<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Attack-Chain on Ben's Info Tech Blog</title><link>https://infotechwithben.com/tags/attack-chain/</link><description>Recent content in Attack-Chain on Ben's Info Tech Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 05 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://infotechwithben.com/tags/attack-chain/index.xml" rel="self" type="application/rss+xml"/><item><title>The Ransomware Playbook Has Been Rewritten: How AI Is Automating the Attack Chain</title><link>https://infotechwithben.com/posts/the-ransomware-playbook-has-been-rewritten-how-ai-is-automating-the-attack-chain/</link><pubDate>Tue, 05 May 2026 00:00:00 +0000</pubDate><guid>https://infotechwithben.com/posts/the-ransomware-playbook-has-been-rewritten-how-ai-is-automating-the-attack-chain/</guid><description>The Ransomware Playbook Has Been Rewritten: How AI Is Automating the Attack Chain Abstract Between 2024 and 2026, artificial intelligence transformed ransomware from a skilled-labor-intensive crime into an automated industrial operation. Threat actors now leverage large language models for reconnaissance and target profiling, generative AI for flawless spear-phishing and deepfake-enabled business email compromise, AI-orchestrated lateral movement that compresses breakout times to a median of 29 minutes, and emerging Ransomware-as-a-Service platforms that advertise AI-powered negotiation as a core product feature.</description></item></channel></rss>