{"id":26893,"date":"2025-09-02T12:45:34","date_gmt":"2025-09-02T10:45:34","guid":{"rendered":"https:\/\/perseus.de\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/"},"modified":"2026-03-30T11:46:14","modified_gmt":"2026-03-30T09:46:14","slug":"in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/","title":{"rendered":"In Focus: Artificial Intelligence as an Attack Vector, Example: Deepfakes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26893\" class=\"elementor elementor-26893 elementor-24935\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In focus: AI attacks using the example of deepfakes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Artificial intelligence opens up new, fascinating possibilities \u2013 unfortunately also for cybercriminals. They are increasingly using so-called deepfakes: AI-generated fakes of videos, images or voices that are used in the work environment for deceptively real attacks. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-768x768.png\" class=\"attachment-medium_large size-medium_large wp-image-26891\" alt=\"Illustration of a human head with neural connections symbolizing Artificial Intelligence, with large lettering &#039;AI&#039;.\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_41_23-PM.png 1024w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 data-start=\"141\" data-end=\"167\">Current events &#8211; AI and deepfakes &#8211; a growing danger<\/h4><p data-start=\"160\" data-end=\"724\">Deceptively real videos, images and voices can now be created in just a few minutes thanks to artificial intelligence. For cybercriminals, deepfakes have long been a tool to damage companies \u2013 whether through fraud, extortion or targeted manipulation. A recent analysis by Surfshark shows how serious the situation is: In the first quarter of 2025, there were already 19% more deepfake incidents than in the whole of 2024.  <\/p><p data-start=\"160\" data-end=\"724\">Our case study makes it clear how such attacks can work \u2013 and what you can do to be prepared.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a91556 e-flex e-con-boxed e-con e-parent\" data-id=\"4a91556\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c1881d0 e-con-full e-flex e-con e-child\" data-id=\"c1881d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6cad134 e-con-full e-flex e-con e-child\" data-id=\"6cad134\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4f8151 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b4f8151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png\" class=\"attachment-large size-large wp-image-26892\" alt=\"You sit at your laptop and receive a call from your superior. On the screen is the word deepfake. It is a cyberattack with AI\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-300x200.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-768x512.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-940521b elementor-widget elementor-widget-text-editor\" data-id=\"940521b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>A case from practice<\/h4>\n<p>An accounting employee receives a video call from his managing director. A situation that occurs very often in everyday work. Voice and face seem absolutely familiar.    <br><br>The &#8220;boss&#8221; emphatically explains that a Japanese business partner urgently expects a six-figure payment, which must be transferred today. An important deadline had been missed.   <br><br>Under time pressure and with the authority of the supposed superior, he asks the employee to carry out the transfer immediately and sends the account data at the same time.  <br><br>What the employee doesn&#8217;t know is that the call is a deceptively real deepfake that criminals use to specifically try to divert company funds to a fraudulent foreign account.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f2d18b e-flex e-con-boxed e-con e-parent\" data-id=\"8f2d18b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a58566c elementor-widget elementor-widget-text-editor\" data-id=\"a58566c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Find out in our case study how criminals create and use deepfakes to deceive employees. We will also show you how to unmask deepfakes \u2013 and what measures you can take to effectively protect yourself and your company. <\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Download the case study to learn:\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\"><li data-start=\"157\" data-end=\"230\"><p data-start=\"159\" data-end=\"230\">How do deepfakes arise and what technologies are behind them?<\/p><\/li><li data-start=\"231\" data-end=\"339\"><p data-start=\"233\" data-end=\"339\">How do cybercriminals use deepfakes to deceive companies and employees?<\/p><\/li><li data-start=\"340\" data-end=\"440\"><p data-start=\"342\" data-end=\"440\">What tips do our experts give so that companies can reliably detect deepfakes?<\/p><\/li><li data-start=\"441\" data-end=\"532\"><p data-start=\"443\" data-end=\"532\">What measures are necessary to effectively protect against such attacks?<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Begin Brevo Form -->\r\n<!-- START - We recommend to place the below code in head tag of your website html  -->\r\n<style>\r\n  @font-face {\r\n    font-display: block;\r\n    font-family: Roboto;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/7529907e9eaf8ebb5220c5f9850e3811.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/25c678feafdc175a70922a116c9be3e7.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 600;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/6e9caeeafb1f3491be3e32744bc30440.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/71501f0d8d5aa95960f6475d5487d4c2.