Settings
Language
Color Theme
What are AI scams?
AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Which of the following BEST describes an AI scam?
AI scams use artificial intelligence to generate realistic voices, videos, and emails that trick people into believing they’re real.
View Options Again
Dropping a USB outside an office that contains malware
Using automation to send generic email spam
Using AI to have a realistic email conversation that misleads people
Manually leaving fake reviews on a website
What is the primary goal of AI-powered scams?
AI scams aim to deceive victims by impersonating trusted individuals or organizations, ultimately tricking them into sharing sensitive information or handing over money.
View Options Again
To demonstrate the capabilities of AI
To train AI models using public data
To manipulate victims into handing over money or sensitive information
To automate customer service in businesses
Abusing AI Technologies
AI is boosting productivity but also powering more convincing scams. From cloned voices to deepfake videos and hyper-realistic phishing emails, these attacks feel personal and authentic, blurring the line between real and fake. Let’s explore how some AI technologies are being abused.
Voice Cloning
Deepfake Videos
AI-Enhanced Phishing Emails
AI can clone someone’s voice using just a short audio clip from social media, voicemails, or videos. With enough data, it can mimic tone, pitch, and style so closely that the fake voice sounds almost identical to the real person.
AI-generated deepfake videos make it look like someone said or did something they never did. Scammers use them to impersonate executives or public figures, tricking people into acting or believing false information.
AI-powered phishing emails are polished, well-written, and often tailored using information scraped from the internet. They can convincingly mimic communications from colleagues, banks, or service providers, making them far harder to spot than the typo-filled scams of the past.
Scammers often use voice cloning to:
Scammers use voice cloning to create convincing audio that mimics someone you trust, like a family member or colleague. By making urgent, emotional calls in that familiar voice, they can pressure you into acting quickly.
View Options Again
Host online podcasts without consent
Steal passwords from voicemail inboxes
Make urgent calls that sound like someone you know
Transcribe phone conversations into text
Where do attackers often source audio for voice cloning scams?
Attackers don’t need much. Even a short clip from a podcast or YouTube video is enough for attackers to train AI and mimic someone’s voice.
View Options Again
Publicly available audio from the internet
Encrypted messaging apps
Private phone calls
Government databases
Which of the following is NOT a likely use of deepfake videos in a scam?
AI-generated CGI is common in entertainment, but it isn’t typically used for scams. The other options involve tricking people into taking harmful actions or believing false information.
View Options Again
Pretending to be IT support in a video conference
Replacing real actors in movies with CGI
Faking a CEO video call to approve a wire transfer
Impersonating a politician to spread disinformation
Is the following statement True or False:
Scammers can use AI to create phishing emails that look like they’re from your bank or a colleague.
AI can generate highly realistic emails that mimic the tone, style, and formatting of legitimate messages. By scraping information from social media or the web, scammers can personalize these emails to appear as if they’re from trusted sources like your bank or a colleague.
View Options Again
True
False
How To Stay Protected
Scammers exploit urgency and trust. If something feels unusual, stop and confirm it through a trusted channel. Limit how much personal voice, video, and other data you share online to make AI scams harder to pull off.
Why is it important to limit what you share online?
The more personal content you post, especially voice recordings, videos, or photos, the more material scammers have to train AI tools to impersonate you. Limiting what you share makes it harder for criminals to create convincing voice clones, deepfakes, or other AI-powered scams.
View Options Again
More sharing equals more followers
It makes you easier to find
Sharing too much could get your account blocked
It reduces the risk of AI impersonation
Wrapping Up
AI scams are getting more complex and harder to spot, particularly as voice cloning, deepfake, and real-time conversational AI technologies continue to improve. By knowing how to identify red flags, limiting what you share, and verifying unexpected requests, you can protect yourself and your organization!
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
AI-Scams
[89, "AI-Scams", "AI-Scams"],
What are AI scams?
