3 Comments
User's avatar
shoaru's avatar

"The attacker built the opening stages of the intrusion inside the AI system instead of inside the target company."

I'm confused by this statement. The implication I got was defenders are now blind to the historical opening stages of attack because of this. But isn't the AI system just being used to facilitate "opening stages" of the attack on the target company?

Suhrab Khan's avatar

Powerful summary! Captures the shift from human-paced defense to machine-speed AI attacks and the urgent need for capability parity, legal clarity, and proactive governance.

I talk about the latest AI trends and insights. If you’re interested in understanding how AI is reshaping cybersecurity and the urgent need for AI-powered defense tools, check out my Substack. I’m sure you’ll find it very relevant and relatable.

Teri Radichel's avatar

Should use AWS. They offer DeepSeek but they make a copy of the model so your data does not get back to the original model and numerous security guardrails that do not exist on other platforms.