Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > Hackers Use AI for Exploit Development, Attack Automation

Hackers Use AI for Exploit Development, Attack Automation

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks.

Threat actors are abusing AI tools in increasingly sophisticated ways, including exploit development and attack orchestration.

Google today published new research tracking how adversaries leverage AI in their cyber operations. Since large language model (LLM) tools became widely available, threat actors have leveraged the technology in a wide range of ways, such as crafting phishing lures, coding malware, and conducting reconnaissance. They are also using AI, as Google detailed, for vulnerability research and exploit development. More here

Similar Stories

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity. More...

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...

The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...

Have your say

 

News Categories

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate complex attacks. More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...

Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...

AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech