


Powering This Analysis:
- 2.6M+ AI-related posts analyzed across underground sources in just five months — including jailbreak prompts, fraud toolkits, and deepfake services.
- 100,000+ illicit sources tracked, giving unmatched visibility into how adversaries are experimenting, optimizing, and operationalizing AI.
- 5 distinct threat actor use cases, from multilingual phishing kits to synthetic voice impersonation tools.