Video
Webinar

AI-Powered Zero-Day Cyberattacks & Cloud Ransomware

K–12 schools are increasingly targeted by sophisticated AI-based cyberattacks. Attackers are using artificial intelligence to generate highly convincing phishing campaigns, adaptive malware, and automated exploits at a scale never seen before.


At the same time, ransomware in the public cloud is surging. For example, Microsoft Threat Intelligence has recently released an analysis of Storm-0501, a financially motivated group that is evolving its ransomware techniques. Their latest shift marks a fundamental change in how ransomware can impact organizations—moving from traditional endpoint encryption to full cloud-native ransomware operations.
 

Key Takeaways
✔️ How AI is being weaponized for phishing, malware, and exploit discovery
✔️ Why cloud environments are the new top target for ransomware
✔️ Real-world case studies of AI-driven attacks and SaaS ransomware incidents
✔️ Practical defense strategies: Zero Trust, immutable backups, MSSP/SOC, and DR planning

Transcript

Takeaways

  • Cybersecurity in Education

    Education is the third most targeted industry, largely due to limited resources, making it a lucrative target for financially motivated organized crime groups.

  • AI's Dual Impact

    AI is both an elevated threat, enabling more sophisticated attacks like deepfake bullying and convincing business email compromise, and a necessary defense tool in modern security products (MDR, EDR).

  • Ransomware Evolution

    Ransomware has evolved from encrypting endpoints and on-premise infrastructure (VMware) to targeting and locking organizations out of their cloud environments (e.g., Azure) by deleting backups.

  • Foundational Security Needs

    The bare minimum for modern defense must include Managed Detection and Response (MDR) for 24/7 monitoring, robust Endpoint Protection Technology (EDR/XDR), Multi-Factor Authentication (MFA), and advanced email security.

  • Risk Management Focus

    Cybersecurity must be viewed as a risk management practice, requiring continual assessment, the use of frameworks (NIST, CIS), and shoring up defenses against the frequent attacks like phishing, exploiting web vulnerabilities, & credential harvestiing.

About the presenters

Ted Papaioannou

VP, Cybersecurity Threat & Defense
Promenet, Inc.

Ted Papaioannou is Vice President of Promenet’s Cybersecurity Threat and Defense Team, with over 15 years of experience in IT infrastructure, software, and AI. He has worked extensively with independent schools, providing cybersecurity consulting, solution design, incident response, and faculty/staff awareness training. Ted holds certifications including CISSP, CCNA, RHCSA, and MCSE, and earned his Bachelor’s degree in Computer Engineering from Penn State University. A frequent presenter at school associations such as EdAccess, NJAIS, PAIS, and PAISBOA, Ted is dedicated to helping K-12 institutions navigate evolving cyber threats with clear, actionable strategies that protect sensitive data and ensure operational resilience.