Business Insights
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • August 2023
  • January 2023
  • December 2021
  • July 2021
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Business
  • Crypto
  • Economy
  • Finance Expert
  • Forex
  • Invest News
  • Investing
  • Tech
  • Trading
  • Uncategorized
  • Videos
Apply Loan
Money Visa
Advertise Us
Money Visa
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact
AI-powered cyberattacks have devastating potential – but governments can fight fire with fire
  • Tech

AI-powered cyberattacks have devastating potential – but governments can fight fire with fire

  • August 15, 2025
  • Roubens Andy King
Total
0
Shares
0
0
0
Total
0
Shares
Share 0
Tweet 0
Pin it 0

A single missile can cost millions of dollars and only hit a single critical target. A low-equity, AI-powered cyberattack costs next to nothing and can disrupt entire economies, degrading national power and eroding strategic advantage.

The rules have changed: the future of warfare is a series of asynchronous, covert cyber operations carried out below the threshold of kinetic conflict. Battles will still be fought over land, sea, and sky, but what happens in the cyber domain could have a greater bearing on their outcome than how troops maneuver on the battlefield.

We were always heading in this direction, but AI has proven a dangerous accelerant. The entire military industrial base must become fortified against these risks, and that starts with continuous, autonomous validation of its cyber security defenses.


You may like

Top 10 AI tools used by military 2024 | AI in Military Intelligence – YouTube


Watch On

Snehal Antani
Snehal Antani

Social Links Navigation

Co-founder and CEO of Horizon3.ai.

Leads the company’s mission to empower organizations to proactively defend their infrastructure through autonomous security solutions. With a unique blend of entrepreneurial, public sector, and enterprise leadership experience, Snehal previously served as CTO of JSOC, CTO at Splunk, and CIO at GE Capital.

The Case for Autonomous Resilience

Today’s adversaries, whether state-sponsored actors or independent cybercrime syndicates, are deploying AI-driven agents to handicap critical systems across the entire military supply chain. These attackers aren’t focused on headline-making digital bombs, but a slow attrition, applying continuous pressure to degrade functionality over time. They’re also working anonymously: AI-enabled cyberattacks are executed by autonomous agents or proxies, making attribution slow or impossible.

Consider a hypothetical attack on the U.S. Navy. The Navy depends on a vast, decentralized web of small and mid-sized suppliers for everything from propulsion components to shipboard software systems. While these systems and suppliers may coalesce into the most technologically advanced Navy in the world, their interdependence is almost akin to human biology, in the way that a hit to one system can thoroughly destabilize another.

An adversary doesn’t need to breach the Navy directly. Instead, they can launch persistent cyberattacks on the long tail of maritime subcontractors, degrading national capability over time instead of in one massive, headline-making blow.

Third-party vendors, which often lack the financial resources to properly patch vulnerabilities, may be riddled with unsewn wounds that attackers can use as an entry point. But major security vulnerabilities aren’t the only way in. AI-driven agents can autonomously compromise outdated email systems, misconfigured cloud services, or exposed remote access portals across hundreds of these suppliers.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

The impacts of these attacks can look like “normal” disruptions, the result of human error or some missing piece of code: delayed component deliveries, corrupted design files, and general operational uncertainty. However, the ill effects accumulate over time, delaying shipbuilding schedules and weakening overall fleet readiness.

Emerging threats

That’s not even accounting for sanctions. If equipment is damaged, and replacement parts or skilled maintenance teams are restricted, one attack has just crippled a nation’s chip manufacturing capacity—potentially for months or years.

These attacks also get smarter over time. AI agents are designed for continuous improvement, and as they sink deeper into a system, they become more adept at uncovering and exploiting weaknesses. The cascading damage limits recovery efforts, further delaying defense production timelines and dragging entire economies backwards.

Despite these emerging threats, most defense and industrial organizations still rely on traditional concepts of deterrents, built around visible threats and proportional response: think static defenses, annual audits, and reactive incident response. Meanwhile, adversaries are running autonomous campaigns that learn, adapt, and evolve faster than human defenders can respond. You cannot deter what you cannot detect, and you cannot retaliate against what you cannot attribute.

Facing such dire stakes, defense contractors must exploit their own environments before attackers do. That means deploying AI-powered agents across critical infrastructure—breaking in, chaining weaknesses, and fixing them—to achieve true resilience. If the window for exploitation narrows, and the cost of action rises. “Low equity” means little against a high chance of failure.

