Skip to content
Longterm Wiki

Catastrophic Cyber Tail Risk

catastrophic-cyber-tail-riskriskPath: /knowledge-base/risks/catastrophic-cyber-tail-risk/
E2519Entity ID (EID)
← Back to page1 backlinksUpdated: 2026-05-04
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "catastrophic-cyber-tail-risk",
  "wikiId": "E2519",
  "path": "/knowledge-base/risks/catastrophic-cyber-tail-risk/",
  "filePath": "knowledge-base/risks/catastrophic-cyber-tail-risk.mdx",
  "title": "Catastrophic Cyber Tail Risk",
  "quality": null,
  "readerImportance": null,
  "researchImportance": null,
  "tacticalValue": null,
  "contentFormat": "article",
  "causalLevel": null,
  "lastUpdated": "2026-05-04",
  "dateCreated": null,
  "summary": null,
  "description": "Catalog of systemic single points of failure in cyber infrastructure that could plausibly produce \\$1T+ damage events. Treats which catastrophic cyber scenarios are reachable and which are bounded by structural features of the affected systems.",
  "ratings": null,
  "category": "risks",
  "subcategory": "structural",
  "clusters": [
    "cyber",
    "ai-safety"
  ],
  "metrics": {
    "wordCount": 1898,
    "tableCount": 1,
    "diagramCount": 0,
    "internalLinks": 1,
    "externalLinks": 14,
    "footnoteCount": 1,
    "bulletRatio": 0.21,
    "sectionCount": 14,
    "hasOverview": true,
    "structuralScore": 12
  },
  "suggestedQuality": 80,
  "updateFrequency": null,
  "evergreen": true,
  "wordCount": 1898,
  "unconvertedLinks": [
    {
      "text": "performing 80-90% of tactical operations autonomously and generating multiple requests per second",
      "url": "https://www.anthropic.com/news/disrupting-AI-espionage",
      "resourceId": "4ba107b71a0707f9",
      "resourceTitle": "first documented AI-orchestrated cyberattack"
    },
    {
      "text": "Microsoft estimated affected 8.5 million Windows machines worldwide",
      "url": "https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/",
      "resourceId": "da77a02884b55432",
      "resourceTitle": "Helping our customers through the CrowdStrike outage - The Official Microsoft Blog"
    },
    {
      "text": "≈\\$5.4B in direct losses among Fortune 500 companies (Parametrix estimate)",
      "url": "https://www.parametrixinsurance.com/in-the-news/crowdstrike-to-cost-fortune-500-5-4-billion-insured-loss-range-of-540-million-to-1-08-billion",
      "resourceId": "94a87516e9dc9ba3",
      "resourceTitle": "CrowdStrike to Cost Fortune 500 $5.4b; Insured Loss Range of $0.54b - $1.08b"
    },
    {
      "text": "\"Disrupting the first reported AI-orchestrated cyber espionage campaign\"",
      "url": "https://www.anthropic.com/news/disrupting-AI-espionage",
      "resourceId": "4ba107b71a0707f9",
      "resourceTitle": "first documented AI-orchestrated cyberattack"
    },
    {
      "text": "\"Helping our customers through the CrowdStrike outage\"",
      "url": "https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/",
      "resourceId": "da77a02884b55432",
      "resourceTitle": "Helping our customers through the CrowdStrike outage - The Official Microsoft Blog"
    },
    {
      "text": "\"CrowdStrike to Cost Fortune 500 \\$5.4B\"",
      "url": "https://www.parametrixinsurance.com/in-the-news/crowdstrike-to-cost-fortune-500-5-4-billion-insured-loss-range-of-540-million-to-1-08-billion",
      "resourceId": "94a87516e9dc9ba3",
      "resourceTitle": "CrowdStrike to Cost Fortune 500 $5.4b; Insured Loss Range of $0.54b - $1.08b"
    },
    {
      "text": "\"Cyber Insurance: Risks and Trends 2025\"",
      "url": "https://www.munichre.com/en/insights/cyber/cyber-insurance-risks-and-trends-2025.html",
      "resourceId": "bda1f1d4700946d3",
      "resourceTitle": "Cyber Insurance: Risks and Trends 2025 – Munich Re"
    }
  ],
  "unconvertedLinkCount": 7,
  "convertedLinkCount": 0,
  "backlinkCount": 1,
  "hallucinationRisk": {
    "level": "medium",
    "score": 50,
    "factors": [
      "low-citation-density"
    ]
  },
  "entityType": "risk",
  "redundancy": {
    "maxSimilarity": 18,
    "similarPages": [
      {
        "id": "ai-cyber-damage-bounding-tail",
        "title": "AI Cyber Damage: Bounding the Tail",
        "path": "/knowledge-base/models/ai-cyber-damage-bounding-tail/",
        "similarity": 18
      },
      {
        "id": "concentrated-compute-cybersecurity-risk",
        "title": "Concentrated Compute as a Cybersecurity Risk",
        "path": "/knowledge-base/risks/concentrated-compute-cybersecurity-risk/",
        "similarity": 15
      },
      {
        "id": "cyberweapons",
        "title": "Cyberweapons",
        "path": "/knowledge-base/risks/cyberweapons/",
        "similarity": 13
      },
      {
        "id": "ai-cyber-damage-estimates",
        "title": "AI Cyber Damage Estimates",
        "path": "/knowledge-base/models/ai-cyber-damage-estimates/",
        "similarity": 12
      },
      {
        "id": "compute-concentration",
        "title": "Compute Concentration",
        "path": "/knowledge-base/risks/compute-concentration/",
        "similarity": 12
      }
    ]
  },
  "coverage": {
    "passing": 3,
    "total": 13,
    "targets": {
      "tables": 8,
      "diagrams": 1,
      "internalLinks": 15,
      "externalLinks": 9,
      "footnotes": 6,
      "references": 6
    },
    "actuals": {
      "tables": 1,
      "diagrams": 0,
      "internalLinks": 1,
      "externalLinks": 14,
      "footnotes": 1,
      "references": 4,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "summary": "red",
      "schedule": "red",
      "entity": "green",
      "editHistory": "red",
      "overview": "green",
      "tables": "amber",
      "diagrams": "red",
      "internalLinks": "amber",
      "externalLinks": "green",
      "footnotes": "amber",
      "references": "amber",
      "quotes": "red",
      "accuracy": "red"
    }
  },
  "recommendedScore": 19.5
}
External Links

No external links

Backlinks (1)
idtitletyperelationship
ai-cyber-damage-bounding-tailAI Cyber Damage: Bounding the Tailanalysisrelated
Longterm Wiki