BBS:      TELESC.NET.BR
Assunto:  AI powers innovation  but
De:       Mike Powell
Data:     Fri, 6 Mar 2026 11:47:53 -0500
-----------------------------------------------------------
AI powers innovation  but its also powering the next wave of cyber attacks

Date:
Thu, 05 Mar 2026 14:29:04 +0000

Description:
With AI enabling fully automated cyber attacks, cyber resiliency has emerged
as a critical strategy.

FULL STORY

According to the National Cyber Security Centre (NCSC), the UK is 
experiencing four 'nationally significant' cybersecurity attacks every week. 

A record 204 nationally significant attacks were handled by the NCSC in the
year to September, up from 89 in the previous 12 months.

This growth is alarming, and while many 
of these attacks would have been incited by social engineering/phishing
campaigns targeted at humans, the concerning prospect for the future is that
advancement of AI will enable bad actors to fully automate cyber attacks, 
with no human involvement required, at an unprecedented speed and scale.


AI as a weapon and vibe hacking

In summer 2025,
Anthropic, the company behind the Claude family of large language models
(LLMs), reported that agentic AI had become "weaponized to perform
cyber-attacks and is now embedded into cyber criminality. 

Dubbed vibe hacking, attackers are using LLMs and other AI tools to automate
and scale cyberattacks. Automated phishing, adaptive malware, and 
AI-generated ransomware are becoming mainstream. 

Anthropics warnings have been echoed by the UKs National Cyber Security
Centre, which says AI will make elements of cyber intrusion more effective 
and efficient and that there will be an increase in frequency and intensity 
of cyber threats. 

On top of that it predicts there will be a digital divide between
organizations whose systems keep pace with AI-enabled threats, and those that
will be more vulnerable.

In the wake of the emerging and inevitable AI threat landscape, what can
organizations do? 

The reality is that as AI accelerates the sophistication, scale, and
automation of cyberattacks, traditional cybersecurity tools - focused only on
prevention and detection - are no longer enough. 

This means that organizations must not only plan to prevent an attack, but
also how to recover from one, quickly and safely. This leads us to cyber
resiliency.

Cyber resilience emerges as a critical strategy

The concept of cyber resilience integrates the traditional
prevention and detection of attacks with lightning fast recovery. It is based
on a comprehensive approach that includes built-in security at the data
storage level, connected threat detection and dynamic response and recovery. 

Given the breadth of capabilities required to deliver holistic cyber
resilience it is ideally delivered through an ecosystem of best of breed
vendors backed by integrated products and tested architectures. A secure data
platform Ensuring that the foundation of the data environment has a strong
security posture is essential in preventing an attack or minimizing the 
attack surface. 

Timely remediation of vulnerabilities, multi-factor authentication , simple
and efficient snapshots of data that are comprehensively protected - both
immutable and indelible - all contribute to a secure foundation providing
confidence that a recovery point is available. 

Being able to run the platform with automated configuration, managed by 
policy and with effective compliance checking to avoid human error that
compromises the integrity of the data. Connected threat detection
Understanding the broad technology landscape is essential; separating signal
from noise to quickly identify malicious activity is the domain of extended
detection and response (XDR), security and information event management 
(SIEM) and security orchestration automation and response (SOAR) solutions. 

Ensuring that the underlying storage platform integrates with these platforms
is key in providing insight and correlation with the rest of the connected
environment. Feeding telemetry from the storage environment into these
platforms gives them the ability to automatically trigger and tag snapshots 
if anomalies are identified.

Dynamic response and recovery

Should the worst
happen and an attack succeed in disrupting the IT environment a Secure
Isolated Recovery Environment (SIRE) is an essential part of the recovery
process. 

Having a data set that is beyond the reach of attackers, disconnected from 
the rest of the estate, provides an environment for forensics, cleaning and
recovery of the affected environment for a businesses most critical services. 

Time is valuable in this process so the ability to restore and analyze 
quickly with a highly performant storage platform is key to the success in
restoring the business. The recovery environment will typically support
multiple layers of capability aligned with the criticality of different
business services to meet the restoration targets. Dont be caught on the 
wrong side of the digital divide The accelerated speed of cyber threats means
that the time to respond is shrinking rapidly. Organizations need to be able
to recover in hours instead of days or weeks if the worst happens. 

We face a digital divide between those organizations that possess effective
cyber resilience as a strategic differentiator and those that dont. As recent
hacks have shown, consequences of an ineffective strategy include significant
financial losses, reputational damage, and downtime. 

Dont get caught on the wrong side of the digital divide. A good first step
towards developing cyber resilience is to focus on deploying an 
interconnected ecosystem to deliver a secure data platform, connected threat
detection and dynamic response and recovery.

This article was produced as part of TechRadarPro's
Expert Insights channel where we feature the best and brightest minds in the
technology industry today. The views expressed here are those of the author
and are not necessarily those of TechRadarPro or Future plc. If you are
interested in contributing find out more here:
https://www.techradar.com/news/submit-your-story-to-techradar-pro

======================================================================
Link to news story:
https://www.techradar.com/pro/ai-powers-innovation-but-its-also-powering-the-n
ext-wave-of-cyber-attacks

$$
--- SBBSecho 3.28-Linux
 * Origin: Capitol City Online (1:2320/105)

-----------------------------------------------------------
[Voltar]