By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: The role of AI in cyberattacks is unstoppable
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > The role of AI in cyberattacks is unstoppable
Mobile

The role of AI in cyberattacks is unstoppable

News Room
Last updated: 2026/03/10 at 8:58 AM
News Room Published 10 March 2026
Share
The role of AI in cyberattacks is unstoppable
SHARE

Artificial intelligence has infiltrated so many areas that it should not be surprising that it is also used for perverse uses. One of these ‘dark sides of AI’ It is located in cybersecurity. And of particular concern is the role of AI in cyberattacks, which allows increasingly advanced and cheap malicious campaigns, extending them to groups that until now did not have technical capacity.

The latest alert about the use of AI in cyberattacks comes from Microsoft Threat Intelligence, the security division of the software giant. Just as AI is used to speed up coding, writing, design and many other tasks, cybercriminals also use it to simplify their developments and increase their reach and danger.

AI in cyber attacks, increasing potential

Microsoft explains that “Threat actors have incorporated automation into their strategies, as reliable and cost-effective AI-based services reduce technical barriers and integrate capabilities directly into their workflows. “These capabilities reduce friction in reconnaissance, social engineering, malware development, and post-breach activity, allowing cybercriminals to act faster and refine their operations.”.

The example is given of ‘Jasper Sleet’, a malicious development that Leverage AI throughout the attack lifecycle to recruit staff, maintain their position, and abuse access on a large scale. The use of AI is so widespread that Microsoft says it is seen at all levels of cyberattacks:

“As malware authors integrate AI into their operations, they are not limited to intended or policy-compliant uses of these systems. Microsoft Threat Intelligence has observed that threat actors are actively experimenting with techniques to bypass or unlock AI security controls and obtain results that would otherwise be restricted. These strategies include reframing prompts, chaining instructions across multiple interactions, and misusing system or developer prompts to force models to generate malicious content..

An example of this would be the use of jailbreak techniques based on roles to bypass AI security controls. In these types of scenarios, developers could prompt models to assume trusted roles or assert that the threat actor operates in such a role, establishing a shared context of legitimacy.

AI is also used to support cyber attack infrastructure, such as automatic generation of websites and domains:

“Cybercriminals have leveraged generative adversarial network (GAN)-based techniques to automate the creation of domain names that closely resemble legitimate brands and services. By training models with large data sets from real domains, the generator learns common structural and lexical patterns, while a discriminator evaluates whether the results appear authentic. Through iterative refinement, this process produces compelling imitation domains, increasingly difficult to distinguish from legitimate infrastructure using static or pattern-based detection methods. This enables rapid creation and rotation of large-scale phishing domains, facilitating phishing, C2, and credential harvesting operations..

Microsoft also warns of emerging trends such as AI-enabled malware what “integrate or invoke models during execution instead of using AI only during development”. The Microsoft division also issues advice to mitigate these types of attacks. And they talk about mitigation because its elimination seems impossible. As the capabilities of artificial intelligence (especially generative) increase, so does its potential to create and distribute malware.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Intel Preps Linux For Directed Package Thermal Interrupts Intel Preps Linux For Directed Package Thermal Interrupts
Next Article What’s The Average Lifespan Of AA Batteries? Here’s How Long They Last In Storage – BGR What’s The Average Lifespan Of AA Batteries? Here’s How Long They Last In Storage – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Best Digital Audio Workstations (DAWs) We’ve Tested for 2026
The Best Digital Audio Workstations (DAWs) We’ve Tested for 2026
News
Microsoft’s return-to-office policy creates a return to slower commutes, traffic analysis shows
Microsoft’s return-to-office policy creates a return to slower commutes, traffic analysis shows
Computing
ChatGPT now offers interactive visuals for math, science learning
ChatGPT now offers interactive visuals for math, science learning
News
MacBook Neo Will Have Day One Software Update
MacBook Neo Will Have Day One Software Update
News

You Might also Like

Half of the companies that have laid off staff due to AI will hire them again in 2027
Mobile

Half of the companies that have laid off staff due to AI will hire them again in 2027

3 Min Read
Antwerp is the great gateway for cocaine in Europe. Now Belgium risks becoming a “narco-state”
Mobile

Antwerp is the great gateway for cocaine in Europe. Now Belgium risks becoming a “narco-state”

8 Min Read
Schwarzenegger working on the return of Conan the Barbarian
Mobile

Schwarzenegger working on the return of Conan the Barbarian

4 Min Read
MSI en el Embedded World 2026: Edge AI Computing
Mobile

MSI en el Embedded World 2026: Edge AI Computing

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?