A Dark Reading Panel - "The Promise and Perils of AI: Navigating Emerging Cyber Threats"

Transcript Summary
"The Promise and Perils of AI: Navigating Emerging Cyber Threats" virtual panel, hosted by Dark Reading, explored the rapidly evolving role of generative AI in cybersecurity. The panel discussed how AI is empowering both attackers and defenders, with tools that can automate phishing, aid in deep research, and lower the barrier for discovering zero-day vulnerabilities. Experts highlighted real-world threats such as AI-driven social engineering, prompt injection, and supply chain risks, as well as the challenges of securing AI-integrated applications. While the panel acknowledged the hype and fear surrounding AI, it emphasized the importance of practical mitigations, better development practices, and fostering trust and integrity in AI systems. Despite growing concerns, the discussion ended on an optimistic note, encouraging the use of AI to empower defenders and foster innovation in cybersecurity.
Key Themes Discussed:
1. AI as a Double-Edged Sword
- Offensive Use by Threat Actors: AI is lowering the barrier for cybercriminals by enabling more personalized, scalable, and sophisticated attacks. Social engineering, phishing, and data exploitation (especially using breached data and deepfakes) are major concerns.
- Quiet Before the Storm: Caleb Sima noted that while AI threats are real, current attacker adoption is in a “quiet period” as they figure out how to scale AI effectively—true productization is expected within a year.
2. Emerging Threats
- Deep Research Tools: Tools that combine breached data, OSINT, image analysis, and LLMs can instantly build rich attacker profiles—dramatically increasing the effectiveness of social engineering.
- AI Agents and Prompt Injections: Rob Ragan highlighted that 2025 will be the year of agentic AI systems. Attackers will exploit these multi-step agent workflows using indirect prompt injection to gain access to sensitive data or execute malicious actions.
- Legacy Infrastructure at Risk: AI is particularly good at analyzing and reverse engineering old, obscure systems, which could lead to an increase in zero-day exploits in critical infrastructure.
3. AI in Defensive Security
- Enhanced Testing and Automation: AI is already improving vulnerability scanning, code review, and prioritization of security issues. Bishop Fox’s team, for example, used AI to expedite firmware vulnerability discovery.
- Code Security: While AI-generated code can increase productivity, it may lack best practices or have hidden flaws. Organizations must double-check LLM-generated code using traditional and AI-enhanced SAST tools.
4. Human Factor and Trust
- Social Engineering Evolution: With convincing deepfakes and AI-generated pretexts, traditional cues for detecting fraud are eroding. Both Eric Kruse and Rob Ragan emphasized technical controls, behavioral analysis, and user education as key defenses.
- Supply Chain and Trust Challenges: AI expands the attack surface across digital supply chains. Knowing who and what to trust is becoming increasingly difficult.
5. Practical Recommendations
- Defense-in-Depth Is Critical: Technical mitigations (e.g., session security, access control for agents, proper validation) are essential.
- Test Models Like Code: Just like traditional code, models will need versioning, testing, and security evaluation. Trust in model integrity and origin will be a new frontier.
- Prepare for AI-Generated Exploits: AI will soon enable junior attackers to find zero-days. Organizations should rethink vulnerability management and threat modeling.
6. Optimism and Opportunities
- Despite concerns, panelists expressed hope. AI can help defenders become faster, more efficient, and creative—especially in threat detection and remediation. Rob Ragan described it as a “superpower” that enables security teams to do more with less.
Panelists:
- Caleb Sima – Chair, CSA AI Safety Initiative
- Rob Ragan – Principal Technology Strategist, Bishop Fox
- Stephen Thoemmes – Developer Advocate, Snyk
- Erich Kron – Security Awareness Advocate, KnowBe4
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Recommended Posts
You might be interested in these related posts.

Jul 26, 2024
Cyber Mirage: How AI is Shaping the Future of Social Engineering

Oct 09, 2023
Pragmatic AI & LLM Security Mitigations for Enterprises

Apr 01, 2024
Practical Measures for AI and LLM Security: Securing the Future for Enterprises

Feb 05, 2025
From Dial Tone to Throne: IVR Testing in the Spirit of The King of NYNEX