
Sign up to save your podcasts
Or


🛡️ Threat actors aren’t just using AI to write better phishing emails—they’re using it live, inside victim networks, to adapt in real time. In this episode, we explore how threat actors are weaponizing AI to accelerate attacks, automate reconnaissance, and dynamically adjust their tactics once inside a target environment.Â
🔊 Our experts examine real-world examples and emerging risks, including:Â
↪︎ AI-driven reconnaissance;Â
↪︎ Live LLM querying during attacks;Â
↪︎ AI-assisted ransomware that can guide attackers on what to encrypt, exfiltrate, or destroy;Â
↪︎ Obfuscation through “benign-looking” prompts that mask malicious intent;Â
↪︎ Emerging attribution challenges related to AI;Â
↪︎ The tradeoff between usability and security, and how AI adoption may unintentionally create new exposure.Â
As AI becomes increasingly embedded into enterprise workflows, attackers are learning to exploit that same power and flexibility. Understanding this evolution is critical to future-proofing defense strategies in an era where speed, adaptability, and automation define both sides of the battlefield.Â
Host Dan Berte welcomes Bitdefender VP of Threat Research Dragos Gavrilut, Bitdefender Senior Manager of Detection & Response Cristina Vatamanu, and Bitdefender Security Researcher Radu Tudorica as they explore this critical topic.Â
Bitdefender CYBERCRIME: From the Frontline. Hit subscribe and turn on notifications so you don’t miss an episode! Â
#Cybersecurity #CISO #CIOÂ
By Bitdefender🛡️ Threat actors aren’t just using AI to write better phishing emails—they’re using it live, inside victim networks, to adapt in real time. In this episode, we explore how threat actors are weaponizing AI to accelerate attacks, automate reconnaissance, and dynamically adjust their tactics once inside a target environment.Â
🔊 Our experts examine real-world examples and emerging risks, including:Â
↪︎ AI-driven reconnaissance;Â
↪︎ Live LLM querying during attacks;Â
↪︎ AI-assisted ransomware that can guide attackers on what to encrypt, exfiltrate, or destroy;Â
↪︎ Obfuscation through “benign-looking” prompts that mask malicious intent;Â
↪︎ Emerging attribution challenges related to AI;Â
↪︎ The tradeoff between usability and security, and how AI adoption may unintentionally create new exposure.Â
As AI becomes increasingly embedded into enterprise workflows, attackers are learning to exploit that same power and flexibility. Understanding this evolution is critical to future-proofing defense strategies in an era where speed, adaptability, and automation define both sides of the battlefield.Â
Host Dan Berte welcomes Bitdefender VP of Threat Research Dragos Gavrilut, Bitdefender Senior Manager of Detection & Response Cristina Vatamanu, and Bitdefender Security Researcher Radu Tudorica as they explore this critical topic.Â
Bitdefender CYBERCRIME: From the Frontline. Hit subscribe and turn on notifications so you don’t miss an episode! Â
#Cybersecurity #CISO #CIOÂ