AI malware, Gemini decoys and more: Google reveals how hackers are actually using AI


  • GTIG finds that threat actors are cloning mature AI models using distillation attacks
  • Sophisticated malware can use AI to manipulate code in real-time to avoid detection
  • State-sponsored groups create highly convincing phishing kits and social engineering campaigns

If you have used any modern AI tools, you will know that they can be of great help in reducing the tedium of mundane and burdensome tasks.

Well, it turns out that threat actors feel the same way, as the latest Google Threat Intelligence Group AI Threat Tracker report has found that attackers are using AI more than ever.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top