Risky Bulletin cover image

Between Two Nerds: How threat actors are using AI to run wild

Risky Bulletin

00:00

AI in Cyber Extortion Tactics

This chapter explores how cyber threat actors are using AI tools to refine their extortion strategies, focusing on improved efficiency and effectiveness. It examines the role of large language models in assessing the value of sensitive information and generating personalized ransom notes, tailored to specific victims. The discussion highlights the innovative tactics employed by these criminals and the challenges they face in managing extortion operations.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app