Skip to content

Cybercriminals exploiting artificial intelligence could potentially surpass conventional security measures, according to a warning issued by Check Point.

Cybersecurity experts advise incorporating AI in defensive strategies as cybercriminals are increasingly adopting the technology.

Rising AI-powered cybercrime could surpass conventional defenses, according to a cautious alert by...
Rising AI-powered cybercrime could surpass conventional defenses, according to a cautious alert by Check Point.

Cybercriminals exploiting artificial intelligence could potentially surpass conventional security measures, according to a warning issued by Check Point.

In the ever-evolving digital landscape, cybersecurity remains a top concern for businesses worldwide. A recent report by Check Point Software Technologies, released at the 2025 RSAC Conference in San Francisco, sheds light on the growing trend of hackers using AI to enhance their cyberattacks.

The report reveals that one in 13 generative AI prompts contain potentially sensitive information, posing a significant risk for data breaches. Poor access controls and software management could allow employees to use AI tools without permission, further exacerbating the issue.

One of the key trends in AI-driven cyberattacks is the use of AI-powered malware. This malicious software mutates in real-time, making it difficult to detect and evading traditional security measures. AI-driven attacks can also adapt and bypass traditional defenses, posing significant challenges for cybersecurity systems.

Hackers are also targeting supply chains and IoT devices, exploiting vulnerabilities to launch more sophisticated attacks. The increasing reliance on third-party vendors and IoT devices has expanded the attack surface, providing ample opportunities for hackers.

To counter these threats, businesses and cyber defenders are adopting proactive strategies. AI is being integrated into cybersecurity to enhance threat detection and response. AI-powered systems can analyze vast amounts of data in real-time, using predictive analytics to identify potential threats before they materialize.

Security Orchestration, Automation, and Response (SOAR) tools are also being used to automate the triage, classification, and handling of security events. This reduces manual intervention and response times, allowing for quicker and more effective responses to threats.

Zero trust architectures are gaining traction as traditional perimeter-based security becomes less effective. These architectures validate every request, providing a robust defense against lateral movement in breaches.

Businesses are also focusing on increasing cybersecurity awareness across their organisations to combat threats like phishing and unsecured networks. The report advises businesses to assess AI applications for data protection and industry best practices before adoption.

The report also highlights the popularity of AI tools among hackers. Google Gemini, Microsoft Copilot, and Anthropic Claude are among the tools quickly gaining popularity among cybercriminals. The rise of bespoke hacking-focused AI programs, such as WormGPT and the FunkSec ransomware group's AI-powered DDoS tool, is an important development in the cybercrime ecosystem.

In light of these developments, the report emphasizes the need for businesses to incorporate AI, including Check Point's own anomaly detection platform, into their defensive strategies to counter the accelerating effects of offensive AI. The use of AI in cybercrime is evolving in parallel with mainstream AI adoption and, in many cases, is moving faster than traditional security controls can adapt.

The report concludes by recommending that businesses assess AI applications for data protection and industry best practices before adoption, in light of the risks posed by AI software and tools. The increasing use of AI by hackers underscores the need for businesses to stay vigilant and proactive in their cybersecurity efforts.

  1. The report indicates that the lack of compliance in controlling generative AI usage within organizations could lead to potential data breaches, as one in 13 AI prompts may contain sensitive information.
  2. The surge in AI-powered malware is making cybersecurity a challenge, as these malicious programs evade traditional security measures due to their real-time mutation and ability to adapt and bypass defenses.
  3. In the face of growing AI-driven cyberattacks and the popularity of AI tools among hackers, the report advises businesses to integrate AI into their cybersecurity strategies, such as Check Point's anomaly detection platform, to counter the evolving threats in the digital landscape.

Read also:

    Latest