Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

How AI is Transforming Phishing and Cybersecurity Threats

N-able
05/11/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Generative AI has eliminated traditional phishing detection methods by producing grammatically perfect, contextually appropriate emails that are nearly indistinguishable from legitimate communications, while dramatically increasing attack volume through automation.
  • Deepfake audio and video technology poses national security risks beyond individual fraud, with foreign adversaries already using fake personas to infiltrate defense contractors and government agencies through fraudulent job interviews and social engineering.
  • Multi-factor authentication is vulnerable to adversary-in-the-middle attacks, MFA fatigue bombardment, and session token interception, with 54% of SMBs still not implementing any form of MFA despite it blocking 99.9% of automated attacks.
  • Defense-in-depth strategies combining device trust verification, conditional access policies, security awareness training, and managed detection and response services are essential for SMBs, as no single security control provides complete protection.
  • The fundamental security challenge remains unchanged: attackers only need to succeed once while defenders must be correct every time, making layered defenses and continuous vigilance the only viable approach in an AI-accelerated threat landscape.

AI-Powered Phishing Evolution

The conversation opens with a stark comparison between traditional phishing attempts like the Nigerian Prince scam and today's AI-generated attacks. Nicole Reineke and Will Ledesma explain how generative AI has eliminated the telltale signs that users once relied on to detect phishing emails—poor grammar, awkward phrasing, and obvious foreign language patterns. Attackers now use large language models to craft professional, contextually appropriate messages that are nearly indistinguishable from legitimate communications. The discussion includes real-world examples of CEO impersonation attacks via text message, where attackers exploit trust relationships and request gift card purchases or wire transfers. The experts emphasize that AI hasn't necessarily made attacks more effective per attempt, but has made them exponentially more prolific—what once took weeks to execute can now happen in seconds, dramatically increasing the odds of success through sheer volume.

Deepfakes and National Security Implications

The conversation shifts to the emerging threat of deepfake audio and video technology, which Ledesma describes as having profound implications beyond individual fraud. He draws parallels to the 1938 War of the Worlds radio broadcast that caused mass panic, warning that deepfaked presidential or executive communications could trigger similar societal disruption. The discussion reveals that foreign adversaries are already using deepfake technology to create fake personas on LinkedIn and conduct fraudulent job interviews to infiltrate defense contractors and government agencies. Reineke shares her experience creating AI personas for user research, demonstrating how easily sophisticated fake identities can be constructed using readily available tools like custom GPTs and generative video platforms. The experts note that while some detection techniques exist, the speed at which deepfakes can be created and distributed means real-time verification becomes nearly impossible, particularly in broadcast scenarios.

Multi-Factor Authentication Vulnerabilities

A significant portion of the discussion focuses on the limitations and vulnerabilities of multi-factor authentication (MFA), which many organizations consider a silver bullet for security. Ledesma explains adversary-in-the-middle attacks where attackers intercept session tokens during the authentication process, effectively bypassing MFA protections. He describes MFA fatigue attacks where users are bombarded with authentication requests until they approve one out of frustration. The conversation includes a detailed example of an attacker who gained access to a financial system and then intercepted 2FA codes sent via email, allowing them to authorize fraudulent wire transfers. The experts emphasize that while Microsoft claims 99.9% of automated attacks fail with MFA in place, the statistic requires context—and that 54% of SMBs still don't use any form of MFA at all. They advocate for hardware tokens, security keys, and conditional access policies that verify device trust as additional layers beyond basic MFA.

Defense-in-Depth for SMBs

The final segment addresses practical security strategies for small and medium-sized businesses, which the Verizon DBIR report identifies as increasingly targeted by AI-powered attacks. Ledesma emphasizes that no single security control will ever provide 100% protection, and that organizations must implement multiple overlapping layers of defense. He explains the importance of device trust and conditional access policies that verify not just user credentials but also whether the authentication attempt is coming from a known, managed device. The discussion covers traditional controls like geofencing (which attackers can bypass with VPNs but still adds friction) and the critical need for security awareness training. Both experts stress that security is a team effort requiring collaboration between IT administrators, security operations centers, managed detection and response providers, and end users. The conversation concludes with Ledesma's philosophy that defenders must be right every time while attackers only need to be right once—making resilience through layered defenses the only viable strategy.

Chapters

0:00 - Introduction and Guest Backgrounds
1:15 - AI-Powered Phishing Evolution
5:00 - Trust Exploitation and CEO Impersonation
10:00 - Email Spoofing Techniques
20:00 - Phishing Detection Challenges
23:00 - Deepfake Audio and Video Threats
28:00 - AI Persona Creation and Infiltration
38:00 - MFA Vulnerabilities and Bypass Techniques
42:00 - Defense-in-Depth Strategies for SMBs
46:00 - Security Philosophy and Closing Thoughts

Key Quotes

1:59 "When I look at phishing and how generative AI is helping that, the tactics and the key things that individuals used to look at are going to the wayside."
3:52 "An attacker can go to a chappy and just be like, hey, by the way, I want to send this email, make it sound professional, make it sound like if I'm talking with the person, like if I know the person. And it's going to come across very scripted to where it's making it very hard to actually figure out if it's coming from a bad guy or not."
9:56 "Attackers are always looking for ways to exploit trust. They're hooking into these platforms that people trust are safe. They're trusting that the companies are doing their due diligence."
24:39 "What happens if a deepfake gets out to where it's potentially a president, a vice-president, a Senator saying some really impactful items. What can that mean? As a security individual, it's a real threat."
40:52 "AI isn't necessarily making them more effective, but it's certainly making them more prolific. Instead of it taking a week or two weeks to make a million outreaches, it's taking minutes, if not seconds, to do that same level of activity."
46:56 "An attacker can be wrong a thousand times and be wrong a thousand times, but when they get that thousand and one and that thousand and one is right, then what? We need those defense and depth layers."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Email Security
  • Identity & Access
  • AI & Machine Learning
  • Security Operations
  • Technical Deep Dive
  • Best Practices
  • AI-powered phishing
  • Generative AI in cybersecurity
  • Deepfake technology
  • Multi-factor authentication
  • Social engineering
  • SMB security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: How AI is Transforming Phishing and Cybersecurity Threats

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights
                https://www.truthinit.com/index.php/channel/1895/transforming-perceptions-of-ai-risks-and-threats-through-data-lineage-insights/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Data Lineage: Revealing AI Risks and Hidden Threats
                https://www.truthinit.com/index.php/channel/1894/transforming-data-lineage-revealing-ai-risks-and-hidden-threats/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transitioning from Illusion to Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Perceptions of AI Risks and Threats through Data Lineage Insights

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Data Lineage: Revealing AI Risks and Hidden Threats

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version