According to a Bugcrowd hacker survey, 62% use AI to analyze data, 61% use it to automate tasks, and 38% use it to identify vulnerabilities.
7. Independent agents
If a business realizes it is under attack and shuts down Internet access to affected systems, the malware may not be able to connect back to its command and control servers for instructions. “Attackers may want to come up with a smart model that will last even if they can’t control it directly, so they can persist for a long time,” said Kantarcioglu.
Now, these types of private agents are available to anyone, thanks to commercial offerings from Microsoft, and several open platforms that have no safeguards to keep them from being misused. “In the past, an adversary would need human touch points to attack, as most attacks involve multiple steps,” said CMU’s Scanlon. “If they can send agents to do those things, that’s a looming threat – it’s more than looming. It’s one of the things that AI makes real. “
Source link