Common Information
Type Value
Value
Artificial Intelligence - T1588.007
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) For example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI)
Details Published Attributes CTI Title
Details Website 2024-11-17 0 How Organizations Are Fulfilling CISA’s Secure by Design Pledge
Details Website 2024-11-17 0 AI Model Robustness: A New Frontier in Cybersecurity
Details Website 2024-11-17 0 Artificial Intelligence and Security: A Predestined Partnership
Details Website 2024-11-17 0 Cybersecurity in Autonomous Vehicles: Safeguarding the Future of Mobility
Details Website 2024-11-17 15 Hunting for Default Credentials: A Deeper Dive into the Toolkit
Details Website 2024-11-17 0 Thousands of suspicious SIM cards active abroad to be blocked  | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 0 From Reactive to Proactive: Leveraging Cyber Scenarios for Resilient Cybersecurity
Details Website 2024-11-17 0 From Detection to Response: The Power of XDR in Cybersecurity
Details Website 2024-11-17 0 The Security illusion: Why Two-Factor Authentication is No Longer Enough
Details Website 2024-11-17 0 AI’s Game-Changing Impact on Mobile Security
Details Website 2024-11-17 0 Susquehanna Raises Target to $90 Amid Strong Q3 Performance and AI-Driven Cybersecurity Growth | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-17 2 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-16 3 What Does Google’s Cybersecurity Forecast for 2025 Reveal?
Details Website 2024-11-16 0 Cybersecurity 2024: Emerging Trends and Challenging Threats to Look Out for
Details Website 2024-11-16 0 The Importance Of Data Privacy In The Digital Age
Details Website 2024-11-16 0 GZR Observer Daily — Nov 16, 2024
Details Website 2024-11-16 0 Exploring Side-Channel Attacks: Understanding the Risks and Defenses
Details Website 2024-11-16 0 A Comprehensive Guide to Best IoT Courses in Delhi: Achieve More with Bytecode Cyber Security
Details Website 2024-11-16 0 Why Database Security Is Essential for Modern Businesses
Details Website 2024-11-16 0 Artificial Intelligence, Redesigning the Future:
Details Website 2024-11-16 0 Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-16 0 Top 5 Technologies to Learn In 2024
Details Website 2024-11-16 0 IGP: Police to tap FBI, China cops for expertise on new squad to fight AI, deepfake cybercrime | #cybercrime | #infosec | National Cyber Security Consulting