By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Google’s threat intel chief explains why AI is now both the weapon and the target
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Software > Google’s threat intel chief explains why AI is now both the weapon and the target
Software

Google’s threat intel chief explains why AI is now both the weapon and the target

News Room
Last updated: 2026/02/19 at 8:57 AM
News Room Published 19 February 2026
Share
Google’s threat intel chief explains why AI is now both the weapon and the target
SHARE

Generative AI has rapidly become core infrastructure, embedded across enterprise software, cloud platforms, and internal workflows. But that shift is also forcing a structural rethink of cybersecurity. The same systems driving productivity and growth are emerging as points of vulnerability.

Google Cloud’s latest AI Threat Tracker report suggests the tech industry has entered a new phase of cyber risk, one in which AI systems themselves are high-value targets. Researchers from Google DeepMind and the Google Threat Intelligence Group have identified a steady rise in model extraction, or “distillation,” attacks, in which actors repeatedly prompt generative AI systems in an attempt to copy their proprietary capabilities.

In some cases, attackers flood models with carefully designed prompts to force them to reveal how they think and make decisions. Unlike traditional cyberattacks that involve breaching networks, many of these efforts rely on legitimate access, making them harder to detect and shifting cybersecurity toward protecting intellectual property rather than perimeter defenses.

Researchers say model extraction could allow competitors, state actors, or academic groups to replicate valuable AI capabilities without triggering breach alerts. For companies building large language models, the competitive moat now extends to the proprietary logic inside the models themselves.

The report also found that state-backed and financially motivated actors from China, Iran, North Korea, and Russia are using AI across the attack cycle. Threat groups are deploying generative models to improve malware, research targets, mimic internal communications, and craft more convincing phishing messages. Some are experimenting with AI agents to assist with vulnerability discovery, code review, and multi-step attacks.

John Hultquist, chief analyst at Google Threat Intelligence Group, says the implications extend beyond traditional breach scenarios. Foundation models represent billions in projected enterprise value, and distillation attacks could allow adversaries to copy key capabilities without breaking into systems. The result, he argues, is an emerging cyber arms race, with attackers using AI to operate at machine speed while defenders race to deploy AI that can identify and respond to threats in real time.

Hultquist, a former US Army intelligence specialist who helped expose the Russian threat actor known as Sandworm and now teaches at Johns Hopkins University, tells Fast Company how AI has become both a weapon and a target, and what cybersecurity looks like in a machine-versus-machine future.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article DevOps Modernization: AI Agents, Intelligent Observability and Automation DevOps Modernization: AI Agents, Intelligent Observability and Automation
Next Article Everything You Missed At Social Media Week 2024 Everything You Missed At Social Media Week 2024
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Rivian Introduces Apple Watch App
Rivian Introduces Apple Watch App
News
GPU Infrastructure Is Becoming an Asset Class — Here’s Why Crypto Investors Are Paying Attention | HackerNoon
GPU Infrastructure Is Becoming an Asset Class — Here’s Why Crypto Investors Are Paying Attention | HackerNoon
Computing
The Best of KBIS 2026: Hidden Cooktops, Ice Makers and More Industry Firsts
The Best of KBIS 2026: Hidden Cooktops, Ice Makers and More Industry Firsts
News
The 10 best new tips for iOS 26.3, iPadOS 26.3 and macOS 26.3 | Stuff
The 10 best new tips for iOS 26.3, iPadOS 26.3 and macOS 26.3 | Stuff
Gadget

You Might also Like

Meta might launch a smartwatch this year
Software

Meta might launch a smartwatch this year

2 Min Read
The rise of AI is making the future of work look bleak – but it could be an opportunity
Software

The rise of AI is making the future of work look bleak – but it could be an opportunity

8 Min Read
Why one of tech’s top fund managers just abandoned software stocks
Software

Why one of tech’s top fund managers just abandoned software stocks

5 Min Read

Inside the Birthplace of Your Favorite Technology

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?