{"id":112041,"date":"2025-04-17T09:05:32","date_gmt":"2025-04-17T16:05:32","guid":{"rendered":"https:\/\/www.backblaze.com\/blog\/?p=112041"},"modified":"2025-04-17T09:05:33","modified_gmt":"2025-04-17T16:05:33","slug":"ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/","title":{"rendered":"AI 101: How AI and Ransomware Are Reshaping Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"820\" src=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png\" alt=\"A decorative image showing a shield, a chip, and the words &quot;AI&quot; over the chip. \" class=\"wp-image-112042\" srcset=\"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png 1440w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A-300x171.png 300w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A-1024x583.png 1024w, https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A-768x437.png 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>AI is rewriting the rules of technology, for better or worse. Arguably one of the most \u201cfor better <em>and <\/em>worse\u201d areas? <a href=\"https:\/\/www.backblaze.com\/cloud-storage\/solutions\/ransomware-readiness-and-recovery\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware<\/a>. It\u2019s a full blown billion dollar business, and AI is supercharging both the offense and defense.\u00a0\u00a0<\/p>\n\n\n\n<p>Not only are we seeing AI give bad actors more sophisticated tools and campaigns to target business and consumers alike, we\u2019re also seeing mitigation techniques and technologies deployed by good actors gain equally compelling AI-powered improvements.&nbsp;<\/p>\n\n\n\n<p>In other words, welcome to the future\u2014where your data is the hostage and the bots are negotiating. Let\u2019s dig in.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Some stage-setting: How much is ransomware costing us?<\/h2>\n\n\n\n<p>Despite ransomware payments exceeding an eye-watering <a href=\"https:\/\/www.chainalysis.com\/blog\/ransomware-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">$1 billion in 2023<\/a>\u2014and despite some high profile attacks in 2024, one of which extracted <a href=\"https:\/\/www.wired.com\/story\/snowflake-breach-advanced-auto-parts-lendingtree\/\" target=\"_blank\" rel=\"noreferrer noopener\">$75 million from a single victim<\/a>\u2014ransomware attacks actually fell overall in 2024. High profile law enforcement activity, like those against <a href=\"https:\/\/www.axios.com\/2024\/02\/19\/lockbit-ransomware-takedown-operation\" target=\"_blank\" rel=\"noreferrer noopener\">LockBit<\/a> and <a href=\"https:\/\/www.axios.com\/2023\/12\/19\/blackcat-alphv-fbi-seizes-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">BlackCat<\/a> contributed to a huge drop in the second half of 2024.\u00a0<\/p>\n\n\n\n<p>Don\u2019t get too excited though: According to cryptocurrency tracing firm Chainanalysis, that still meant <a href=\"https:\/\/www.wired.com\/story\/2024-ransomware-payments-fall-chainalysis\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noreferrer noopener\">$814 million in 2024<\/a>. And, the <a href=\"https:\/\/www.backblaze.com\/blog\/the-true-cost-of-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">true cost of ransomware<\/a> includes more than just payments extracted under threat.\u00a0<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.cybereason.com\/blog\/research\/report-ransomware-attacks-and-the-true-cost-to-business\" target=\"_blank\" rel=\"noreferrer noopener\">economic ripple effects<\/a> of a ransomware attack can include losing C-level talent, having to lay off employees, and ongoing downtime or business closure. Industry-wide, cyber insurance is a growing industry, and 2024 saw a staggering <a href=\"https:\/\/www.prnewswire.com\/news-releases\/cybersecuritys-biggest-blind-spot-third-party-risk-new-resilience-analysis-finds-302386804.html#:~:text=New%20cyber%20insurance%20claims%20data,of%20all%20claims%20in%202024\" target=\"_blank\" rel=\"noreferrer noopener\">31% of claims<\/a> come from third-party risk.\u00a0<\/p>\n\n\n\n<p>Reports show that cyber attackers are using ransomware data in new ways, including <a href=\"https:\/\/www.scmagazine.com\/resource\/compromised-backups-send-ransomware-recovery-costs-soaring\" target=\"_blank\" rel=\"noreferrer noopener\">targeting critical backups<\/a> and using hostage data to <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031\/\" target=\"_blank\" rel=\"noreferrer noopener\">damage organizational reputation<\/a>.