[90, "What are AI scams? ", "What are AI scams? "],
AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
[91, "AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams. ", "AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams. "],
Which of the following BEST describes an AI scam?
[92, "Which of the following BEST describes an AI scam? ", "Which of the following BEST describes an AI scam? "],
Using automation to send generic email spam
[93, "Using automation to send generic email spam", "Using automation to send generic email spam"],
Using AI to have a realistic email conversation that misleads people
[94, "Using AI to have a realistic email conversation that misleads people", "Using AI to have a realistic email conversation that misleads people"],
Dropping a USB outside an office that contains malware
[95, "Dropping a USB outside an office that contains malware", "Dropping a USB outside an office that contains malware"],
Manually leaving fake reviews on a website
[96, "Manually leaving fake reviews on a website", "Manually leaving fake reviews on a website"],
AI scams use artificial intelligence to generate realistic voices, videos, and emails that trick people into believing they’re real.
[97, "AI scams use artificial intelligence to generate realistic voices, videos, and emails that trick people into believing they’re real. ", "AI scams use artificial intelligence to generate realistic voices, videos, and emails that trick people into believing they’re real. "],
What is the primary goal of AI-powered scams?
[98, "What is the primary goal of AI-powered scams? ", "What is the primary goal of AI-powered scams? "],
To demonstrate the capabilities of AI
[99, "To demonstrate the capabilities of AI ", "To demonstrate the capabilities of AI "],
To train AI models using public data
[100, "To train AI models using public data ", "To train AI models using public data "],
To manipulate victims into handing over money or sensitive information
[101, "To manipulate victims into handing over money or sensitive information ", "To manipulate victims into handing over money or sensitive information "],
To automate customer service in businesses
[102, "To automate customer service in businesses", "To automate customer service in businesses"],
AI scams aim to deceive victims by impersonating trusted individuals or organizations, ultimately tricking them into sharing sensitive information or handing over money.
[103, "AI scams aim to deceive victims by impersonating trusted individuals or organizations, ultimately tricking them into sharing sensitive information or handing over money. ", "AI scams aim to deceive victims by impersonating trusted individuals or organizations, ultimately tricking them into sharing sensitive information or handing over money. "],
Abusing AI Technologies
[104, "Abusing AI Technologies ", "Abusing AI Technologies "],
AI is boosting productivity but also powering more convincing scams. From cloned voices to deepfake videos and hyper-realistic phishing emails, these attacks feel personal and authentic, blurring the line between real and fake. Let’s explore how some AI technologies are being abused.
[105, "AI is boosting productivity but also powering more convincing scams. From cloned voices to deepfake videos and hyper-realistic phishing emails, these attacks feel personal and authentic, blurring the line between real and fake. Let’s explore how some AI technologies are being abused.", "AI is boosting productivity but also powering more convincing scams. From cloned voices to deepfake videos and hyper-realistic phishing emails, these attacks feel personal and authentic, blurring the line between real and fake. Let’s explore how some AI technologies are being abused."],
Voice Cloning
[106, "Voice Cloning ", "Voice Cloning "],
AI can clone someone’s voice using just a short audio clip from social media, voicemails, or videos. With enough data, it can mimic tone, pitch, and style so closely that the fake voice sounds almost identical to the real person.
[107, "AI can clone someone’s voice using just a short audio clip from social media, voicemails, or videos. With enough data, it can mimic tone, pitch, and style so closely that the fake voice sounds almost identical to the real person. ", "AI can clone someone’s voice using just a short audio clip from social media, voicemails, or videos. With enough data, it can mimic tone, pitch, and style so closely that the fake voice sounds almost identical to the real person. "],
Deepfake Videos
[108, "Deepfake Videos ", "Deepfake Videos "],
AI-generated deepfake videos make it look like someone said or did something they never did. Scammers use them to impersonate executives or public figures, tricking people into acting or believing false information.
