AI Malware, Gemini Lures and More: Google Reveals How Hackers Really Use AI


  • GTIG discovers that malicious actors are cloning mature AI models using distillation attacks.
  • Sophisticated malware can use AI to manipulate code in real time to avoid detection.
  • State-sponsored groups create very convincing phishing kits and social engineering campaigns.

If you have used modern AI tools, you will know that they can be a great help in reducing the boredom of mundane and tedious tasks.

Well, it turns out that threat actors feel the same way, as Google Threat Intelligence Group’s latest AI Threat Tracker report revealed that attackers are using AI more than ever.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top