\u00a0<\/p>\n\n\n\n<p>Perhaps most concerningly, ransomware attackers are increasingly using <a href=\"https:\/\/attack.mitre.org\/tactics\/TA0010\/\" target=\"_blank\" rel=\"noreferrer noopener\">exfiltration<\/a> as a tactic to <a href=\"https:\/\/www.csoonline.com\/article\/3825545\/5-things-to-know-about-ransomware-threats-in-2025.html\" target=\"_blank\" rel=\"noreferrer noopener\">double and triple extortion<\/a>, even using exfiltration data to launch targeted distributed denial-of-service (DDoS) attacks. According to a <a href=\"https:\/\/engage.checkpoint.com\/security-report-2025\/items\/report--cyber-security-report-2025?gad_source=1\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point\u2019s 2025 Cyber Security Report<\/a>, some new actors have emerged as exclusively \u201cdata-selling platforms,\u201d hosting dedicated data leak sites (DLS) and negotiation platforms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The good news<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Machine learning (ML) tools have underpinned modern cyber security techniques for years now\u2014with excellent results.\u00a0<\/li>\n\n\n\n<li>Sophisticated monitoring tools give us far more granular insights and alerts.\u00a0<\/li>\n\n\n\n<li>AI-driven behavioral analysis is making it easier to detect anomalies and preempt attacks before they escalate.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What does this mean for defending against ransomware attacks?<\/h2>\n\n\n\n<p>Enterprises now have access to security platforms that analyze network behavior in real time, flagging unusual access patterns or lateral movement before a full ransomware payload can deploy. These platforms rely on machine learning models trained on massive datasets of known attack vectors, which allows them to flag and quarantine suspicious activity with impressive accuracy.<\/p>\n\n\n\n<p>The interesting thing is that common knowledge says that \u201cthe AI revolution\u201d has been happening recently, and quickly. But, when it comes to cybersecurity defense, many tools have been using ML algorithms for at least two decades. <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2020\/palo-alto-networks-launches-worlds-first-ml-powered-ngfw\" target=\"_blank\" rel=\"noreferrer noopener\">Palo Alto Networks (WildFire)<\/a>, for example, has been using ML since 2003.\u00a0<\/p>\n\n\n\n<p>The line between \u201cprocessing massive datasets and acting up on that info based on programmed parameters\u201d and machine learning is subtle, but important. While the former follows set parameters, machine learning identifies patterns in data\u2014sometimes with human guidance\u2014to decide from multiple possible actions.&nbsp;<\/p>\n\n\n\n<p>It\u2019s like teaching an assistant a series of tasks they can eventually do on their own. When you think about the progression from <a href=\"https:\/\/www.backblaze.com\/blog\/ai-101-how-cognitive-science-and-computer-processors-create-artificial-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">basic automation to ML, AI, and deep learning<\/a>, the shift from rule-based actions to autonomous, chained decisions starts to make a lot of sense.<\/p>\n\n\n\n<p>Zero trust architecture, enhanced by AI, is also gaining momentum. Instead of relying on perimeter-based defenses, AI-enhanced systems enforce granular access controls and continuously verify user and device trust levels. In practice, what this means is that systems no longer assume that you are you on the other end\u2014not without evidence. Combine this with real-time threat intelligence sharing and automated incident response, and enterprises can shorten the window between detection and mitigation drastically.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The bad news<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deep fakes are more convincing.\u00a0<\/li>\n\n\n\n<li>The ability to generate code means there are more attacks, and those attacks are more sophisticated and responsive.\u00a0<\/li>\n\n\n\n<li>Cyber criminals of all skill levels have access to more technical tools, including some that are specialized in malware.\u00a0<\/li>\n\n\n\n<li>Enterprises are adjusting to a new way of working, which can create vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Generative AI, phishing, and deep fakes<\/h2>\n\n\n\n<p>The low-hanging fruit in this discussion is that it\u2019s easy to use generative AI to create more convincing phishing attacks. In the past, bad grammar or non-localized language choices have been an easy way to quickly identify a phishing attack.