No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

A Golden Age of AI … or Security Threats?

July 10, 2023
in Protection
0
Brain on a digital background -- AI concept art



Are we in a golden age of artificial intelligence? It’s tough to make predictions — and probably ill-advised. Who wants to predict the future of such a new technology?

We can, however, say some things for certain. A great deal is being made of AI’s application to creative works, from voice acting to first drafts of screenplays. But AI is likely to be most useful when dealing with drudgery. This is good news for developers, if the promise matches early experiments — first drafts of code can be easily created and ready for developers to tweak and iterate upon.

However, it’s important to remember that not every coder is working for a legitimate business. Just as cybersecurity threat actors have emulated their targets in becoming more businesslike, they’re also adopting new technologies and techniques. We can expect AI to help in the development of malware and other threats in the coming years, whether we’re entering a golden age of AI or not.

Drafting Code and Scams

One trend we’ve seen in recent years is a rise of “as-a-service” offerings. Early hackers were tinkerers and mischief-makers, tricking phone systems or causing chaos mostly as an exercise in fun. This has fundamentally changed. Threat actors are professional and often sell their products for others to use.

AI will fit very nicely into this way of working. Able to create code to tackle specific problems, AI can amend code to target vulnerabilities or take existing code and change it, so it’s not so easily detected by security measures looking for specific patterns.

But the possibilities for AI’s misuse doesn’t stop there. Many phishing emails are detected by effective filtering tools and end up in junk folders. Those that do make it to the inbox are often very obviously scams, written so badly they’re borderline incomprehensible. But AI could break this pattern, creating thousands of plausible emails that can evade detection and be well-written enough to fool both filters and end users.

Spear-phishing, the more targeted form of this attack, could also be revolutionized by this tech. Sure, it’s easy to ignore an email from your boss asking you to wire cash or urgently buy gift cards — cybersecurity training helps employees avoid this sort of scam. But what about a deep-fake phone call or video chat? AI has the potential to take broadcast appearances and podcasts and turn them into a convincing simulacrum, something far harder to ignore.

Fighting Back Against AI Cyberattacks

There are two main ways to fight back against the benefits that AI will confer on the enemy — better AI and better training — And both will be necessary.

The advent of this new generation of AI has started a new arms race. As cybercriminals use it to evolve their attacks so will security teams need to use it to evolve their defenses.

Without AI, defenses rely on overworked people and monitoring for certain preprogramed patterns to prevent attacks. AI defensive tools will be able to predict attack vectors and pinpoint sensitive areas of the network and systems. They’ll also be able to analyze malicious code, allowing a better understanding of how new attacks work and how they can be prevented.

AI could also work, in a pinch, as an emergency stop — disabling the network upon detecting a breach and locking down the entire system. While not ideal from a business continuity perspective, this could be far less damaging than a data breach.

But fighting AI with AI is not the only answer. We also need human intelligence. No matter how smart and targeted, the best defense against a phishing attack is an employee or customer who knows what to look for and is suspicious enough not to take the bait. Implementing robust security policies and best-practice cyber hygiene will remain key to defending against attacks.

This means that training will need to be updated to include the signs of an AI attack … whatever those might be. Training will need to evolve with AI — a single training course every few years isn’t going to cut it anymore when that training is quickly out of date.

While the possible signs of an AI-driven cyberattack are changing rapidly, in general, attacks are:

  • Fast and scalable, exploiting multiple vulnerabilities in a short time span.
  • Adaptive and evasive, changing tactics and techniques to avoid detection and response.
  • Targeted and personalized, using AI to craft convincing phishing emails or social engineering campaigns.
  • Deceptive and manipulative, using AI to create fake or altered content such as deepfakes, voice cloning, or text generation.
  • Stealthy and persistent, hiding in the network infrastructure for a long time without being noticed.

These signs aren’t exhaustive, and some AI-driven attacks may not exhibit all of them. However, they indicate the level of threat that AI poses to cybersecurity.

