI (Glossary)"},"content":{"rendered":"<p>Adversarial AI is a term from the categories Artificial Intelligence, Cybercrime and Cybersecurity, and Digital Transformation. It describes the use of artificial intelligence with the aim of tricking, outsmarting, or attacking other AI systems.<\/p>\n<p>Imagine a company using an AI to filter out fraudulent emails. However, criminals can use adversarial AI to specifically modify emails so that they are not recognised by this filter AI. The malicious emails then reach the recipient unnoticed.<\/p>\n<p>Adversarial AI therefore works like a digital trickster: it recognises weaknesses in the AI and exploits them in a targeted manner. This can cause problems in many areas - for example in autonomous driving, when traffic signs are manipulated so that they are incorrectly recognised by a vehicle AI.<\/p>\n<p>That is why it is important for companies today to secure their systems not only against classic hackers but also against attacks with adversarial AI. Only in this way can the security of artificial intelligence be guaranteed in the long term and user trust be maintained.<\/p>","protected":false},"excerpt":{"rendered":"<p>Adversarial AI ist ein Begriff aus den Kategorien K\u00fcnstliche Intelligenz, Cyberkriminalit\u00e4t und Cybersecurity sowie Digitale Transformation. Er beschreibt den Einsatz k\u00fcnstlicher Intelligenz mit dem Ziel, andere KI-Systeme auszutricksen, zu \u00fcberlisten oder anzugreifen. Stellen Sie sich vor, ein Unternehmen nutzt eine KI, um betr\u00fcgerische E-Mails herauszufiltern. Kriminelle k\u00f6nnen jedoch Adversarial AI verwenden, um gezielt E-Mails so &#8230; <a title=\"Adversarial AI (Glossary)\" class=\"read-more\" href=\"https:\/\/risawave.org\/en\/adversarial-ai-cybersecurity-angriffe\/\" aria-label=\"Read more about Adversarial AI (Glossar)\">Read more<\/a><\/p>","protected":false},"author":2,"featured_media":342973,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ef_editorial_meta_date_first-draft-date":"","_ef_editorial_meta_paragraph_assignment":"","_ef_editorial_meta_checkbox_needs-photo":"","_ef_editorial_meta_number_word-count":"","footnotes":""},"categories":[65,26,28,1274,20],"tags":[247,69,1270,1271,1272],"class_list":["post-342974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberkriminalitaet-cybersecurity","category-automatisierung","category-digitale-transformation","category-kuenstliche-intelligenz-glossar","category-kiroi-blog","tag-3ddruck","tag-innovationdurchachtsamkeit","tag-kostenersparnis","tag-lieferkette","tag-wertschoepfung","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-25"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Adversarial AI<\/title>\n<meta name=\"description\" content=\"Adversarial AI gezielt erkennen &amp; stoppen: Erfahren Sie jetzt, wie Sie Ihre KI-Systeme wirksam sch\u00fctzen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/risawave.org\/en\/adversarial-ai-cybersecurity-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adversarial AI (Glossar)\" \/>\n<meta property=\"og:description\" content=\"Adversarial AI (Glossar) - - risawave.org\" \/>\n<meta property=\"og:url\" content=\"https:\/\/risawave.org\/en\/adversarial-ai-cybersecurity-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"risawave.org\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-26T10:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/adversarial-ai-cybersecurity-angriffe.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sanjay Sauldie (M.Sc.)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sanjay Sauldie (M.Sc.)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/\"},\"author\":{\"name\":\"Sanjay Sauldie (M.Sc.)\",\"@id\":\"https:\\\/\\\/risawave.org\\\/#\\\/schema\\\/person\\\/a88d2a92d710b97d3eaaca6aa2a70fc4\"},\"headline\":\"Adversarial AI (Glossar)\",\"datePublished\":\"2025-06-26T10:00:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/\"},\"wordCount\":173,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/adversarial-ai-cybersecurity-angriffe.jpg\",\"keywords\":[\"#3DDruck\",\"#InnovationDurchAchtsamkeit\",\"#Kostenersparnis\",\"#Lieferkette\",\"#Wertsch\u00f6pfung\"],\"articleSection\":[\"Cyberkriminalit\u00e4t und Cybersecurity\",\"Automatisierung\",\"Digitale Transformation\",\"KI Glossar\",\"K\u00fcnstliche Intelligenz\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/en\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/\",\"url\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/\",\"name\":\"Adversarial AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/adversarial-ai-cybersecurity-angriffe.jpg\",\"datePublished\":\"2025-06-26T10:00:55+00:00\",\"description\":\"Adversarial AI gezielt erkennen & stoppen: Erfahren Sie jetzt, wie Sie Ihre KI-Systeme wirksam sch\u00fctzen!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/adversarial-ai-cybersecurity-angriffe.jpg\",\"contentUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/adversarial-ai-cybersecurity-angriffe.jpg\",\"width\":1080,\"height\":1350,\"caption\":\"Adversarial AI gezielt erkennen & stoppen: Erfahren Sie jetzt, wie Sie Ihre KI-Systeme wirksam sch\u00fctzen!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/risawave.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adversarial AI (Glossar)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/risawave.org\\\/#website\",\"url\":\"https:\\\/\\\/risawave.org\\\/\",\"name\":\"risawave.org\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/risawave.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/risawave.org\\\/#organization\",\"name\":\"risawave.org\",\"url\":\"https:\\\/\\\/risawave.org\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#local-main-organization-logo\"},\"telephone\":[\"015140530884\"],\"openingHoursSpecification\":[],\"email\":\"office@newrella.hk\",\"faxNumber\":\"newrella Limited\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/risawave.org\\\/#\\\/schema\\\/person\\\/a88d2a92d710b97d3eaaca6aa2a70fc4\",\"name\":\"Sanjay Sauldie (M.Sc.)