AI Cyber Damage: Bounding the Tail
ai-cyber-damage-bounding-tailanalysisPath: /knowledge-base/models/ai-cyber-damage-bounding-tail/
E2520Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "ai-cyber-damage-bounding-tail",
"wikiId": "E2520",
"path": "/knowledge-base/models/ai-cyber-damage-bounding-tail/",
"filePath": "knowledge-base/models/ai-cyber-damage-bounding-tail.mdx",
"title": "AI Cyber Damage: Bounding the Tail",
"quality": null,
"readerImportance": null,
"researchImportance": null,
"tacticalValue": null,
"contentFormat": "article",
"causalLevel": null,
"lastUpdated": "2026-05-05",
"dateCreated": "2026-05-04",
"summary": null,
"description": "Probability-weighted synthesis answer to \"How likely is AI-enabled cyber damage to exceed 10% of global GDP by year Y?\" — pulls from damage estimates, insurance market signals, tail-risk catalog, actor incentives, and incident base rates.",
"ratings": null,
"category": "models",
"subcategory": "analysis-models",
"clusters": [
"cyber",
"ai-safety"
],
"metrics": {
"wordCount": 5975,
"tableCount": 12,
"diagramCount": 0,
"internalLinks": 60,
"externalLinks": 34,
"footnoteCount": 24,
"bulletRatio": 0.13,
"sectionCount": 18,
"hasOverview": false,
"structuralScore": 11
},
"suggestedQuality": 73,
"updateFrequency": null,
"evergreen": true,
"wordCount": 5975,
"unconvertedLinks": [
{
"text": "\"Cybersecurity Almanac 2025\"",
"url": "https://cybersecurityventures.com/cybersecurity-almanac-2025/",
"resourceId": "80257f9133e98385",
"resourceTitle": "Cybersecurity Ventures projects"
},
{
"text": "\"Cybercrime To Cost The World \\$12.2 Trillion Annually By 2031\"",
"url": "https://cybersecurityventures.com/official-cybercrime-report-2025/",
"resourceId": "74c5d3685f69baea",
"resourceTitle": "Cybercrime To Cost The World $12.2 Trillion Annually By 2031"
},
{
"text": "\"Measuring the Cost of Cybercrime\"",
"url": "https://cseweb.ucsd.edu/~savage/papers/WEIS2012.pdf",
"resourceId": "26d7fd4e9cdacd01"
},
{
"text": "\"Measuring the Changing Cost of Cybercrime\"",
"url": "https://weis2019.econinfosec.org/wp-content/uploads/sites/6/2019/05/WEIS_2019_paper_25.pdf",
"resourceId": "8e8f6ccd300955d5",
"resourceTitle": "(PDF)"
},
{
"text": "\"Examining the Costs and Causes of Cyber Incidents\"",
"url": "https://academic.oup.com/cybersecurity/article/2/2/121/2525524",
"resourceId": "4d92485f5e3f9076",
"resourceTitle": "Examining the Costs and Causes of Cyber Incidents"
},
{
"text": "\"The Untold Story of NotPetya, the Most Devastating Cyberattack in History\"",
"url": "https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/",
"resourceId": "e440b4ac304165e0",
"resourceTitle": "The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED"
},
{
"text": "\"Lloyd's systemic risk scenario reveals global economy exposed to \\$3.5trn from major cyber attack\"",
"url": "https://www.lloyds.com/insights/media-centre/press-releases/lloyds-systemic-risk-scenario-reveals-global-economy-exposed-to-3.5trn-from-major-cyber-attack",
"resourceId": "4448515b451cdfa2",
"resourceTitle": "Lloyd's Systemic Risk Scenario: Global Economy Exposed to $3.5trn from Major Cyber Attack"
},
{
"text": "\"Impact of AI on cyber threat from now to 2027\"",
"url": "https://www.ncsc.gov.uk/report/impact-ai-cyber-threat-now-2027",
"resourceId": "f6942e01c3eb0174",
"resourceTitle": "Impact of AI on Cyber Threat from Now to 2027 – NCSC Assessment"
},
{
"text": "\"People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection\"",
"url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a",
"resourceId": "b4170ac67eaac201",
"resourceTitle": "PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure | CISA"
},
{
"text": "\"Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security\"",
"url": "https://www.defense.gov/News/Speeches/Speech/Article/606635/",
"resourceId": "092f835a0bcd5180",
"resourceTitle": "U.S. Department of Defense Speech (Article 606635)"
},
{
"text": "\"Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations\"",
"url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a",
