Expert Warns of Dual-Edged Impact of AI on Cybersecurity
Specialists caution that this technology is rapidly becoming a formidable instrument not only for defenders aiming to counter cyberattacks but also for malicious actors exploiting it for their own purposes.
Sergey Lozhkin, who leads the Asia-Pacific (APAC) and Middle East, Türkiye, and Africa (META) regions for Kaspersky’s Global Research and Analysis Team (GReAT), shared with a news outlet that AI applications have expanded significantly — ranging from code generation to video production — and are no longer restricted to ethical users.
“AI doesn’t know if something is good or bad, and even if it has some kind of protective mechanism, it can be bypassed,” Lozhkin emphasized.
He further explained, “AI could work in both spaces — to enhance the attacking capability of bad actors and to enhance the defensive capability of cybersecurity vendors. It could be both used in legitimate and non-legitimate ways, and each year, they are used more and more by security professionals and bad guys.”
Highlighting the broader implications beyond cybersecurity, Lozhkin cautioned, “Everybody is using AI right now for different kinds of tasks — code generation, video creation, and anything like this. And it will still be the fight of sword and shield, but enhanced with AI.”
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
