• AI powers innovation but

    From Mike Powell@1:2320/105 to All on Fri Mar 6 11:47:53 2026
    AI powers innovation but its also powering the next wave of cyber attacks

    Date:
    Thu, 05 Mar 2026 14:29:04 +0000

    Description:
    With AI enabling fully automated cyber attacks, cyber resiliency has emerged
    as a critical strategy.

    FULL STORY

    According to the National Cyber Security Centre (NCSC), the UK is
    experiencing four 'nationally significant' cybersecurity attacks every week.

    A record 204 nationally significant attacks were handled by the NCSC in the year to September, up from 89 in the previous 12 months.

    This growth is alarming, and while many
    of these attacks would have been incited by social engineering/phishing campaigns targeted at humans, the concerning prospect for the future is that advancement of AI will enable bad actors to fully automate cyber attacks,
    with no human involvement required, at an unprecedented speed and scale.


    AI as a weapon and vibe hacking

    In summer 2025,
    Anthropic, the company behind the Claude family of large language models (LLMs), reported that agentic AI had become "weaponized to perform cyber-attacks and is now embedded into cyber criminality.

    Dubbed vibe hacking, attackers are using LLMs and other AI tools to automate and scale cyberattacks. Automated phishing, adaptive malware, and
    AI-generated ransomware are becoming mainstream.

    Anthropics warnings have been echoed by the UKs National Cyber Security
    Centre, which says AI will make elements of cyber intrusion more effective
    and efficient and that there will be an increase in frequency and intensity
    of cyber threats.

    On top of that it predicts there will be a digital divide between
    organizations whose systems keep pace with AI-enabled threats, and those that will be more vulnerable.

    In the wake of the emerging and inevitable AI threat landscape, what can organizations do?

    The reality is that as AI accelerates the sophistication, scale, and
    automation of cyberattacks, traditional cybersecurity tools - focused only on prevention and detection - are no longer enough.

    This means that organizations must not only plan to prevent an attack, but
    also how to recover from one, quickly and safely. This leads us to cyber resiliency.

    Cyber resilience emerges as a critical strategy

    The concept of cyber resilience integrates the traditional
    prevention and detection of attacks with lightning fast recovery. It is based on a comprehensive approach that includes built-in security at the data
    storage level, connected threat detection and dynamic response and recovery.

    Given the breadth of capabilities required to deliver holistic cyber
    resilience it is ideally delivered through an ecosystem of best of breed vendors backed by integrated products and tested architectures. A secure data platform Ensuring that the foundation of the data environment has a strong security posture is essential in preventing an attack or minimizing the
    attack surface.

    Timely remediation of vulnerabilities, multi-factor authentication , simple
    and efficient snapshots of data that are comprehensively protected - both immutable and indelible - all contribute to a secure foundation providing confidence that a recovery point is available.

    Being able to run the platform with automated configuration, managed by
    policy and with effective compliance checking to avoid human error that compromises the integrity of the data. Connected threat detection
    Understanding the broad technology landscape is essential; separating signal from noise to quickly identify malicious activity is the domain of extended detection and response (XDR), security and information event management
    (SIEM) and security orchestration automation and response (SOAR) solutions.

    Ensuring that the underlying storage platform integrates with these platforms is key in providing insight and correlation with the rest of the connected environment. Feeding telemetry from the storage environment into these platforms gives them the ability to automatically trigger and tag snapshots
    if anomalies are identified.

    Dynamic response and recovery

    Should the worst
    happen and an attack succeed in disrupting the IT environment a Secure
    Isolated Recovery Environment (SIRE) is an essential part of the recovery process.

    Having a data set that is beyond the reach of attackers, disconnected from
    the rest of the estate, provides an environment for forensics, cleaning and recovery of the affected environment for a businesses most critical services.

    Time is valuable in this process so the ability to restore and analyze
    quickly with a highly performant storage platform is key to the success in restoring the business. The recovery environment will typically support multiple layers of capability aligned with the criticality of different business services to meet the restoration targets. Dont be caught on the
    wrong side of the digital divide The accelerated speed of cyber threats means that the time to respond is shrinking rapidly. Organizations need to be able
    to recover in hours instead of days or weeks if the worst happens.

    We face a digital divide between those organizations that possess effective cyber resilience as a strategic differentiator and those that dont. As recent hacks have shown, consequences of an ineffective strategy include significant financial losses, reputational damage, and downtime.

    Dont get caught on the wrong side of the digital divide. A good first step towards developing cyber resilience is to focus on deploying an
    interconnected ecosystem to deliver a secure data platform, connected threat detection and dynamic response and recovery.

    This article was produced as part of TechRadarPro's
    Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author
    and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

    ======================================================================
    Link to news story: https://www.techradar.com/pro/ai-powers-innovation-but-its-also-powering-the-n ext-wave-of-cyber-attacks

    $$
    --- SBBSecho 3.28-Linux
    * Origin: Capitol City Online (1:2320/105)