"resourceId": "44641f4cd251731b",
"resourceTitle": "CISA Advisory AA20-352A: Advanced Persistent Threat Compromise of Government Agencies via SolarWinds Supply Chain"
},
{
"text": "SEC Form 10-K for fiscal 2020",
"url": "https://www.sec.gov/Archives/edgar/data/1739942/000162828021003796/swi-20201231.htm",
"resourceId": "d9756fdab6d6822b"
},
{
"text": "2024 Form 10-K",
"url": "https://www.unitedhealthgroup.com/content/dam/UHG/PDF/investors/2024/UNH-Q4-2024-Form-10-K.pdf",
"resourceId": "df88cde4ef339524"
},
{
"text": "\"HHS Statement Regarding the Cyberattack on Change Healthcare\"",
"url": "https://www.hhs.gov/about/news/2024/03/05/hhs-statement-regarding-cyberattack-change-healthcare.html",
"resourceId": "0c873606820b1554"
},
{
"text": "\"Helping our customers through the CrowdStrike outage\"",
"url": "https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/",
"resourceId": "da77a02884b55432",
"resourceTitle": "Helping our customers through the CrowdStrike outage - The Official Microsoft Blog"
},
{
"text": "\"CrowdStrike to Cost Fortune 500 \\$5.4B\"",
"url": "https://www.parametrixinsurance.com/in-the-news/crowdstrike-to-cost-fortune-500-5-4-billion-insured-loss-range-of-540-million-to-1-08-billion",
"resourceId": "94a87516e9dc9ba3",
"resourceTitle": "CrowdStrike to Cost Fortune 500 $5.4b; Insured Loss Range of $0.54b - $1.08b"
},
{
"text": "\"Falcon Content Update Preliminary Post Incident Report\"",
"url": "https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/",
"resourceId": "ae544c4fec19cff7",
"resourceTitle": "Falcon Content Update Remediation and Guidance Hub | CrowdStrike"
},
{
"text": "\"Rebooting Growth\"",
"url": "https://www.howdengroup.com/us-en/rebooting-growth-howdens-2025-cyber-insurance-report",
"resourceId": "d12cb04f0eb7308c",
"resourceTitle": "www.howdengroup.com"
},
{
"text": "\"Global Cyber Insurance Market Reaches \\$16.6 Billion in 2024\"",
"url": "https://riskandinsurance.com/global-cyber-insurance-market-reaches-16-6-billion-in-2024/",
"resourceId": "e723d5ae3788c5df",
"resourceTitle": "Global Cyber Insurance Market Reaches $16.6 Billion in 2024 - Risk & Insurance : Risk & Insurance"
},
{
"text": "\"Dealing with Cyber Accumulation Risk\"",
"url": "https://www.munichre.com/en/insights/cyber/dealing-with-cyber-accumulation-risk.html",
"resourceId": "e43fea648dfc578d",
"resourceTitle": "Dealing with cyber accumulation risk | Munich Re"
},
{
"text": "\"Cyber Risk Adjusted Rating (RAR) Index: 2026 update\"",
"url": "https://www.ajg.com/gallagherre/news-and-insights/gallagherre-cyber-risk-adjusted-rating-rar-index-2026-update/",
"resourceId": "a46e8aa4ff8ba7ce",
"resourceTitle": "Gallagher Re Cyber Risk Adjusted Rating (RAR) Index: 2026 update | GallagherRe"
},
{
"text": "\"Cyber Insurance: Risks and Trends 2025\"",
"url": "https://www.munichre.com/en/insights/cyber/cyber-insurance-risks-and-trends-2025.html",
"resourceId": "bda1f1d4700946d3",
"resourceTitle": "Cyber Insurance: Risks and Trends 2025 – Munich Re"
},
{
"text": "\"Beazley secures \\$300m cyber cat bond in Bermuda vehicle\"",
"url": "https://www.royalgazette.com/reinsurance/business/article/20251217/beazley-secures-300m-cyber-cat-bond-in-bermuda-vehicle/",
"resourceId": "f68fb2d4edd22ee1",
"resourceTitle": "Beazley secures $300m cyber cat bond in Bermuda vehicle - The Royal Gazette | Bermuda News, Business, Sports, Events, & Community |"
},
{
"text": "\"Catastrophe bond market records that were broken in 2025\"",
"url": "https://www.artemis.bm/news/catastrophe-bond-market-records-that-were-broken-in-2025/",
"resourceId": "0839466e138e4f18",
"resourceTitle": "Catastrophe bond market records that were broken in 2025 - Artemis.bm"
},
{
"text": "\"The Impact of AI on the Cyber Offense-Defense Balance and the Character of Cyber Conflict\"",
"url": "https://arxiv.org/abs/2504.13371",
"resourceId": "c947e471941dded3",
"resourceTitle": "[2504.13371] The Impact of AI on the Cyber Offense-Defense Balance and the Character of Cyber Conflict"
},
{
"text": "\"Anticipating AI's Impact on the Cyber Offense-Defense Balance\"",
