Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » AI’s Double-Edged Sword: It Makes Attackers and Cybersecurity Pros More Efficient
AI and Copilots

AI’s Double-Edged Sword: It Makes Attackers and Cybersecurity Pros More Efficient

Chris HughesBy Chris HughesMay 6, 2024Updated:May 10, 20244 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

While there is hope that AI will help cybersecurity pros offset challenges such as keeping up with attackers, workforce shortages, and the ever-changing threat landscape, it is also important to keep an eye on what malicious actors are utilizing AI for.

In a recent paper, University of Illinois Urbana-Champaign researchers reported that OpenAI’s ChatGPT-4 was able to exploit vulnerabilities in real-world systems when given a Common Vulnerability and Enumerations (CVE) advisory describing the vulnerability. A CVE is the most widely used format for describing known vulnerabilities in databases such as the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD).

In this analysis, I’ll scrutinize the findings of the researchers’ report and explore the urgent need for organizations to fortify their defenses against these evolving risks.

Vulnerability Testing Insights

To conduct their study, the researchers used published vulnerability advisories that didn’t have a patch available yet. They were able to feed CVE descriptions to GPT-4 and leverage it to autonomously develop exploits of the vulnerabilities in quick fashion, with an 87% success rate. The researchers noted that not giving the large language model (LLM) agent access to the CVE descriptions reduced its success to just 7%, but the reality is that vulnerability descriptions are generally available in widely used vulnerability databases, which malicious actors have access to as well.

For the sample set, they chose a diverse set of vulnerabilities including those that were for websites, containers, and Python packages. The vulnerabilities tested included a sample case of 15 known vulnerabilities. Interestingly, the researchers found that 11 of the vulnerabilities in the testing sample were published after GPT-4’s release, meaning the model hadn’t even learned any data related to the vulnerabilities during its training and development, making the finding even more impressive and concerning.

Ask Cloud Wars AI Agent about this analysis

To emphasize the economic utility of AI versus traditional human testers, the researchers also pointed out that the cost to conduct the exploit for the LLM agent was about $8.08 per exploit — much more affordable than human capital. This demonstrates not just speed and technology but also economic efficiencies which will further drive cybercrime organizations to lean into automating their activities and using technologies such as AI.

While skeptics and professionals have pointed out that the vulnerabilities exploited were relatively simple, it is still indicative of the future potential of GenAI and LLM tools to accelerate the exploitation of vulnerabilities by malicious actors.

It is even more concerning for other reasons. The CVE count in databases such as NVD has grown exponentially year-over-year, surging past 200,000 known vulnerabilities and over 20,000 vulnerabilities published in 2023. This comes at a time when organizations are struggling terribly to keep pace with the growing rate and number of vulnerabilities, with backlogs in the several hundred thousand to even millions in large, complex environments.

It isn’t just new vulnerabilities without patches that malicious actors are targeting either, as “vintage vulnerabilities” remain a key target for attackers. These are known vulnerabilities with available patches in most cases that simply haven’t been resolved, as organizations struggle to keep pace with the growing vulnerability backlogs and determine what vulnerabilities should be prioritized and patched immediately and which ones can afford to be put into a backlog.

This is why we’re seeing the rise of vulnerability intelligence resources such as the Known Exploited Vulnerability (KEV) catalog from the Cybersecurity and Infrastructure Security Agency (CISA) and the Exploit Prediction Scoring System (EPSS). These resources seek to help organizations prioritize vulnerabilities that are either known to actively be exploited or may be exploited soon.

All this being said, attackers continue to capitalize on the chaos. In fact, Mandiant’s 2024 M-Trends report found that exploits of vulnerabilities were on the rise, accounting for 38% of compromises they identified. This was an increase from 32% the year prior and there was also a decrease in other attack types such as phishing.

Final Thoughts

As the attack surface continues to grow, and organizations struggle to keep pace with vulnerabilities and reduce risk, attackers are exploring and building proficiencies in emerging technologies such as AI to accelerate their rate of exploitation and impact. This underscores the importance of defenders and organizations doing the same, building competencies in AI and leveraging the same technologies to outpace malicious actors and drive down vulnerabilities and risks.


The AI Ecosystem Q1 2024 Report compiles the innovations, funding, and products highlighted in AI Ecosystem Reports from the first quarter of 2024. Download now for perspectives on the companies, investments, innovations, and solutions shaping the future of AI.

ai Cybersecurity featured risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Oracle and OpenAI Are Rocking AI World with $500-Billion Stargate Startup

June 3, 2025

Google Cloud Makes Major Data Management, Cataloging Push With New AI-Powered Products

June 3, 2025

Larry Ellison + Sam Altman Turning Stargate Into Reality

June 3, 2025

SAP vs. Salesforce: Battle for AI and Data-Cloud Leadership Intensifies

June 2, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Oracle and OpenAI Are Rocking AI World with $500-Billion Stargate Startup
  • Google Cloud Makes Major Data Management, Cataloging Push With New AI-Powered Products
  • Larry Ellison + Sam Altman Turning Stargate Into Reality
  • SAP vs. Salesforce: Battle for AI and Data-Cloud Leadership Intensifies
  • SAP vs. Salesforce: In AI Era, Battle Shifts to Data Cloud + Agents

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.