&nbsp;<\/p>\n\n\n\n<p>Assisted by generative AI, deep fakes of both the voice and video flavor are getting increasingly difficult to spot\u2014so, while you know your CEO isn\u2019t <em>likely<\/em> to text you to get a bunch of gift cards or send them company funds via Bitcoin or PayPal, you might <a href=\"https:\/\/arstechnica.com\/information-technology\/2024\/02\/deepfake-scammer-walks-off-with-25-million-in-first-of-its-kind-ai-heist\/\">believe a video of your CFO<\/a> or a <a href=\"https:\/\/www.forbes.com\/sites\/jessedamiani\/2019\/09\/03\/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000\/\">call from your CEO<\/a> asking you to transfer funds to accounts that turn out to not be legitimate.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How is generated code being used by ransomware bad actors?<\/h3>\n\n\n\n<p>Just as generative AI models have made <a href=\"https:\/\/www.hireawriter.us\/creative\/write-like-a-robot-exploring-the-art-of-ai-generated-poetry\" target=\"_blank\" rel=\"noreferrer noopener\">everyone a poet<\/a>, they\u2019re also widely used to <a href=\"https:\/\/www.computerworld.com\/article\/2077802\/just-how-good-is-ai-assisted-code-generation.html\" target=\"_blank\" rel=\"noreferrer noopener\">generate code<\/a>. Tools like <a href=\"https:\/\/github.com\/features\/copilot\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub Copilot<\/a> have seen wide adoption amongst enterprises looking to generate and test code. <a href=\"https:\/\/www.gartner.com\/en\/articles\/set-up-now-for-ai-to-augment-software-development\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner reports<\/a> that by 2027, 70% of professional developers will use AI-powered coding tools, up from less than 10% in 2023.\u00a0<\/p>\n\n\n\n<p>Given how AI code generation has made code generation easier on enterprises, it\u2019s no surprise that the ransomware industry is following the same adoption trends. By January 2023, this had gone from a hypothetical to a reality, with ransomware bad actors of <a href=\"https:\/\/www.scworld.com\/analysis\/cybercriminals-are-already-using-chatgpt-to-own-you\" target=\"_blank\" rel=\"noreferrer noopener\">low levels of technical skill<\/a> able to leverage LLMs to create malware scripts.\u00a0<\/p>\n\n\n\n<p>By July 2023, cybercriminals were already discussing <a href=\"https:\/\/datarecovery.com\/rd\/wormgpt-generative-a-i-could-help-ransomware-spread\/\" target=\"_blank\" rel=\"noreferrer noopener\">WormGPT, a malicious chatbot<\/a> trained on ChatGPT which removed standard guardrails against creating illegal or inappropriate content. And, cybersecurity protection firms had executed a proof of concept to demonstrate that <a href=\"https:\/\/www.hyas.com\/blog\/blackmamba-using-ai-to-generate-polymorphic-malware\" target=\"_blank\" rel=\"noreferrer noopener\">AI could generate truly polymorphic code<\/a> on the fly\u2014a technique used to make it much easier to evade detection by antivirus programs. By July 2024, <a href=\"https:\/\/securityintelligence.com\/articles\/chatgpt-4-exploits-87-percent-one-day-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">one study showed<\/a> that ChatGPT 4 was able to exploit 87% of one-day vulnerabilities.\u00a0<\/p>\n\n\n\n<p>Couple that with the fact that ransomware bad actors have opposite success metrics vs. enterprises. Cyber criminals rely on enacting as many attacks as possible, and it only takes one of those attacks succeeding to see a significant upside. Enterprises, on the other hand, only need one failure to see a huge negative impact on their businesses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What things can you implement to be ransomware ready?<\/h2>\n\n\n\n<p>There are a variety of best practices enterprises and users can implement to be more ransomware ready. Organizations like <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology (NIST)<\/a> and <a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a> typically publish recommendations, as well as security bulletins and trends within the industry.\u00a0<\/p>\n\n\n\n<p>Some of these recommendations are things that users can do on every platform they interact with, such as:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Creating good, strong, unique passwords, and preferably using a password manager: <\/strong>A good password manager reduces password reuse and helps ensure best practices are followed enterprise-wide.\u00a0<\/li>\n\n\n\n<li><strong>Enabling multifactor authentication (MFA): <\/strong>Multi-factor authentication remains one of the strongest lines of defense, especially when paired with device verification and biometric options.