\",\"sameAs\":[\"https:\\\/\\\/risawave.org\"],\"url\":\"https:\\\/\\\/risawave.org\\\/en\\\/author\\\/sanjay-sauldie\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/risawave.org\\\/adversarial-ai-cybersecurity-angriffe\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Globales-logo-scaled-1.png\",\"contentUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Globales-logo-scaled-1.png\",\"width\":2560,\"height\":2560,\"caption\":\"risawave.org\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u8202\u574e\u89d2\" \/>\n<meta name=\"geo.region\" content=\"Hong Kong\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Adversarial AI","description":"Targeted detection and stopping of adversarial AI: Learn how to effectively protect your AI systems now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/risawave.org\/en\/adversarial-ai-cybersecurity-attacks\/","og_locale":"en_GB","og_type":"article","og_title":"Adversarial AI (Glossar)","og_description":"Adversarial AI (Glossar) - - risawave.org","og_url":"https:\/\/risawave.org\/en\/adversarial-ai-cybersecurity-attacks\/","og_site_name":"risawave.org","article_published_time":"2025-06-26T10:00:55+00:00","og_image":[{"width":1080,"height":1350,"url":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/adversarial-ai-cybersecurity-angriffe.jpg","type":"image\/jpeg"}],"author":"Sanjay Sauldie (M.Sc.)","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sanjay Sauldie (M.Sc.)","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#article","isPartOf":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/"},"author":{"name":"Sanjay Sauldie (M.Sc.)","@id":"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4"},"headline":"Adversarial AI (Glossar)","datePublished":"2025-06-26T10:00:55+00:00","mainEntityOfPage":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/"},"wordCount":173,"commentCount":0,"publisher":{"@id":"https:\/\/risawave.org\/#organization"},"image":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#primaryimage"},"thumbnailUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/adversarial-ai-cybersecurity-angriffe.jpg","keywords":["#3DDruck","#InnovationDurchAchtsamkeit","#Kostenersparnis","#Lieferkette","#Wertsch\u00f6pfung"],"articleSection":["Cyberkriminalit\u00e4t und Cybersecurity","Automatisierung","Digitale Transformation","KI Glossar","K\u00fcnstliche Intelligenz"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/risawave.org\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/","url":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/","name":"Adversarial AI","isPartOf":{"@id":"https:\/\/risawave.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#primaryimage"},"image":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#primaryimage"},"thumbnailUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/adversarial-ai-cybersecurity-angriffe.jpg","datePublished":"2025-06-26T10:00:55+00:00","description":"Targeted detection and stopping of adversarial AI: Learn how to effectively protect your AI systems now!","breadcrumb":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#primaryimage","url":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/adversarial-ai-cybersecurity-angriffe.jpg","contentUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/08\/adversarial-ai-cybersecurity-angriffe.jpg","width":1080,"height":1350,"caption":"Adversarial AI gezielt erkennen & stoppen: Erfahren Sie jetzt, wie Sie Ihre KI-Systeme wirksam sch\u00fctzen!"},{"@type":"BreadcrumbList","@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/risawave.org\/"},{"@type":"ListItem","position":2,"name":"Adversarial AI (Glossar)"}]},{"@type":"WebSite","@id":"https:\/\/risawave.org\/#website","url":"https:\/\/risawave.org\/","name":"risawave.org","description":"","publisher":{"@id":"https:\/\/risawave.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/risawave.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Organization","Place"],"@id":"https:\/\/risawave.org\/#organization","name":"risawave.org","url":"https:\/\/risawave.org\/","logo":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#local-main-organization-logo"},"image":{"@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#local-main-organization-logo"},"telephone":["015140530884"],"openingHoursSpecification":[],"email":"office@newrella.hk","faxNumber":"newrella Limited"},{"@type":"Person","@id":"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4","name":"Sanjay Sauldie (M.Sc.)","sameAs":["https:\/\/risawave.org"],"url":"https:\/\/risawave.org\/en\/author\/sanjay-sauldie\/"},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/risawave.org\/adversarial-ai-cybersecurity-angriffe\/#local-main-organization-logo","url":"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png","contentUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png","width":2560,"height":2560,"caption":"risawave.org"}]},"geo.placename":"\u8202\u574e\u89d2","geo.region":"Hong Kong"},"_links":{"self":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/342974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/comments?post=342974"}],"version-history":[{"count":0,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/342974\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/media\/342973"}],"wp:attachment":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/media?parent=342974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/categories?post=342974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/tags?post=342974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}