
Between Two Nerds: How threat actors are using AI to run wild
Risky Bulletin
00:00
AI in Cyber Extortion Tactics
This chapter explores how cyber threat actors are using AI tools to refine their extortion strategies, focusing on improved efficiency and effectiveness. It examines the role of large language models in assessing the value of sensitive information and generating personalized ransom notes, tailored to specific victims. The discussion highlights the innovative tactics employed by these criminals and the challenges they face in managing extortion operations.
Transcript
Play full episode