Lightning Talk: AI as the Attack: Weaponizing APIs

SANS Institute ยท Beginner ยท๐Ÿ” Cybersecurity ยท1w ago
Skills: Defensive AI80%
When AI Becomes the Attack: How Threat Actors Weaponize AI APIs to Hide Their Tracks ๐ŸŽ™๏ธ Bryant Pickford, Security Specialist Solutions Architect, AWS ๐Ÿ“ Presented at SANS AI Cybersecurity Summit 2026 Problem โ†’ risk โ†’ action structure: Problem: Threat actors exploit AI APIs to generate overwhelming traffic that appears legitimate Risk: Traditional defenses can't distinguish between legitimate AI crawlers and weaponized ones Action: A 3-step detection framework attendees can implement immediately Explore upcoming SANS Summits to continue learning from leading voices in cybersecurity: https://go.sans.org/summits
Watch on YouTube โ†— (saves to browser)
Sign in to unlock AI tutor explanation ยท โšก30

Related AI Lessons

โšก
XSS Nedir ve Neden Hรขlรข Tehlikeli? | Bir Siber Gรผvenlik ร–ฤŸrencisinin Notlarฤฑ
Learn about XSS attacks and their ongoing threat to web security
Medium ยท Cybersecurity
โšก
Beyond Repo Scanning: How AIRI Expanded the Risk Vocabulary in STEM BIO-AI 1.7.x
Learn how AIRI expanded risk vocabulary in STEM BIO-AI 1.7.x beyond repo scanning
Dev.to ยท Kwansub Yun
โšก
GitGuardian Now Flags Admin and Overprivileged Identities Across AWS, Entra, and Okta
Learn how to identify and manage admin and overprivileged identities across AWS, Entra, and Okta using GitGuardian
Dev.to ยท Dwayne McDaniel
โšก
โ€˜Wonโ€™t Fixโ€™โ€”All VPN Apps Affected As Google Android 16 Leaks Info
Android 16 has a VPN bypass vulnerability exposing real IP addresses, but Google won't fix it
Forbes Innovation
Up next
Data Management and Privacy Practices for Professionals
Coursera
Watch โ†’