Close Menu

    Stay Ahead with Exclusive Updates!

    Enter your email below and be the first to know what’s happening in the ever-evolving world of technology!

    What's Hot

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    April 16, 2026

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter)
    PhronewsPhronews
    • Home
    • Big Tech & Startups

      The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

      April 15, 2026

      The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

      April 14, 2026

      Silicon Sovereignty: Microsoft’s $10B Play to Secure Japan’s AI Future

      April 14, 2026

      The Rule-Breaker: Why DeepSeek V4 is China’s Defiant Bid for AI Supremacy

      April 13, 2026

      Scheduling Monopoly? Why Nvidia’s SchedMD Deal Alarms Open-Source Devs

      April 13, 2026
    • Crypto

      Quantum Computing Advances Force Coinbase and Institutional Custodians to Rethink Crypto Security

      March 8, 2026

      AI Assisted Hacking Groups Target Crypto Firms With Multi-Layered Social Engineering

      February 18, 2026

      Global Crypto Regulations Expand as 2026 Begins With New Data Collection Frameworks and National Laws

      January 16, 2026

      Coinbase Bets on Stablecoin and On-Chain Growth as Key Market Drivers in 2026 Strategy

      January 10, 2026

      Tether Faces Ongoing Transparency Questions and Reserve Scrutiny Amid Massive Bitcoin Accumulation

      January 5, 2026
    • Gadgets & Smart Tech
      Featured

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      By preciousMarch 26, 2026
      Recent

      AirPods Max 2: USB-C, Live Translation, and the H2 Upgrade

      March 26, 2026

      How ABB and Nvidia are Perfecting Industrial Robotics using AI Simulation

      March 20, 2026

      Neura Robotics Reaches €4B Valuation With Tether Backing

      March 12, 2026
    • Cybersecurity & Online Safety

      Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

      April 16, 2026

      Your Company Could Be Iran’s Next Target: What U.S. Tech Firms Need to Do Right Now

      April 6, 2026

      Google Is Warning Us About The Encryption Protecting Your Data Today. It May Not Survive Quantum Computing

      April 5, 2026

      Accenture and Anthropic Team Up on AI-powered Cybersecurity

      April 4, 2026

      Your BVN, Passport, and Bank Account May Already Be on the Dark Web. What Every Nigerian Must Do Right Now After the Banking Breaches

      April 4, 2026
    PhronewsPhronews
    Home»Artificial Intelligence & The Future»AI-Powered Cyber Threats Are On The Rise: How To Stay Safe
    Artificial Intelligence & The Future

    AI-Powered Cyber Threats Are On The Rise: How To Stay Safe

    preciousBy preciousApril 13, 2025Updated:June 13, 2025No Comments
    Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email
    System hacked warning alert on notebook (Laptop). Cyber attack on computer network, Virus, Spyware, Malware or Malicious software. Cyber security and cybercrime. Compromised information internet.

    With the increase in the usage of AI-powered chatbots, and even more funding to build and democratize Artificial Intelligence in general, AI-powered cyber threats are now on the horizon. 

    For quite some time now, Cybersecurity professionals have been asking important questions, one of which is how AI companies & startups manage sensitive data. There’s also the worry of AI being used to proliferate criminal activities in the darknet, as well as the worry of arming individuals with the know-how of using AI-powered phishing and malware content to target individuals and large corporations.

    So it is understandable that with AI gaining more and more traction with each passing year, it has grown with industry professionals demanding for it to be regulated – they recognize that it can be used for innovation, but it also comes with the realization that it can be used for far more dangerous purposes.

    A scenario of an AI-powered cyber attack provided by Christopher Kalodikis, a Computing Studies tutor, in a Youtube Video is this: “In an AI-based phishing attack, the attackers use an AI algorithm to analyse social media profiles, email patterns and other publicly available data to craft highly personalized phishing emails for key employees. They would then generate emails appearing as a CEO or employer, instructing managers to approve a large transfer of funds.”

    “The email is so well crafted and personalised that the managers would follow the instructions, resulting in a significant financial loss for the company. AI-powered malware could also be embedded in the phishing email, infiltrating the network, gathering sensitive data and adapting its behaviour to evade detection by the institution’s cybersecurity defences.”

    Another example of AI-powered Cyber threats is the creation of AI-powered websites such as WormGPT and FraudGPT – these apps are known for creating phishing and malicious content.

    But it is also important to note that AI can be used to fight back. According to a paper published in The Hill by Victor Benjamin, an Assistant Professor of Information Systems at ASU, he says, “Our best weapon is to fight fire with fire by using AI as a defensive cybersecurity tool. One of its greatest strengths is pattern recognition, which can be used to automate monitoring of networks and more easily identify potentially harmful activity. AI can compile emerging threats in a database and generate summaries of attempted attacks.” 

