Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Microsoft Limits IE Mode in Edge After Chakra Zero-Day Exercise Detected

    October 15, 2025

    A Quarter of the CDC Is Gone

    October 15, 2025

    The #1 Podcast To Make You A Higher Chief In 2024

    October 15, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Autonomous AI hacking and the way forward for cybersecurity
    AI Ethics & Regulation

    Autonomous AI hacking and the way forward for cybersecurity

    Declan MurphyBy Declan MurphyOctober 8, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Autonomous AI hacking and the way forward for cybersecurity
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link



    AI brokers at the moment are hacking computer systems. They’re getting higher in any respect phases of cyberattacks, quicker than most of us anticipated. They will chain collectively totally different features of a cyber operation, and hack autonomously, at laptop speeds and scale. That is going to alter all the things.

    Over the summer time, hackers proved the idea, business institutionalized it, and criminals operationalized it. In June, AI firm XBOW took the prime spot on HackerOne’s US leaderboard after submitting over 1,000 new vulnerabilities in only a few months. In August, the seven groups competing in DARPA’s AI Cyber Problem collectively discovered 54 new vulnerabilities in a goal system, in 4 hours (of compute). Additionally in August, Google introduced that its Massive Sleep AI discovered dozens of recent vulnerabilities in open-source tasks.

    It will get worse. In July Ukraine’s CERT found a chunk of Russian malware that used an LLM to automate the cyberattack course of, producing each system reconnaissance and information theft instructions in real-time. In August, Anthropic reported that they disrupted a risk actor that used Claude, Anthropic’s AI mannequin, to automate the complete cyberattack course of. It was a formidable use of the AI, which carried out community reconnaissance, penetrated networks, and harvested victims’ credentials. The AI was in a position to determine which information to steal, how a lot cash to extort out of the victims, and how one can finest write extortion emails.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Microsoft Limits IE Mode in Edge After Chakra Zero-Day Exercise Detected

    October 15, 2025

    Chinese language Hackers Exploit ArcGIS Server as Backdoor for Over a 12 months

    October 14, 2025

    Prison IP to Showcase ASM and CTI Improvements at GovWare 2025 in Singapore

    October 14, 2025
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Microsoft Limits IE Mode in Edge After Chakra Zero-Day Exercise Detected

    By Declan MurphyOctober 15, 2025

    Microsoft has shortly modified a characteristic in its Edge internet browser after getting “credible reviews”…

    A Quarter of the CDC Is Gone

    October 15, 2025

    The #1 Podcast To Make You A Higher Chief In 2024

    October 15, 2025

    Enlightenment – O’Reilly

    October 15, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.