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>On the enterprise side of the house, frameworks like <a href=\"https:\/\/www.backblaze.com\/blog\/from-response-to-recovery-developing-a-cyber-resilience-framework\/\">cyber resilience<\/a> help teams protect data they\u2019ve been entrusted with. And, AI-powered cyber security tools can be a powerful tool in any business\u2019s toolbox. That can look like a number of different things, including:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Investing in AI-powered endpoint detection and response (EDR). <\/strong>These tools continuously monitor and analyze endpoint activities, flagging unusual behavior and isolating threats automatically.<\/li>\n\n\n\n<li><strong>Training teams on recognizing deep fakes and AI-enhanced phishing attempts. <\/strong>Security awareness training is evolving fast. Focused, frequent, and AI-aware sessions are critical for employees across departments.<\/li>\n\n\n\n<li><strong>Leveraging deception technology. <\/strong>Deploying decoy systems, fake credentials, and honeypots can help trap attackers early and gather valuable intel on their tactics.<\/li>\n\n\n\n<li><strong>Running tabletop simulations. <\/strong>Practicing breach scenarios\u2014especially those involving AI-enabled threats\u2014prepares teams to act decisively when seconds matter.<\/li>\n<\/ul>\n\n\n\n<p>Cyber resilience isn\u2019t static, and neither are the tools and tactics. One of the most important areas an enterprise can invest in is ongoing security and research. Enterprise leaders need to prioritize proactive measures. That means ongoing AI model audits, being nimble in response to new and changing best practices, and investing in cross-functional teams that bring together infosec, legal, and operational leadership.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The future of AI and ransomware<\/h2>\n\n\n\n<p>Let\u2019s level with each other\u2014separately, the AI and ransomware spaces are both changing quickly. When you combine AI and ransomware and try to define how they\u2019re affecting each other, you\u2019re on pretty slippery ground.&nbsp;<\/p>\n\n\n\n<p>What we\u2019re trying to do here is identify patterns that affect our everyday lives\u2014but we\u2019re also taking a peek at what folks are studying in the research realm, because <a href=\"https:\/\/www.theguardian.com\/technology\/2024\/dec\/09\/google-unveils-mindboggling-quantum-computing-chip\" target=\"_blank\" rel=\"noreferrer noopener\">quantum is just around the corner<\/a>, and, frankly, too impactful <a href=\"https:\/\/www.youtube.com\/watch?v=W7ppd_RY-UE\" target=\"_blank\" rel=\"noreferrer noopener\">to ignore<\/a>.\u00a0<\/p>\n\n\n\n<p>So, tell us if we need an update, or if you have another opinion! The comments section is open and we\u2019re happy to chat.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is changing the ransomware landscape, empowering both cybercriminals with sophisticated tools and cybersecurity defenders with advanced protection. Today, let&#8217;s talk about the high-stakes battle for data security.<\/p>\n","protected":false},"author":182,"featured_media":112042,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7,434,438,475],"tags":[489,468],"class_list":["post-112041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-storage","category-featured-1","category-featured-cloud-storage","category-ransomware","tag-ai-ml","tag-b2cloud","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI 101: How AI and Ransomware Are Reshaping Cybersecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI 101: How AI and Ransomware Are Reshaping Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"AI is changing the ransomware landscape, empowering both cybercriminals with sophisticated tools and cybersecurity defenders with advanced protection. Today, let&#039;s talk about the high-stakes battle for data security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Backblaze Blog | Cloud Storage &amp; Cloud Backup\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/backblaze\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-17T16:05:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T16:05:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"820\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stephanie Doyle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@backblaze\" \/>\n<meta name=\"twitter:site\" content=\"@backblaze\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stephanie Doyle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI 101: How AI and Ransomware Are Reshaping Cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"AI 101: How AI and Ransomware Are Reshaping