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 700;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/3ef7cf158f310cf752d5ad08cd0e7e60.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/ece3a1d82f18b60bcce0211725c476aa.woff) format(\"woff\")\r\n  }\r\n\r\n  #sib-container input:-ms-input-placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container input::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container textarea::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #a8aab8;\r\n  }\r\n\r\n  #sib-container a {\r\n    text-decoration: underline;\r\n    color: #2BB2FC;\r\n  }\r\n<\/style>\r\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\r\n<link rel=\"stylesheet\" href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins&amp;&amp;display=swap\">\r\n<!--  END - We recommend to place the above code in head tag of your website html -->\r\n\r\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\r\n<div class=\"sib-form\" style=\"text-align: center; background-color: #041e42;  \">\r\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\r\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\"\/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n  Your login could not be saved. Please try again. \r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#13ce66;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\"\/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n  We have received your request. Please check your email inbox and verify your email address to receive the guide. \r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:540px; border-radius:15px; border-width:0px; border-color:#a8aab8; border-style:solid; direction:ltr\">\r\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAHjCVt9CiJQTo7xPQpAWD30JsOz2gPaqhT3U4xx0u8WTL6IfuD7TUvNV9sAVCQ9zvyRwAJYHUxeZfGXg7Ib8d4yA8MAm5XTz_ixBxnaMJHm23LHpYZ7g2KmaCXbl3mLAq5Q7lWMiXntxBoXwFIA2GApQIivq0ZRp4qTpNWXpFpmvTO0WACVlYTac_iQowEf9RllsANM9kkjf\" data-type=\"subscription\">\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"font-size:32px; text-align:left; font-weight:700; font-family:Poppins, webFonts; color:#041e42; background-color:transparent; text-align:left\">\r\n            <p>Download case study<\/p>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"font-size:16px; text-align:left; font-family:Poppins, webFonts; color:#041e42; background-color:transparent; text-align:left\">\r\n            <div class=\"sib-text-form-block\">\r\n              <p>Simply enter your e-mail address and you will receive the case study by e-mail.<\/p>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 700; text-align:left; font-size:16px; text-align:left; font-weight:700; font-family:Helvetica, sans-serif; color:#041e42;\" for=\"EMAIL\" data-required=\"*\">E-mail address<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" placeholder=\"Please enter  \" data-required=\"true\" required=\"\">\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-optin sib-form-block\" data-required=\"true\">\r\n            <div class=\"form__entry entry_mcq\">\r\n              <div class=\"form__label-row \">\r\n                <div class=\"entry__choice\" style=\"\">\r\n                  <label>\r\n                    <input type=\"checkbox\" class=\"input_replaced\" value=\"1\" id=\"OPT_IN\" name=\"OPT_IN\" required=\"\">\r\n                    <span class=\"checkbox checkbox_tick_positive\" style=\"margin-left:\"><\/span><span style=\"font-size:12px; text-align:left; font-family:Poppins, webFonts; color:#3C4858; background-color:transparent;\"><p>Data protection is important to us. We use your information to contact you about relevant content and services. You can unsubscribe from any communication at any time. More information www.perseus.de\/datenschutzerklaerung\/.   <\/p><span data-required=\"*\" style=\"display: inline;\" class=\"entry__label entry__label_optin\"><\/span><\/span> <\/label>\r\n                <\/div>\r\n              <\/div>\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n              <label class=\"entry__specification\" style=\"font-size:12px; text-align:left; font-family:Helvetica, sans-serif; color:#a8aab8; text-align:left\">\r\n  You can unsubscribe from the newsletter at any time via the link in our newsletter.\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-captcha sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <script>\r\n                  function handleCaptchaResponse() {\r\n                    var event = new Event('captchaChange');\r\n                    document.getElementById('sib-captcha').dispatchEvent(event);\r\n                  }\r\n                <\/script>\r\n                <div class=\"g-recaptcha sib-visible-recaptcha\" id=\"sib-captcha\" data-sitekey=\"6Lc3MhopAAAAAAwNvz5u5sHSIiH0DmaVt2IPBWkg\" data-callback=\"handleCaptchaResponse\" style=\"direction:ltr\"><\/div>\r\n              <\/div>\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"text-align: center\">\r\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" style=\"font-size:16px; text-align:center; font-weight:700; font-family:Helvetica, sans-serif; color:#FFFFFF; background-color:#041e42; border-radius:15px; border-width:0px;\" form=\"sib-form\" type=\"submit\">\r\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewbox=\"0 0 512 512\" style=\"\">\r\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\"\/>\r\n              <\/svg>\r\n  SUBMIT\r\n            <\/button>\r\n          <\/div>\r\n        <\/div>\r\n\r\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\r\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\r\n      <\/form>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n<!