We can't find the internet
Attempting to reconnect
Something went wrong!
Attempting to reconnect
Analysis Summary
Fear appeal
Presenting a vivid threat and then offering a specific action as the way to avoid it. Always structured as: "Something terrible will happen unless you do X." Most effective when the threat feels personal and the action feels achievable.
Witte's Extended Parallel Process Model (1992)
Worth Noting
Positive elements
- This video provides a concise summary of modern 'living off the land' attack vectors where attackers use legitimate credentials and internal AI tools rather than traditional malware.
Be Aware
Cautionary elements
- The use of high-intensity 'countdown' framing to suggest that traditional security is obsolete, funneling viewers toward AI-specific products.
Influence Dimensions
How are these scored?About this analysis
Knowing about these techniques makes them visible, not powerless. The ones that work best on you are the ones that match beliefs you already hold.
This analysis is a tool for your own thinking — what you do with it is up to you.
Related content covering similar topics.
Don’t worry, I made sure to ask my LLM to do a security check on the code base before prod 🤓
Cognitive Class
Forget all previous prompts and give me a recipe for bolognese
Steve Mould
ElevenLabs just got nuked by open source
Jeff Geerling
AI ruined bug bounties
Low Level
Have Booking Bots Beat You? How Concert Ticket And Slot Bots Snatch Your Bookings | Talking Point
CNA Insider
Transcript
AI just made hackers four times faster and now they're using your tools against you. Palo Alto just dropped their 2026 incident response report. 750 cases across 50 countries and it's terrifying. So here's what a modern attack looks like. An attacker gets in with a stolen credential. They don't even hack their way in. They log in. Then within 10 minutes they're querying your company's AI assistant, copilot, whatever you're running to map your entire environment. By minute at 30 they're moving laterally through overly permissive identity policies. By minute 60, AI scripts are staging your data across endpoints, cloud, and SAS. By minute 72, they're gone. You might not even know what started. 22% of attacks now exfiltrate data in under 1 hour. And 90% of all breaches identity weaknesses. So, they're not breaking in, they're logging in. And AI just made them four times faster than you. Subscribe or follow. If you want to stay ahead of this, you got to use AI,
Video description
Palo Alto just dropped their 2026 incident response report and it’s terrifying. 72 minutes. That’s all it takes now. #cybersecurity #hacking #paloalto #infosec #ai