CyberWire Daily – Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI
Episode: Microsoft Threat Intelligence Podcast
Date: September 1, 2025
Host: Shara de Grippo, Director of Threat Intelligence Strategy, Microsoft
Overview
This special live episode, recorded at Black Hat 2025, delivers a trio of expert conversations focusing on the cutting edge of cybersecurity threats and defense. The show dives into Microsoft’s bug bounty and Zero Day Quest programs, the rapid evolution of ransomware and extortion, and the current state of phishing and social engineering. Across these segments, the rising impact of AI in both attack and defense takes center stage, with practical insights for security professionals at every level.
Segment 1: Microsoft Security Response Center (MSRC), Bug Bounties, and Zero Day Quest
Guests: Tom Gallagher (VP Engineering, Head of MSRC)
Timestamps: 00:05 – 15:36
Mission and Operations of MSRC
Zero Day Quest: Encouraging Next-Generation Research
Feedback Loop Between Research and Engineering
-
Security Starts Early, But Research Is Key Feedback
- Security issues revealed by researchers drive systemic improvements—new tools, static analysis rules, and expanding threat modeling for future products.
"That's the feedback channel that we use to change the way we think about things."
— Tom Gallagher [10:16]
-
Building Security Culture Across Development and Response Teams
- Emphasizes strong partnerships between builders (developers) and breakers (security researchers).
"They’re going to be well-equipped to address the issue if they're aware of how to do that."
— Tom Gallagher [11:55]
Looking Ahead: Zero Day Quest and Research Opportunities
Segment 2: The State of Ransomware—Speed, Specialization, and the Rise of Artificial Intelligence
Guests: Eric Oldman (Principal Security Researcher), Eric Lawler (Senior Security Researcher)
Timestamps: 15:37 – 28:43
Ransomware Today: Faster, Smarter, and Ruthlessly Efficient
AI’s Emergent Role in Ransomware
Supply Chain Attacks and Ecosystem Complexity
Defensive Takeaways
Segment 3: Phishing and Social Engineering—Scale, Technology, and the Human Factor
Guests: Travis Shack (Principal Security Researcher), Eric Olson (Principal Security Researcher)
Timestamps: 28:43 – 42:24
Social Engineering and Credential Phishing 101
Scale and Success of Phishing
Credential Phishing Attack Flow
Defensive Strategies
-
Top Recommendations
- MFA everywhere (“one of the biggest protections we can have” – [34:02]), email security solutions, microlearning/simulation for training, and rapid reporting mechanisms.
- Trust is repeatedly identified as the target—social engineering attacks break person-to-person or person-to-brand trust, requiring both technical and cultural remedies.
-
AI Risks and the Future
- AI enables tailored attacks using breach data and personalization.
"Download a bunch of BREIS data ... run those through an LLM ... trick someone from this company, how could I do that?"
— Shara de Grippo [35:00]
Notable Examples and Tactics
-
Abuse of Context, Emotion, and Habit
-
Emails/Fakes exploiting urgency, fear, or curiosity (e.g., “Your spouse has begun divorce proceedings—click here”) or personalized job scams during economic uncertainty.
"A really Good example ... a law firm ... Divorce papers—click here ... there are so many reasons for people to click on things like that.”
— Shara de Grippo [38:26]
-
Deepfake-Aided Vishing and Help Desk Scams
-
Range from Targeted to Spray Attacks
- Highly-personalized attacks coexist with “spray and pray” strategies—both remain effective at scale.
Memorable Quotes by Segment
On Global Research Community and Diversity:
"We have people from 59 different countries... people that are still in high school all the way to people with PhDs."
— Tom Gallagher [02:41]
On the Impact of AI in Triage and Security Response:
"We're using a lot of AI now to triage things and prioritize and work through all of the issues."
— Tom Gallagher [07:39]
On the Acceleration of Ransomware Attacks:
"It was about 30 to 40 minutes from when they came in ... to when they started hitting the backups."
— Eric Oldman [18:10]
On Threat Actors Knowing Organizational Processes:
"They're able to really understand... will we get a pay, will we get paid, do they have the capability, and how exactly would we get that access?”
— Shara de Grippo [18:57]
On Defensive Priorities Against Ransomware:
"Having a plan to disconnect critical systems ... proper logging, I think, is so key."
— Eric Lawler [26:45]
On AI Increasing Attacker Sophistication:
"The use of AI... now you can go back, repeat that playbook, and see if the customer is vulnerable this time."
— Eric Oldman [23:15]
On the Human Element of Security:
"Everybody can do a little bit of security ... be like, hey, this is no good. And then report it and ... not clicking it."
— Eric Olson [33:57]
On AI’s Role as an Accelerator:
"AI really...the A can very easily stand for acceleration—just making things a lot faster that we used to do manually."
— Shara de Grippo [35:54]
Key Takeaways
1. Responsible Disclosure at Scale
- Microsoft’s coordinated vulnerability disclosure process, global bug bounty outreach, and innovative programs like Zero Day Quest accelerate mitigation while fostering researcher collaboration.
2. Ransomware: Faster, Smarter, and More Sophisticated
- Modern ransomware operations are powered by intelligence, specialization, and—now—AI. Supply chain vulnerabilities, rapid compromise, and multifaceted extortion demand holistic defense.
3. Phishing and Social Engineering Remain Entry Points
- Threat actors exploit emotion, context, and habit. AI-generated lures and deepfakes up the ante. Human error is inevitable—technical controls (especially MFA) and continual awareness are vital.
4. AI Is a Game-Changer—For Both Sides
- AI accelerates both attacks and defenses, from triaging bug reports to crafting tailored extortion and phishing campaigns. The community is called to adapt and focus research on AI's cybersecurity implications.
Additional Resources
- Zero Day Quest program: [Microsoft Security Blog]
- Blue Hat Asia & global events: Check Microsoft events pages
- Recommended defenses: MFA everywhere, strong vendor assessments, regular backups, log retention, security awareness with modern simulation practices
Closing Thought:
As threat actors rapidly innovate, especially with AI at their disposal, defensive strategies must evolve just as quickly—melding cutting-edge technology, global collaboration, and a perpetual focus on human factors.