AI and Threat Intelligence: The Defenders’ Guide
How adversaries are scaling attacks with AI—and how defenders are fighting back
In This Guide, You’ll Learn How To:
- Track how adversaries are operationalizing AI tools—from jailbroken LLMs to deepfake-as-a-service
- Build AI-enhanced workflows that improve signal detection, speed up analysis, and sharpen investigations
- Avoid common AI pitfalls: automation overreach, blind trust in models, and losing human context
Powering This Analysis:
- 2.6M+ AI-related posts analyzed across underground sources in just five months—including jailbreak prompts, fraud toolkits, and deepfake services
- 100,000+ illicit sources tracked, giving unmatched visibility into how adversaries are experimenting, optimizing, and operationalizing AI
- 5 distinct threat actor use cases, from multilingual phishing kits to synthetic voice impersonation tools
To download the e-book, please fill out the form on your right!

Complete the form to download