Cybersecurity","og_description":"AI is changing the ransomware landscape, empowering both cybercriminals with sophisticated tools and cybersecurity defenders with advanced protection. Today, let's talk about the high-stakes battle for data security.","og_url":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/","og_site_name":"Backblaze Blog | Cloud Storage &amp; Cloud Backup","article_publisher":"https:\/\/www.facebook.com\/backblaze","article_published_time":"2025-04-17T16:05:32+00:00","article_modified_time":"2025-04-17T16:05:33+00:00","og_image":[{"width":1440,"height":820,"url":"https:\/\/www.backblaze.com\/blog\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png","type":"image\/png"}],"author":"Stephanie Doyle","twitter_card":"summary_large_image","twitter_creator":"@backblaze","twitter_site":"@backblaze","twitter_misc":{"Written by":"Stephanie Doyle","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/"},"author":{"name":"Stephanie Doyle","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/688f3962fd24d8155ef726bc94d75058"},"headline":"AI 101: How AI and Ransomware Are Reshaping Cybersecurity","datePublished":"2025-04-17T16:05:32+00:00","dateModified":"2025-04-17T16:05:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/"},"wordCount":1513,"commentCount":1,"publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png","keywords":["AI\/ML","B2Cloud"],"articleSection":["Cloud Storage","Featured","Featured-Cloud Storage","Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/","url":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/","name":"AI 101: How AI and Ransomware Are Reshaping Cybersecurity","isPartOf":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png","datePublished":"2025-04-17T16:05:32+00:00","dateModified":"2025-04-17T16:05:33+00:00","breadcrumb":{"@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#primaryimage","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png","width":1440,"height":820,"caption":"A decorative image showing a shield, a chip, and the words \"AI\" over the chip."},{"@type":"BreadcrumbList","@id":"https:\/\/www.backblaze.com\/blog\/ai-101-how-ai-and-ransomware-are-reshaping-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AI 101: How AI and Ransomware Are Reshaping Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#website","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","name":"Backblaze Cloud Solutions Blog","description":"Cloud Storage &amp; Cloud Backup","publisher":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#organization","name":"Backblaze","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.backblaze.com\/blog\/wp-content\/uploads\/2017\/12\/backblaze_icon_transparent.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Backblaze"},"image":{"@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/backblaze","https:\/\/x.com\/backblaze","https:\/\/www.youtube.com\/user\/Backblaze","https:\/\/en.wikipedia.org\/wiki\/Backblaze"]},{"@type":"Person","@id":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/#\/schema\/person\/688f3962fd24d8155ef726bc94d75058","name":"Stephanie Doyle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/12\/headshot-4-1-e1670452405672-150x150.jpg","url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/12\/headshot-4-1-e1670452405672-150x150.jpg","contentUrl":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2022\/12\/headshot-4-1-e1670452405672-150x150.jpg","caption":"Stephanie Doyle"},"description":"Stephanie is the Technical Narrative Content Manager at Backblaze. She specializes in taking complex topics and writing relatable, engaging, and user-friendly content. You can most often find her reading in public places, and can connect with her on LinkedIn.","url":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/author\/stephanie\/"}]}},"jetpack_featured_media_url":"https:\/\/backblazeprod.wpenginepowered.com\/wp-content\/uploads\/2025\/04\/bb-bh-AI-and-Ransomware_Design-A.png","_links":{"self":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/112041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/comments?post=112041"}],"version-history":[{"count":0,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/posts\/112041\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media\/112042"}],"wp:attachment":[{"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/media?parent=112041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/categories?post=112041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/backblazeprod.wpenginepowered.com\/blog\/wp-json\/wp\/v2\/tags?post=112041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}