{"id":11220,"date":"2025-03-20T13:18:00","date_gmt":"2025-03-20T20:18:00","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11220"},"modified":"2025-03-21T08:57:15","modified_gmt":"2025-03-21T15:57:15","slug":"as-adversarial-genai-takes-off-threat-intel-must-modernize","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/","title":{"rendered":"As adversarial GenAI takes off, threat intel must modernize"},"content":{"rendered":"<h3 style=\"margin-bottom:20px;\">Authors: Krupa Srivatsan and Bart Lenaerts<\/h3>\n<p>How adversaries innovate with GenAI and the case for predictive intelligence<\/p>\n<h3>INTRO<\/h3>\n<p>Generative AI, particularly Large Language Models (LLM), is enforcing a transformation in cybersecurity. Adversaries are attracted to GenAI as it lowers entry barriers to create deceiving content. Actors do this to enhance the efficacy of their intrusion techniques like social engineering and detection evasion.<\/p>\n<p>This blog provides common examples of malicious GenAI usage like deepfakes, chatbot automation and code obfuscation. More importantly, it also makes a case for early warnings of threat activity and usage of predictive threat intelligence capable of disrupting actors before they execute their attacks.<\/p>\n<h3>Example 1: Deepfake scams using voice cloning<\/h3>\n<p>At the end of 2024, the FBI warned that criminals were using generative AI to commit fraud on a larger scale, making their schemes more believable. GenAI tools like voice cloning reduce the time and effort needed to deceive targets with trustworthy audio messages. Voice cloning tools can even correct human errors like foreign accents or vocabulary that might otherwise signal fraud. While creating synthetic content isn&#8217;t illegal, it can facilitate crimes like fraud and extortion. Criminals use AI-generated text, images, audio, and videos to enhance social engineering, phishing, and financial fraud schemes. <\/p>\n<p>Especially worrying is the easy access cybercriminals have to these tools and the lack of security safeguards. A recent Consumer Reports investigation<sup>2<\/sup> on six leading publicly available AI voice cloning tools discovered that five have bypassable safeguards, making it easy to clone a person\u2019s voice even without their consent.<\/p>\n<p>Voice cloning technology works by taking an audio sample of a person speaking and then extrapolating that person\u2019s voice into a synthetic audio file. However, without safeguards in place, anyone who registers an account can simply upload audio of an individual speaking, such as from a TikTok or YouTube video, and have the service imitate them.<\/p>\n<p>Voice cloning has been utilized by actors in various scenarios, including <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/no-elon-musk-was-not-in-the-us-presidential-debate\/\" target=\"_blank\">large-scale deep-fake videos<\/a> for cryptocurrency scams or the imitation of voices during individual phone calls. A recent example that garnered media attention is the so-called \u201cgrandparent\u201d scams<sup>3<\/sup>, where a family emergency scheme is used to persuade the victim to transfer funds.<\/p>\n<h3>Example 2: AI-powered chat boxes<\/h3>\n<p>Actors often pick their victims carefully by gathering insights on their interests and set them up for scams. Initial research is used to craft the smishing message and trigger the victim into a conversation with them. Personal notes like \u201cI read your last social post and wanted to become friends\u201d or \u201cCan we talk for a moment?\u201d are some examples our intel team discovered (step 1 in picture 2). While some of these messages may be extended with AI-modified pictures, what matters is that actors invite their victims to the next step, which is a conversation on Telegram or another actor controlled medium, far away from security controls (step 2 in picture 2).<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/as-actors-adopt-genai-threat-intel-needs-to-modernize-figure-2.png\" alt=\"Picture 2: Sample AI-driven conversation\" \/><\/p>\n<p class=\"image-caption\">Picture 2: Sample AI-driven conversation<\/p>\n<p>Once the victim is on the new medium, the actor uses several tactics to continue the conversation, such as invites to local golf tournaments, Instagram following or AI-generated images. These AI bot-driven conversations go on for weeks and include additional steps, like asking for a thumbs-up on YouTube or even a social media repost. At this moment, the actor is trying to assess their victims and see how they respond. Sooner or later, the actor will show some goodwill and create a fake account. Each time the victim reacts positively to the actor&#8217;s request, the amount of currency in the fake account will increase. Later, the actor may even request small amounts of investment money, with an ROI of more than 25 percent. When the victim asks to collect their gains (step 3 in picture 2), the actor requests access to the victim\u2019s crypto account and exploits all established trust. At this moment, the scamming comes to an end and the actor steals the crypto money in the account.<\/p>\n<p>While these conversations are time-intensive, they are rewarding for the scammer and can lead to ten-thousands of dollars in ill-gotten gains. By using AI-driven chat boxes, actors have found a productive way to automate the interactions and increase the efficiency of their efforts.<\/p>\n<p>InfoBlox Threat Intel tracks these scams to optimize threat intelligence production.<\/p>\n<p>Common characteristics found in malicious chat boxes include:<\/p>\n<ul class=\"list-spacing\">\n<li>AI grammar errors, such as an extra space after a period, referencing foreign languages<\/li>\n<li>Using vocabulary that includes fraud-related terms<\/li>\n<li>Forgetting details from past conversations<\/li>\n<li>Repeating messages mechanically due to poorly trained AI chatbots (also known as parroting)<\/li>\n<li>Making illogical requests, like asking if you want to withdraw your funds at irrational moments in the conversation<\/li>\n<li>Using false press releases posted on malicious sites<\/li>\n<li>Opening conversations with commonly used phrases to lure the victim<\/li>\n<li>Using specific cryptocurrency types used often in criminal communities<\/li>\n<\/ul>\n<p>The combinations of these fingerprints allow threat intel researchers to observe emerging campaigns, track back the actors and their malicious infrastructure.