Video

Threat Briefing: Inside the GenAI Attack Lifecycle

In this episode of Threat Briefing, we dive into the real-world tactics adversaries use to exploit generative AI systems. Security researcher Alex Groyz joins us to break down how attackers are actively abusing cloud-based LLM infrastructure, from exposed inference endpoints and Shadow AI to prompt injection, jailbreaks, and inference-driven data exfiltration. We explore how the MITRE ATLAS framework maps to these attacks and discuss how defenders can use it to simulate adversarial behavior, validate detections, and secure GenAI across the full lifecycle.

Threat Briefing: Inside the GenAI Attack Lifecycle
Select language to download
Access
Video
Can't see the form?

We noticed you may not be able to see our form. This occurs when privacy tools (which we fully support) block third-party scripts.

Firefox users:

Click the shield icon in your address bar → "Turn off Tracking Protection for this site"

Chrome with privacy extensions:

Temporarily allow this site in your ad blocker or privacy extension settings

Prefer not to change settings?

Email us directly at support@vectra.ai or info@vectra.ai


We use HubSpot forms for functionality, not tracking. Your privacy matters to us—that's why we're giving you these options.

Trusted by experts and enterprises worldwide

FAQs