[109, "AI-generated deepfake videos make it look like someone said or did something they never did. Scammers use them to impersonate executives or public figures, tricking people into acting or believing false information.", "AI-generated deepfake videos make it look like someone said or did something they never did. Scammers use them to impersonate executives or public figures, tricking people into acting or believing false information."],
AI-Enhanced Phishing Emails
[110, "AI-Enhanced Phishing Emails ", "AI-Enhanced Phishing Emails "],
AI-powered phishing emails are polished, well-written, and often tailored using information scraped from the internet. They can convincingly mimic communications from colleagues, banks, or service providers, making them far harder to spot than the typo-filled scams of the past.
[111, "AI-powered phishing emails are polished, well-written, and often tailored using information scraped from the internet. They can convincingly mimic communications from colleagues, banks, or service providers, making them far harder to spot than the typo-filled scams of the past. ", "AI-powered phishing emails are polished, well-written, and often tailored using information scraped from the internet. They can convincingly mimic communications from colleagues, banks, or service providers, making them far harder to spot than the typo-filled scams of the past. "],
Scammers often use voice cloning to:
[112, "Scammers often use voice cloning to: ", "Scammers often use voice cloning to: "],
Host online podcasts without consent
[113, "Host online podcasts without consent ", "Host online podcasts without consent "],
Steal passwords from voicemail inboxes
[114, "Steal passwords from voicemail inboxes", "Steal passwords from voicemail inboxes"],
Transcribe phone conversations into text
[115, "Transcribe phone conversations into text ", "Transcribe phone conversations into text "],
Make urgent calls that sound like someone you know
[116, "Make urgent calls that sound like someone you know", "Make urgent calls that sound like someone you know"],
Scammers use voice cloning to create convincing audio that mimics someone you trust, like a family member or colleague. By making urgent, emotional calls in that familiar voice, they can pressure you into acting quickly.
[117, "Scammers use voice cloning to create convincing audio that mimics someone you trust, like a family member or colleague. By making urgent, emotional calls in that familiar voice, they can pressure you into acting quickly.", "Scammers use voice cloning to create convincing audio that mimics someone you trust, like a family member or colleague. By making urgent, emotional calls in that familiar voice, they can pressure you into acting quickly."],
Where do attackers often source audio for voice cloning scams?
[118, "Where do attackers often source audio for voice cloning scams? ", "Where do attackers often source audio for voice cloning scams? "],
Encrypted messaging apps
[119, "Encrypted messaging apps", "Encrypted messaging apps"],
Publicly available audio from the internet
[120, "Publicly available audio from the internet", "Publicly available audio from the internet"],
Private phone calls
[121, "Private phone calls ", "Private phone calls "],
Government databases
[122, "Government databases", "Government databases"],
Attackers don’t need much. Even a short clip from a podcast or YouTube video is enough for attackers to train AI and mimic someone’s voice.
[123, "Attackers don’t need much. Even a short clip from a podcast or YouTube video is enough for attackers to train AI and mimic someone’s voice.", "Attackers don’t need much. Even a short clip from a podcast or YouTube video is enough for attackers to train AI and mimic someone’s voice."],
Which of the following is NOT a likely use of deepfake videos in a scam?
[124, "Which of the following is NOT a likely use of deepfake videos in a scam? ", "Which of the following is NOT a likely use of deepfake videos in a scam? "],
Faking a CEO video call to approve a wire transfer
[125, "Faking a CEO video call to approve a wire transfer", "Faking a CEO video call to approve a wire transfer"],
Replacing real actors in movies with CGI
[126, "Replacing real actors in movies with CGI", "Replacing real actors in movies with CGI"],
Impersonating a politician to spread disinformation
[127, "Impersonating a politician to spread disinformation ", "Impersonating a politician to spread disinformation "],
Pretending to be IT support in a video conference
[128, "Pretending to be IT support in a video conference", "Pretending to be IT support in a video conference"],
AI-generated CGI is common in entertainment, but it isn’t typically used for scams. The other options involve tricking people into taking harmful actions or believing false information.