<\/p>\n<h3>Example 3: Code obfuscation and evasion<\/h3>\n<p>Threat actors are using GenAI not only for creating human readable content. Several news outlets explored how GenAI assists actors in obfuscating their malicious codes. Earlier this year <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hackers-image-malware-genai-evade\/\" target=\"_blank\"><strong>Infosecurity Magazine<\/strong><\/a><sup>3<\/sup> published details of how threat researchers at HP Wolf discovered social engineering campaigns spreading VIP Keylogger and 0bj3ctivityStealer malware, both of which involved malicious code being embedded in image files. With a goal to improve the efficiency of their campaign, actors are repurposing and stitching together existing malware via GenAI to evade detection.  This approach also assists them in gaining velocity in setting up threat campaigns and reducing the skills needed to construct infection chains. Industry threat research <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hackers-image-malware-genai-evade\/\" target=\"_blank\"><strong>HP Wolf estimates evasion increments of 11% for email threats<\/strong><\/a> while other security vendors like <a href=\"https:\/\/thehackernews.com\/2024\/12\/ai-could-generate-10000-malware.html\" target=\"_blank\"><strong>Palo Alto Networks  estimate<\/strong><\/a><sup>4<\/sup> that GenAI flipped their own malware classifier model&#8217;s verdicts 88% of the time into false negatives. Threat actors are clearly making progress in their AI driven evasion efforts.<\/p>\n<h3>Making the case for modernizing threat research<\/h3>\n<p>As AI driven attacks pose plenty of detection evasion challenges, defenders need to look beyond traditional tools like sandboxing or indicators derived from incident forensics to produce effective threat intelligence. One of these opportunities can be found by tracking pre-attack activities instead of sending the last suspicious payload to a slow sandbox.<\/p>\n<p>Just like your standard software development lifecycle, threat actors go through multiple stages before launching attacks. First, they develop or generate new variants for the malicious code using GenAI. Next, they set up the infrastructure like email delivery networks or hard to trace <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/\" target=\"_blank\"><strong>traffic distribution systems<\/strong><\/a>. Often this happens in combination with domain registrations or worse hijacking of existing domains.  <\/p>\n<p>Finally, the attacks go into \u201cproduction\u201d meaning the domains become weaponized, ready to deliver malicious payload. This is the stage where traditional security tools attempt to detect and stop threats because it involves easily accessible endpoints or networks egress points within the customer\u2019s environment. Because of evasion and deception by GenAI tools, this point of detection may not be effective as the actors continuously alter their payloads or mimic trustworthy sources.<\/p>\n<h3>Predictive Intelligence based on DNS Telemetry<\/h3>\n<p>At Infoblox, finding actors and their malicious infrastructure before they attack is at the core of our team\u2019s mission. Starting from a singular domain registration combined with worldwide DNS telemetry and decades of threat expertise, Infoblox Threat Intel leverages cutting-edge data science to identify even the stealthiest actors. Some of these &#8211; like Vextrio Viper &#8211; not only execute attacks but enable thousands of affiliates to deliver otherwise seemingly unrelated content to the most vulnerable victims.<\/p>\n<p>Infoblox threat researchers intercept actor activities at the early stages of the attack as new malicious infrastructure is configured. By using information like new domain registrations, DNS records and query resolutions, Infoblox leverages data that is NOT prone to GenAI alteration. Why? Because DNS Data is transparent to multiple stakeholders (Domain Owner, Registrar, Domain Server, Client, Destination) and needs to be 100% correct to make the connection work. Simply said, DNS protocol is an essential component of the internet that is hard to fool and ideal suited for research.<\/p>\n<p>DNS analytics has another advantage; domains and malicious DNS infrastructures are often configured in advance of a threat campaign or individual attack. As new threat intelligence is created based on these domain changes, our experts also monitor usage of discovered malicious domains by clients. This is done to track the quality of the produced intel. Results have been spectacular. In 2024, Infoblox Threat Intel achieved a \u201cProtection Before Engagement\u201d of 77.1%. Indeed, Infoblox Threat Intel was able to identify more than \u00be of all discovered malicious domains BEFORE any interaction to the domain happened. This metric not only demonstrates the quality of Infoblox Threat Intel, but it is also one of the only true predictive intelligence metrics in the industry. It is important to highlight that in 2024, the false positive rate remained at 0.0011%.<\/p>\n<h3>Conclusion<\/h3>\n<p>The evolving landscape of AI and the impact on security is significant. With the right approaches and strategies, such as predictive intelligence derived from DNS, organizations can truly get ahead of GenAI risks and ensure that they don\u2019t become patient zero.