"url": "https://cset.georgetown.edu/publication/anticipating-ais-impact-on-the-cyber-offense-defense-balance/",
"resourceId": "ced517a1cfe84c8b",
"resourceTitle": "Anticipating AI's Impact"
},
{
"text": "\"Tipping the Scales: Emerging AI Capabilities and the Cyber Offense-Defense Balance\"",
"url": "https://www.cnas.org/press/press-release/new-cnas-report-examines-how-emerging-ai-capabilities-could-disrupt-the-cyber-offense-defense-balance",
"resourceId": "187d75d58e1185d3",
"resourceTitle": "Tipping the Scales: How Emerging AI Capabilities Could Disrupt the Cyber Offense-Defense Balance"
},
{
"text": "\"Uplifted Attackers, Human Defenders: The Cyber Offense-Defense Balance for Trailing-Edge Organizations\"",
"url": "https://arxiv.org/html/2508.15808",
"resourceId": "6ea4eaed7244fb9a",
"resourceTitle": "Uplifted Attackers, Human Defenders: The Cyber Offense-Defense Balance for Trailing-Edge Organizations"
},
{
"text": "\"Strengthening cyber resilience as AI capabilities advance\"",
"url": "https://openai.com/index/strengthening-cyber-resilience/",
"resourceId": "e550a2466989b110",
"resourceTitle": "Strengthening Cyber Resilience as AI Capabilities Advance"
},
{
"text": "\"Disrupting the first reported AI-orchestrated cyber espionage campaign\"",
"url": "https://www.anthropic.com/news/disrupting-AI-espionage",
"resourceId": "4ba107b71a0707f9",
"resourceTitle": "first documented AI-orchestrated cyberattack"
},
{
"text": "\"GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools\"",
"url": "https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools",
"resourceId": "f5c89038a1d5f7ce",
"resourceTitle": "GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools"
},
{
"text": "\"LLM Agents can Autonomously Hack Websites\"",
"url": "https://arxiv.org/abs/2402.06664",
"resourceId": "1ff0ee673e2c63c1",
"resourceTitle": "[2402.06664] LLM Agents can Autonomously Hack Websites"
},
{
"text": "\"LLM Agents can Autonomously Exploit One-day Vulnerabilities\"",
"url": "https://arxiv.org/abs/2404.08144",
"resourceId": "6c39d224a4a74a56",
"resourceTitle": "[2404.08144] LLM Agents can Autonomously Exploit One-day Vulnerabilities"
},
{
"text": "\"Teams of LLM Agents can Exploit Zero-Day Vulnerabilities\"",
"url": "https://arxiv.org/abs/2406.01637",
"resourceId": "9daf5081c60538c2",
"resourceTitle": "[2406.01637] Teams of LLM Agents can Exploit Zero-Day Vulnerabilities"
}
],
"unconvertedLinkCount": 34,
"convertedLinkCount": 46,
"backlinkCount": 0,
"hallucinationRisk": {
"level": "low",
"score": 30,
"factors": [
"moderately-cited"
]
},
"entityType": "analysis",
"redundancy": {
"maxSimilarity": 18,
"similarPages": [
{
"id": "catastrophic-cyber-tail-risk",
"title": "Catastrophic Cyber Tail Risk",
"path": "/knowledge-base/risks/catastrophic-cyber-tail-risk/",
"similarity": 18
},
{
"id": "cyberweapons",
"title": "Cyberweapons",
"path": "/knowledge-base/risks/cyberweapons/",
"similarity": 17
},
{
"id": "ai-cyber-damage-estimates",
"title": "AI Cyber Damage Estimates",
"path": "/knowledge-base/models/ai-cyber-damage-estimates/",
"similarity": 15
},
{
"id": "fraud-sophistication-curve",
"title": "Fraud Sophistication Curve Model",
"path": "/knowledge-base/models/fraud-sophistication-curve/",
"similarity": 15
},
{
"id": "cyber-offense",
"title": "Cyber Offense",
"path": "/knowledge-base/risks/cyber-offense/",
"similarity": 15
}
]
},
"coverage": {
"passing": 5,
"total": 13,
"targets": {
"tables": 24,
"diagrams": 2,
"internalLinks": 48,
"externalLinks": 30,
"footnotes": 18,
"references": 18
},
"actuals": {
"tables": 12,
"diagrams": 0,
"internalLinks": 60,
"externalLinks": 34,
"footnotes": 24,
"references": 38,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"summary": "red",
"schedule": "red",
"entity": "green",
"editHistory": "red",
"overview": "red",
"tables": "amber",
"diagrams": "red",
"internalLinks": "green",
"externalLinks": "green",
"footnotes": "green",
"references": "green",
"quotes": "red",
"accuracy": "red"
}
},
"recommendedScore": 19.87
}External Links
No external links
Backlinks (0)
No backlinks