-- END - We recommend to place the above code where you want the form in your website html  -->\r\n\r\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\r\n<script>\r\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'W\u00e4hle bitte einen L\u00e4ndervorwahl aus.';\r\n  window.LOCALE = 'de';\r\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"Die eingegebenen Informationen sind nicht g\u00fcltig. Bitte \u00fcberpr\u00fcfen Sie das Feld und versuchen Sie es erneut.\";\r\n\r\n  window.REQUIRED_ERROR_MESSAGE = \"Dieses Feld darf nicht leer sein. \";\r\n\r\n  window.GENERIC_INVALID_MESSAGE = \"Die eingegebenen Informationen sind nicht g\u00fcltig. Bitte \u00fcberpr\u00fcfen Sie das Feld und versuchen Sie es erneut.\";\r\n\r\n\r\n\r\n\r\n  window.translation = {\r\n    common: {\r\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\r\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt',\r\n      selectedOption: '{quantity} ausgew\u00e4hlt',\r\n      selectedOptions: '{quantity} ausgew\u00e4hlt',\r\n    }\r\n  };\r\n\r\n  var AUTOHIDE = Boolean(0);\r\n<\/script>\r\n\r\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\r\n\r\n<script src=\"https:\/\/www.google.com\/recaptcha\/api.js?hl=de\"><\/script>\r\n\r\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\r\n<!-- End Brevo Form -->\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence opens up new, fascinating possibilities \u2013 unfortunately also for cybercriminals. They are increasingly using so-called deepfakes: AI-generated fakes of videos, images or voices that are used in the work environment for deceptively real attacks. <\/p>\n","protected":false},"author":3,"featured_media":26892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-26893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In focus: Deepfake attacks by AI<\/title>\n<meta name=\"description\" content=\"The case study shows how attackers use deepfakes for AI-based attacks \u2013 and what protective measures companies should take.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In focus: Deepfake attacks by AI\" \/>\n<meta property=\"og:description\" content=\"The case study shows how attackers use deepfakes for AI-based attacks \u2013 and what protective measures companies should take.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-02T10:45:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T09:46:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"In Focus: Artificial Intelligence as an Attack Vector, Example: Deepfakes\",\"datePublished\":\"2025-09-02T10:45:34+00:00\",\"dateModified\":\"2026-03-30T09:46:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/\"},\"wordCount\":444,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"articleSection\":[\"Case Studies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/\",\"name\":\"In focus: Deepfake attacks by AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"datePublished\":\"2025-09-02T10:45:34+00:00\",\"dateModified\":\"2026-03-30T09:46:14+00:00\",\"description\":\"The case study shows how attackers use deepfakes for AI-based attacks \u2013 and what protective measures companies should take.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png\",\"width\":1536,\"height\":1024,\"caption\":\"You sit at your laptop and receive a call from your superior. On the screen is the word deepfake. It is a cyberattack with AI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In Focus: Artificial Intelligence as an Attack Vector, Example: Deepfakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In focus: Deepfake attacks by AI","description":"The case study shows how attackers use deepfakes for AI-based attacks \u2013 and what protective measures companies should take.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/","og_locale":"en_US","og_type":"article","og_title":"In focus: Deepfake attacks by AI","og_description":"The case study shows how attackers use deepfakes for AI-based attacks \u2013 and what protective measures companies should take.","og_url":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/","og_site_name":"Perseus Technologies","article_published_time":"2025-09-02T10:45:34+00:00","article_modified_time":"2026-03-30T09:46:14+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM-1024x683.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"In Focus: Artificial Intelligence as an Attack Vector, Example: Deepfakes","datePublished":"2025-09-02T10:45:34+00:00","dateModified":"2026-03-30T09:46:14+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/"},"wordCount":444,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","articleSection":["Case Studies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/","url":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/","name":"In focus: Deepfake attacks by AI","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","datePublished":"2025-09-02T10:45:34+00:00","dateModified":"2026-03-30T09:46:14+00:00","description":"The case study shows how attackers use deepfakes for AI-based attacks \u2013 and what protective measures companies should take.","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/09\/ChatGPT-Image-Aug-27-2025-03_13_25-PM.png","width":1536,"height":1024,"caption":"You sit at your laptop and receive a call from your superior. On the screen is the word deepfake. It is a cyberattack with AI"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/in-focus-artificial-intelligence-as-an-attack-vector-example-deepfakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"In Focus: Artificial Intelligence as an Attack Vector, Example: Deepfakes"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26893"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26893\/revisions"}],"predecessor-version":[{"id":26894,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26893\/revisions\/26894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/26892"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}