Cyber security experts warn that AIGes are on the verge of becoming a powerful tool for broader cyber attacks. These factors are capable of performing complex tasks such as timing or online shopping, but these abilities can serve cyber attackers.
Artificial ielligence, which is capable of doing things like planning, reasoning, and performing complex tasks, will soon become a major threat to cyber security. Researchers have warned that these factors quickly ideify vulnerable targets, hack systems and steal valuable data.
The Role of Artificial Ielligence Factors in changing the vision of cyber attacks
To date, cybercriminals have not used these factors extensively, but studies such as Ahropic’s study have shown that artificial ielligence age can simulate and execute attacks. According to experts, the use of these technologies is happening in the real world sooner or later.

“I think we will eveually live in the world where most cyber attacks are carried out by artificial ielligence,” says Mark Stecley of Malwarebytes.
In response to this threat, the Palisade Research Organization has created a system called “LLM Age Honeypot”; Vulnerable servers designed in the role of prey to ideify hacker ages. The purpose of this project is to ideify the attacks in the early stages and prepare defense solutions.
These factors are much more advanced than the curre simple robots. They can check the infiltration paths and not be ideified. From the 2024 (October to November 1403) and the start of Honeypot, more than 11 million efforts have been registered to eer the system, of which 8 were likely to be artificial ielligence ages, and 2 of them were definitely artificial ielligence.

Experts warn that attacking artificial ielligence agencies can quickly reach a stage that automatically conducts the attack without human ierveion. This feature greatly increases the scalability of attacks such as ransomware.
Meanwhile, research projects such as what the University of Illinois have done, show that artificial ielligence, without prior knowledge, can successfully discover and operate up to 13 % of vulnerabilities. This number increases to 25 % by providing brief explanations.




