By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: The role of AI in cyberattacks is unstoppable
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > The role of AI in cyberattacks is unstoppable
Mobile

The role of AI in cyberattacks is unstoppable

News Room
Last updated: 2026/03/10 at 8:58 AM
News Room Published 10 March 2026
Share
The role of AI in cyberattacks is unstoppable
SHARE

Artificial intelligence has infiltrated so many areas that it should not be surprising that it is also used for perverse uses. One of these ‘dark sides of AI’ It is located in cybersecurity. And of particular concern is the role of AI in cyberattacks, which allows increasingly advanced and cheap malicious campaigns, extending them to groups that until now did not have technical capacity.

The latest alert about the use of AI in cyberattacks comes from Microsoft Threat Intelligence, the security division of the software giant. Just as AI is used to speed up coding, writing, design and many other tasks, cybercriminals also use it to simplify their developments and increase their reach and danger.

AI in cyber attacks, increasing potential

Microsoft explains that “Threat actors have incorporated automation into their strategies, as reliable and cost-effective AI-based services reduce technical barriers and integrate capabilities directly into their workflows. “These capabilities reduce friction in reconnaissance, social engineering, malware development, and post-breach activity, allowing cybercriminals to act faster and refine their operations.”.

The example is given of ‘Jasper Sleet’, a malicious development that Leverage AI throughout the attack lifecycle to recruit staff, maintain their position, and abuse access on a large scale. The use of AI is so widespread that Microsoft says it is seen at all levels of cyberattacks:

“As malware authors integrate AI into their operations, they are not limited to intended or policy-compliant uses of these systems. Microsoft Threat Intelligence has observed that threat actors are actively experimenting with techniques to bypass or unlock AI security controls and obtain results that would otherwise be restricted. These strategies include reframing prompts, chaining instructions across multiple interactions, and misusing system or developer prompts to force models to generate malicious content..

An example of this would be the use of jailbreak techniques based on roles to bypass AI security controls. In these types of scenarios, developers could prompt models to assume trusted roles or assert that the threat actor operates in such a role, establishing a shared context of legitimacy.

AI is also used to support cyber attack infrastructure, such as automatic generation of websites and domains:

“Cybercriminals have leveraged generative adversarial network (GAN)-based techniques to automate the creation of domain names that closely resemble legitimate brands and services. By training models with large data sets from real domains, the generator learns common structural and lexical patterns, while a discriminator evaluates whether the results appear authentic. Through iterative refinement, this process produces compelling imitation domains, increasingly difficult to distinguish from legitimate infrastructure using static or pattern-based detection methods. This enables rapid creation and rotation of large-scale phishing domains, facilitating phishing, C2, and credential harvesting operations..

Microsoft also warns of emerging trends such as AI-enabled malware what “integrate or invoke models during execution instead of using AI only during development”. The Microsoft division also issues advice to mitigate these types of attacks. And they talk about mitigation because its elimination seems impossible. As the capabilities of artificial intelligence (especially generative) increase, so does its potential to create and distribute malware.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Intel Preps Linux For Directed Package Thermal Interrupts Intel Preps Linux For Directed Package Thermal Interrupts
Next Article What’s The Average Lifespan Of AA Batteries? Here’s How Long They Last In Storage – BGR What’s The Average Lifespan Of AA Batteries? Here’s How Long They Last In Storage – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to Improve Your Debounce and Get It to Stop Lying to You | HackerNoon
How to Improve Your Debounce and Get It to Stop Lying to You | HackerNoon
Computing
T-Mobile closes popular  fee loophole when purchasing through Apple
T-Mobile closes popular $35 fee loophole when purchasing through Apple
News
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
Computing
Bluesky announces AI app, Attie, for custom feeds
Bluesky announces AI app, Attie, for custom feeds
Software

You Might also Like

How the TUR rate continues to be the great refuge for consumers
Mobile

How the TUR rate continues to be the great refuge for consumers

7 Min Read
everything we know to date (information, announcements, release date, characters, etc.)
Mobile

everything we know to date (information, announcements, release date, characters, etc.)

7 Min Read
Mistral is financed to build its AI centers in Europe
Mobile

Mistral is financed to build its AI centers in Europe

3 Min Read
Managers’ concern about data outages outweighs fear of economic downturn
Mobile

Managers’ concern about data outages outweighs fear of economic downturn

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?