To effectively fight AI-driven cyberattacks, businesses must think beyond individual bad actors and prepare for coordinated attacks by state-sponsored actors or criminal organizations that may use AI to launch sophisticated campaigns using a risk-based approach. They should also have a proactive strategy that includes regular security audits, backups, encryption, and incident response plans. This is most easily accomplished by obtaining a well-known security certification such as PCI-DSS.

Finally, it’s imperative that organizations improve the cybersecurity of their own AI systems by ensuring their integrity, confidentiality, and availability, and by mitigating the risks of adversarial attacks, data poisoning, and model stealing.

These strategies will help protect businesses, but they shouldn’t standalone — security should be collaborative. By collaborating with other organizations, researchers, and authorities to share information, best practices, and failures that can be learned from, businesses will be better prepared for the new wave of AI security threats.

AI is both a new threat and a continuation of older threats. Businesses will have to evolve how they tackle cyber threats as these threats become more sophisticated and more numerous, but a lot of the fundamentals remain the same. Getting these right remains critical. Security teams don’t need to pivot away from old ideas but build on them to keep their businesses safe.

Editorial Team

Editorial Team

Related Posts

This Waterproof JBL Portable Speaker Is on Sale for $40 Right Now
Protection

This Waterproof JBL Portable Speaker Is on Sale for $40 Right Now

May 2, 2026
Amazon Prime Members Can Get Two of These E-Books Free in May 2026
Protection

Amazon Prime Members Can Get Two of These E-Books Free in May 2026

May 1, 2026
Is Apple Intelligence Making Up Words Now?
Protection

Is Apple Intelligence Making Up Words Now?

May 1, 2026
10 Hacks Every Opera Browser User Should Know
Protection

10 Hacks Every Opera Browser User Should Know

May 1, 2026
Hacks Every Google Chat User Should Know
Protection

Hacks Every Google Chat User Should Know

May 1, 2026
This LG 4K Portable Projector Is $200 Off Right Now
Protection

This LG 4K Portable Projector Is $200 Off Right Now

May 1, 2026
Load More
Next Post
Dow Jones Futures: Bulls Want To Run, But Market Faces Resistance; 10 Stocks Near Buy Points

Dow Jones Futures Rise: Can Bulls Break Above Resistance? 10 Stocks To Watch

Popular News

  • AAPL, EL, ROKU, RDDT, RBLX and more

    AAPL, EL, ROKU, RDDT, RBLX and more

    0 shares
    Share 0 Tweet 0
  • Bitcoin ETFs Post Strong April Inflows as Ether Turns Positive

    0 shares
    Share 0 Tweet 0
  • Strait of Hormuz closure strands 8M barrels of Saudi oil daily

    0 shares
    Share 0 Tweet 0
  • RedStone Launches Settlement Layer to Address RWA Liquidity Gap in DeFi Lending

    0 shares
    Share 0 Tweet 0
  • Super Micro Computer names BDO as auditor, files Nasdaq compliance plan

    0 shares
    Share 0 Tweet 0

Latest News

Cointelegraph

Riot Posts $167M in Q1 Revenue as Data Center Arm Pulls in $33M

May 2, 2026
0

Riot Platforms posted $167.2 million in revenue for the first quarter of 2026, with its newly launched data center business...

Washington Hilton attack spotlights hotel industry’s nagging and costly security problem

Washington Hilton attack spotlights hotel industry’s nagging and costly security problem

May 2, 2026
0

Washington Hilton attack spotlights hotel industry’s nagging and costly security problem

‘There is an imbalance of power’: My husband has cancer. Why must we wait two hours for a 10-minute CT scan?

‘There is an imbalance of power’: My husband has cancer. Why must we wait two hours for a 10-minute CT scan?

May 2, 2026
0

“This letter is in memory of all the patients who died waiting for their medical appointments to begin.”

CLARITY Act window slams shut after May 21 - 1

SEC schedules CLARITY Act roundtable in May

May 2, 2026
0

The US Securities and Exchange Commission has scheduled a CLARITY Act roundtable for May, bringing together SEC and CFTC officials...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.