From zero-day exploits to autonomous malware, state-sponsored and criminal actors increasingly use AI for vulnerability discovery, evasion, and operations.GTIG AI Threat Tracker: Adversaries Weaponize AI for Cyber Attacks
Google Threat Intelligence Group's latest report reveals how adversaries exploit AI for vulnerability discovery, obfuscation, autonomous malware (PROMPTSPY), information operations, and supply chain attacks. Includes first identification of an AI-developed zero-day exploit.