[129, "AI-generated CGI is common in entertainment, but it isn’t typically used for scams. The other options involve tricking people into taking harmful actions or believing false information.", "AI-generated CGI is common in entertainment, but it isn’t typically used for scams. The other options involve tricking people into taking harmful actions or believing false information."],
Scammers can use AI to create phishing emails that look like they’re from your bank or a colleague.
[130, "Scammers can use AI to create phishing emails that look like they’re from your bank or a colleague.", "Scammers can use AI to create phishing emails that look like they’re from your bank or a colleague."],
AI can generate highly realistic emails that mimic the tone, style, and formatting of legitimate messages. By scraping information from social media or the web, scammers can personalize these emails to appear as if they’re from trusted sources like your bank or a colleague.
[131, "AI can generate highly realistic emails that mimic the tone, style, and formatting of legitimate messages. By scraping information from social media or the web, scammers can personalize these emails to appear as if they’re from trusted sources like your bank or a colleague.", "AI can generate highly realistic emails that mimic the tone, style, and formatting of legitimate messages. By scraping information from social media or the web, scammers can personalize these emails to appear as if they’re from trusted sources like your bank or a colleague."],
How To Stay Protected
[132, "How To Stay Protected ", "How To Stay Protected "],
Scammers exploit urgency and trust. If something feels unusual, stop and confirm it through a trusted channel. Limit how much personal voice, video, and other data you share online to make AI scams harder to pull off.
[133, "Scammers exploit urgency and trust. If something feels unusual, stop and confirm it through a trusted channel. Limit how much personal voice, video, and other data you share online to make AI scams harder to pull off. ", "Scammers exploit urgency and trust. If something feels unusual, stop and confirm it through a trusted channel. Limit how much personal voice, video, and other data you share online to make AI scams harder to pull off. "],
Why is it important to limit what you share online?
[134, "Why is it important to limit what you share online?", "Why is it important to limit what you share online?"],
It reduces the risk of AI impersonation
[135, "It reduces the risk of AI impersonation ", "It reduces the risk of AI impersonation "],
Sharing too much could get your account blocked
[136, "Sharing too much could get your account blocked ", "Sharing too much could get your account blocked "],
It makes you easier to find
[137, "It makes you easier to find ", "It makes you easier to find "],
More sharing equals more followers
[138, "More sharing equals more followers", "More sharing equals more followers"],
The more personal content you post, especially voice recordings, videos, or photos, the more material scammers have to train AI tools to impersonate you. Limiting what you share makes it harder for criminals to create convincing voice clones, deepfakes, or other AI-powered scams.
[139, "The more personal content you post, especially voice recordings, videos, or photos, the more material scammers have to train AI tools to impersonate you. Limiting what you share makes it harder for criminals to create convincing voice clones, deepfakes, or other AI-powered scams.", "The more personal content you post, especially voice recordings, videos, or photos, the more material scammers have to train AI tools to impersonate you. Limiting what you share makes it harder for criminals to create convincing voice clones, deepfakes, or other AI-powered scams."],
Wrapping Up
[140, "Wrapping Up ", "Wrapping Up "],
AI scams are getting more complex and harder to spot, particularly as voice cloning, deepfake, and real-time conversational AI technologies continue to improve. By knowing how to identify red flags, limiting what you share, and verifying unexpected requests, you can protect yourself and your organization!
[141, "AI scams are getting more complex and harder to spot, particularly as voice cloning, deepfake, and real-time conversational AI technologies continue to improve. By knowing how to identify red flags, limiting what you share, and verifying unexpected requests, you can protect yourself and your organization! ", "AI scams are getting more complex and harder to spot, particularly as voice cloning, deepfake, and real-time conversational AI technologies continue to improve. By knowing how to identify red flags, limiting what you share, and verifying unexpected requests, you can protect yourself and your organization! "],
[142, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.