    An example is IBM using AI-powered solutions to accelerate threat detection and mitigation, as well as protect user identity and datasets.

    So while AI poses a great risk, it still can serve as a more effective defensive tool in the Cybersecurity industry as before the advent of AI, it was a “whack-a-mole game: A new threat emerges, humans update software to address the threat, another threat emerges, and so on,” says Victor. There was a heavy reliance on white-hat hackers to check for vulnerabilities one by one.

    Now, in the midst of Cybersecurity Professionals demanding for a robust regulation for artificial intelligence, one can stay safe by applying the AI Risk Management Framework by NIST (National Institute of Standards and Technology), the leading cybersecurity regulatory body – for both individual and organizations:

    • Stay Educated: Keep up with the latest AI threats and cybersecurity trends by following NIST updates and other trusted sources.
    • Secure Your Digital Identity: Use strong, unique passwords and enable multi-factor authentication on all your accounts.
    • Be Vigilant with Communications: Carefully scrutinize unexpected emails, messages, and links – even if they seem well-crafted – to avoid AI-enhanced scams.
    • Implement Strong Access Controls: Organizations should continue to enforce multi-factor authentication and role-based access in their workforce, and strict user permissions to secure AI systems and data.
    • Conduct Regular Risk Assessments and Continuous Monitoring: Organizations should perform periodic assessments of AI systems, monitor for anomalies, and update risk management protocols as needed – establish comprehensive cybersecurity policies and incident response procedures that specifically address AI-related risks.

    Adopt and Integrate Trusted Security Tools: Invest in advanced, AI-driven cybersecurity solutions that help detect, prevent, and respond to threats.

    AI Cyber Threats AI Defense AI for Criminal Activities AI for Cyber Defense AI for Innovation AI in Cybersecurity AI Malware AI Malware Detection AI Phishing AI regulation AI Risk Management AI Security Threats AI Startups AI Systems Security AI Vulnerabilities AI-Based Cyber Attack AI-Driven Cybersecurity Tools AI-Enhanced Phishing AI-Enhanced Scams AI-Powered Chatbots Anomaly Monitoring Corporate Cybersecurity. Cyber Threat Mitigation cybersecurity cybersecurity best practices Cybersecurity Challenges Cybersecurity Professionals Cybersecurity Trends Darknet Digital Identity Protection FraudGPT IBM AI Solutions Multi-Factor Authentication NIST AI Risk Management Framework Pattern Recognition Phishing Attacks Risk Assessments Secure Digital Identity Security Tools Integration Threat Detection Trusted Security Tools White-Hat Hackers WormGPT
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    precious
    • LinkedIn

    I’m Precious Amusat, Phronews’ Content Writer. I conduct in-depth research and write on the latest developments in the tech industry, including trends in big tech, startups, cybersecurity, artificial intelligence and their global impacts. When I’m off the clock, you’ll find me cheering on women’s footy, curled up with a romance novel, or binge-watching crime thrillers.

    Related Posts

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026

    The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

    April 14, 2026

    Comments are closed.

    Top Posts

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025

    Anthropic Will Use Claude User Chats For Data Training

    October 16, 2025
    Don't Miss
    Uncategorized

    Grid-Responsive AI: How Nvidia Plans to Turn Data Centers Into Power Assets with Emerald AI

    By preciousApril 16, 2026

    Data centers are power-hungry by design, but Nvidia wants them to work in the opposite…

    Cyber Retaliation: How Iran-Linked Hackers Paralyzed Medical Giant Stryker

    April 16, 2026

    The Trillion-Dollar Exit: Why a SpaceX IPO Would Reshape the Space Economy

    April 15, 2026

    The Sacramento Blueprint: How California is Writing the U.S. AI Rulebook

    April 14, 2026
    Stay In Touch
    • Facebook
    • Twitter
    About Us
    About Us

    Evolving from Phronesis News, Phronews brings deep insight and smart analysis to the world of technology. Stay informed, stay ahead, and navigate tech with wisdom.
    We're accepting new partnerships right now.

    Email Us: info@phronews.com

    Facebook X (Twitter) Pinterest YouTube
    Our Picks
    Most Popular

    Coinbase responds to hack: customer impact and official statement

    May 22, 2025

    MIT Study Reveals ChatGPT Impairs Brain Activity & Thinking

    June 29, 2025

    From Ally to Adversary: What Elon Musk’s Feud with Trump Means for the EV Industry

    June 6, 2025
    © 2025. Phronews.
    • Home
    • About Us
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions

    Type above and press Enter to search. Press Esc to cancel.