
Photo credit: www.csoonline.com
A recent survey by Bugcrowd reveals a growing trend among hackers, showing that 62% utilize artificial intelligence for data analysis, 61% for task automation, and 38% for detecting vulnerabilities.
7. Autonomous agents
In scenarios where an enterprise faces a cyberattack, immediate action such as disconnecting affected systems from the internet can hinder malware from accessing its command-and-control servers to receive further instructions. Kantarcioglu points out that attackers are likely to develop sophisticated models capable of maintaining a presence even in the absence of direct control. This enables longer persistence within the compromised systems.
The availability of autonomous agents has expanded significantly, with commercial solutions from companies like Microsoft, along with various open-source platforms lacking sufficient safeguards against malicious use. Scanlon from CMU notes that historically, adversaries relied on human involvement for executing attacks, which typically required multiple steps. However, the ability to deploy autonomous agents to handle these tasks represents a substantial threat, underscoring that this capability facilitated by AI has transitioned from potential to reality.
Source
www.csoonline.com