<\/p>\n<p>To learn more about Infoblox Threat Intelligence Research visit<br \/>\n<a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" target=\"_blank\"><strong>https:\/\/www.infoblox.com\/threat-intel\/<\/strong><\/a><\/p>\n<p>Request DNS Security Workshop<br \/>\n<a href=\"https:\/\/info.infoblox.com\/sec-ensecurityworkshop-20240901-registration.html\" target=\"_blank\"><strong>https:\/\/info.infoblox.com\/sec-ensecurityworkshop-20240901-registration.html<\/strong><\/a><\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.ic3.gov\/PSA\/2024\/PSA241203\" target=\"_blank\"><strong>https:\/\/www.ic3.gov\/PSA\/2024\/PSA241203<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/ai-voice-cloning-software-flimsy-guardrails-report-finds-rcna195131\" target=\"_blank\"><strong>https:\/\/www.nbcnews.com\/tech\/security\/ai-voice-cloning-software-flimsy-guardrails-report-finds-rcna195131<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.cbc.ca\/news\/marketplace\/marketplace-ai-voice-scam-1.7486437\" target=\"_blank\"><strong>https:\/\/www.cbc.ca\/news\/marketplace\/marketplace-ai-voice-scam-1.7486437<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hackers-image-malware-genai-evade\/\" target=\"_blank\"><strong>https:\/\/www.infosecurity-magazine.com\/news\/hackers-image-malware-genai-evade\/<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2024\/12\/ai-could-generate-10000-malware.html\" target=\"_blank\"><strong>https:\/\/thehackernews.com\/2024\/12\/ai-could-generate-10000-malware.html<\/strong><\/a><\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('As adversarial GenAI takes off, <span class=\"gradient\">threat intel must modernize<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Krupa Srivatsan and Bart Lenaerts How adversaries innovate with GenAI and the case for predictive intelligence INTRO Generative AI, particularly Large Language Models (LLM), is enforcing a transformation in cybersecurity. Adversaries are attracted to GenAI as it lowers entry barriers to create deceiving content. Actors do this to enhance the efficacy of their intrusion [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":9924,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254,2],"tags":[1182,1183,1184,1185,1186],"class_list":{"0":"post-11220","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"category-security","9":"tag-ai-in-cybersecurity","10":"tag-generative-ai-risks","11":"tag-preemptive-cyber-defense","12":"tag-ai-driven-threats","13":"tag-predictive-threat-intelligence","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence<\/title>\n<meta name=\"description\" content=\"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence\" \/>\n<meta property=\"og:description\" content=\"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-20T20:18:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T15:57:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence\" \/>\n<meta name=\"twitter:description\" content=\"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"As adversarial GenAI takes off, threat intel must modernize\",\"datePublished\":\"2025-03-20T20:18:00+00:00\",\"dateModified\":\"2025-03-21T15:57:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/\"},\"wordCount\":1577,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"keywords\":[\"AI in Cybersecurity\",\"Generative AI Risks\",\"Preemptive Cyber Defense\",\"AI-driven Threats\",\"Predictive Threat Intelligence\"],\"articleSection\":[\"Infoblox Threat Intel\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/\",\"name\":\"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"datePublished\":\"2025-03-20T20:18:00+00:00\",\"dateModified\":\"2025-03-21T15:57:15+00:00\",\"description\":\"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/introducing-dns-threat-actors-thumbnail.jpg\",\"width\":612,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/as-adversarial-genai-takes-off-threat-intel-must-modernize\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"As adversarial GenAI takes off, threat intel must modernize\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence","description":"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/","og_locale":"en_US","og_type":"article","og_title":"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence","og_description":"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/","og_site_name":"Infoblox Blog","article_published_time":"2025-03-20T20:18:00+00:00","article_modified_time":"2025-03-21T15:57:15+00:00","og_image":[{"width":612,"height":405,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence","twitter_description":"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"As adversarial GenAI takes off, threat intel must modernize","datePublished":"2025-03-20T20:18:00+00:00","dateModified":"2025-03-21T15:57:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/"},"wordCount":1577,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","keywords":["AI in Cybersecurity","Generative AI Risks","Preemptive Cyber Defense","AI-driven Threats","Predictive Threat Intelligence"],"articleSection":["Infoblox Threat Intel","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/","name":"Impact of GenAI in Cybersecurity: Navigating Risks with Predictive Intelligence","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","datePublished":"2025-03-20T20:18:00+00:00","dateModified":"2025-03-21T15:57:15+00:00","description":"Explore how GenAI is reshaping the cybersecurity landscape, presenting both challenges and opportunities. Learn about generative AI risks and predictive threat intelligence to stay ahead of adversaries.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/introducing-dns-threat-actors-thumbnail.jpg","width":612,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/as-adversarial-genai-takes-off-threat-intel-must-modernize\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"As adversarial GenAI takes off, threat intel must modernize"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11220"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11220\/revisions"}],"predecessor-version":[{"id":11228,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11220\/revisions\/11228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/9924"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}