This year, attackers began using AI in a much more aggressive and systematic way. The threat is real and will continue to grow in 2026. We have already seen realThis year, attackers began using AI in a much more aggressive and systematic way. The threat is real and will continue to grow in 2026. We have already seen real

Fighting AI with AI: A Practical View of the New Cybersecurity Reality

2026/02/10 19:56
5 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

This year, attackers began using AI in a much more aggressive and systematic way. The threat is real and will continue to grow in 2026. We have already seen real breaches where attackers use advanced AI models to automate most of their steps. Moreover, we are seeing malware that can rewrite itself in real time to avoid detection. 

While attackers are advancing their techniques, defenders still have significant constraints when it comes to employing AI in the cybersecurity field. Internal corporate policies must be followed, which include respecting compliance requirements and privacy concerns. Furthermore, agreement and alignment are required across many teams before any new technology can be adapted into regular practice. Attackers face none of these limitations. 

This imbalance is becoming more and more obvious, creating new problems as traditional approaches to security fall behind. Periodic testing is no longer meaningful when attackers are adapting continuously. Detection alone is not enough. 

How Attackers Are Using AI Today 

A clear example of this new threat is the recent Anthropic report where a Chinese state-backed group used the Claude model to automate up to ninety percent of a cyber-espionage operation. While the hackers simply guided it at a high level, the AI handled reconnaissance, vulnerability discovery, exploitation, credential harvesting. The AI broke tasks into smaller pieces, framed them as “legitimate testing”, and bypassed the guardrails. This is the first known case where AI essentially acted as the operator, not just a helper. 

Another example is Google’s PROMPTFLUX case, where malware used an LLM during execution to rewrite its own code to evade detection. This represents a new type of adaptive malware that learns during the attack. 

There are also deep-fake-enabled fraud cases and AI-powered phishing engines like WormGPT and FraudGPT on the dark market. These allow attackers to scale social engineering and credential theft in a way that human security training simply cannot match. 

All these examples show a common point: attackers are not waiting for rules or regulations. They readily adopt the newest AI capabilities, leaving defenders trailing behind.  

Why Defenders Are Falling Behind 

For defenders, everything is slower. Before adopting any AI capabilities, many regulations must be met. Compliance, privacy requirements, risk management concerns, and internal policies must be checked. Customer data must be secured to ensure that no exposure or leaks occur. Moreover, employed AI models must behave in a predictable way. All these concerns are valid, but they also limit speed and efficiency when combatting attackers. 

Environments today depend on too many third-party cloud platforms that are not under direct control. The Salesforce breach and the recent Slack incident are reminders that even if internal controls are strong, the security posture of these external platforms are still exposed. This is very different from when most systems were on-premise. 

There is also the human factor. Employees inside the organization are still the biggest source of security risk, whether intentional or accidental. Even with AI defense tools, a single compromised device or a simple mistake can open a door that attackers can easily exploit with automated tools. 

Traditional detection-focused security simply cannot keep up with this reality. Attackers are moving at AI-powered speed, while defenders are still working with traditional manual processes and reactive thinking.  

The New Direction: Autonomous Security Validation 

To defend against AI-enabled attackers, we need to start using AI differently. The most important direction is autonomous security validation. This means using AI to continuously think like an attacker, simulate real attack paths, and check our environment for weaknesses before attackers find them. 

This is not the same as anomaly detection or running a vulnerability scanner. It is more about adopting the attacker’s mindset and letting AI automatically test our identity systems, cloud configurations, privileges, access paths, collaboration platforms, and other areas of the environment. Instead of waiting for alerts, exposure is discovered proactively.  

Future AI-integrated defense should function continuously, be proactive rather than reactive. 

What Security Leaders Need to Focus On Now 

First, shift the mindset from “are we protected” to “can an attacker break in right now.” That is the starting point for autonomous validation. 

Second, focus on identity and credential hygiene. Almost every AI-supported attack starts with credential theft or privilege escalation. 

Third, improve visibility across all the cloud platforms and collaboration systems your teams depend on. You cannot protect what you cannot see, and these platforms are outside your control. 

Fourth, adopt a zero-trust way of thinking. Assume no user, device, or platform is trustworthy without verification. 

Finally, keep in mind that AI will never completely remove the human factor. Human behavior, mistakes, and internal processes still matter considerably. AI can help, but it cannot compensate for bad hygiene or careless actions. 

What Comes Next 

AI has already changed the balance between attackers and defenders. Unlimited by rules, processes or governance, attackers now have a major advantage in the game. Defenders can catch up, but only if we start using AI not just for detection but for continuous validation, thinking like the attacker, and identifying exposures before they are exploited. 

The future of cybersecurity will depend on how quickly we can move from reactive detection to proactive validation. In short, we have to fight AI with AI. 

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

CME Group to launch options on XRP and SOL futures

CME Group to launch options on XRP and SOL futures

The post CME Group to launch options on XRP and SOL futures appeared on BitcoinEthereumNews.com. CME Group will offer options based on the derivative markets on Solana (SOL) and XRP. The new markets will open on October 13, after regulatory approval.  CME Group will expand its crypto products with options on the futures markets of Solana (SOL) and XRP. The futures market will start on October 13, after regulatory review and approval.  The options will allow the trading of MicroSol, XRP, and MicroXRP futures, with expiry dates available every business day, monthly, and quarterly. The new products will be added to the existing BTC and ETH options markets. ‘The launch of these options contracts builds on the significant growth and increasing liquidity we have seen across our suite of Solana and XRP futures,’ said Giovanni Vicioso, CME Group Global Head of Cryptocurrency Products. The options contracts will have two main sizes, tracking the futures contracts. The new market will be suitable for sophisticated institutional traders, as well as active individual traders. The addition of options markets singles out XRP and SOL as liquid enough to offer the potential to bet on a market direction.  The options on futures arrive a few months after the launch of SOL futures. Both SOL and XRP had peak volumes in August, though XRP activity has slowed down in September. XRP and SOL options to tap both institutions and active traders Crypto options are one of the indicators of market attitudes, with XRP and SOL receiving a new way to gauge sentiment. The contracts will be supported by the Cumberland team.  ‘As one of the biggest liquidity providers in the ecosystem, the Cumberland team is excited to support CME Group’s continued expansion of crypto offerings,’ said Roman Makarov, Head of Cumberland Options Trading at DRW. ‘The launch of options on Solana and XRP futures is the latest example of the…
Share
BitcoinEthereumNews2025/09/18 00:56
Why YouCam AI API is the Secret Weapon for E-Commerce Startups

Why YouCam AI API is the Secret Weapon for E-Commerce Startups

 The New Standard of Personalized Shopping In an era where digital engagement dictates market share, the transition from “browsing” to “buying” depends on confidence
Share
Techbullion2026/03/25 14:34
Resilient Pair Softens Below 111.00 Amidst Prevailing Bullish Momentum

Resilient Pair Softens Below 111.00 Amidst Prevailing Bullish Momentum

The post Resilient Pair Softens Below 111.00 Amidst Prevailing Bullish Momentum appeared on BitcoinEthereumNews.com. AUD/JPY Price Forecast: Resilient Pair Softens
Share
BitcoinEthereumNews2026/03/25 14:01