Leveraging AI in Proactive Defense

Fighting fire with fire sounds simple enough, but there are serious risks involved. The same AI tools that bolster organizations’ defenses against smarter, more covert attacks can also create new vulnerabilities. Large language models (LLMs) may cache critical weaknesses in their model architecture, and third-party components that contribute to the models’ effectiveness can also introduce new vulnerabilities.

Any AI-powered security tools should undergo a comprehensive vetting process to identify potential risks and weaknesses. Model architecture and history, data pipeline hygiene, and infrastructural requirements–such as digital sovereignty compliance–are all factors to consider when augmenting security with AI-enabled tools.

Even the cleanest, most secure AI program is not a failsafe. Defenders that rely too heavily on AI will find themselves facing many of the same problems that plague their counterparts who use outdated scanners.

A mix of false confidence and alert fatigue from automated risk notifications can lead to missed critical vulnerabilities. In a national security scenario, that can lose a battle. That can lose a war. Real, attack-driven testing makes up for where AI lacks, and when used in tandem with it, creates an ironclad shield against AI-enabled adversaries.

Artificial intelligence is a boon for society and industry—but it is also a weapon, and a dangerous one at that. Fortunately, it’s one that we can wield for ourselves.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Roubens Andy King

Previous Article
Bitcoin Act Is Still America’s Playbook, Clarifies Senator Lummis
  • Crypto

Bitcoin Act Is Still America’s Playbook, Clarifies Senator Lummis

  • August 15, 2025
  • Roubens Andy King
Read More
Next Article
Amazon is selling a 0 gaming headset for  that's 'a stylish powerhouse'
  • Trading

Amazon is selling a $170 gaming headset for $50 that's 'a stylish powerhouse'

  • August 15, 2025
  • Roubens Andy King
Read More
You May Also Like
Disney Settles FTC Complaint With YouTube Over Children’s Data Collection
Read More
  • Tech

Disney Settles FTC Complaint With YouTube Over Children’s Data Collection

  • Roubens Andy King
  • September 3, 2025
This HP laptop with an astonishing 32GB of RAM is just 1
Read More
  • Tech

This HP laptop with an astonishing 32GB of RAM is just $261

  • Roubens Andy King
  • September 3, 2025
Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!
Read More
  • Tech

Hot deal: Samsung Galaxy S25 Edge plummets to record-low price!

  • Roubens Andy King
  • September 3, 2025
007 First Light looks like a hit, man
Read More
  • Tech

007 First Light looks like a hit, man

  • Roubens Andy King
  • September 3, 2025
Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft
Read More
  • Tech

Amazon’s Tomb Raider series will star Sophie Turner as Lara Croft

  • Roubens Andy King
  • September 3, 2025
Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises M for farm vision AI 
Read More
  • Tech

Orchard Robotics, founded by a Thiel fellow Cornell dropout, raises $22M for farm vision AI 

  • Roubens Andy King
  • September 3, 2025
Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)
Read More
  • Tech

Meta launches an Instagram app for the iPad, 15 years after its mobile app; it is slightly different than the mobile app, opening directly to a feed of Reels (Mia Sato/The Verge)

  • Roubens Andy King
  • September 3, 2025
Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage
Read More
  • Tech

Acer Swift Air 16 laptop weighs less than 1kg, with a 16-inch screen, up to 32GB memory, and up to 1TB storage

  • Roubens Andy King
  • September 3, 2025

Recent Posts

  • These Were the 3 Worst-Performing Stocks in the Dow Jones Industrial Average in August 2025
  • Crypto Faces Liquidity Endgame: Risks Mount By 2026
  • How Michael Saylor’s Bitcoin Obsession Started (and Changed Everything)
  • World shares mostly rise as a cut to US interest rates next week looks more certain
  • BTC Treasury Smarter Web Company Looks to Buy Competition
Featured Posts
  • These Were the 3 Worst-Performing Stocks in the Dow Jones Industrial Average in August 2025 1
    These Were the 3 Worst-Performing Stocks in the Dow Jones Industrial Average in August 2025
    • September 12, 2025
  • Crypto Faces Liquidity Endgame: Risks Mount By 2026 2
    Crypto Faces Liquidity Endgame: Risks Mount By 2026
    • September 12, 2025
  • How Michael Saylor’s Bitcoin Obsession Started (and Changed Everything) 3
    How Michael Saylor’s Bitcoin Obsession Started (and Changed Everything)
    • September 12, 2025
  • World shares mostly rise as a cut to US interest rates next week looks more certain 4
    World shares mostly rise as a cut to US interest rates next week looks more certain
    • September 12, 2025
  • BTC Treasury Smarter Web Company Looks to Buy Competition 5
    BTC Treasury Smarter Web Company Looks to Buy Competition
    • September 12, 2025
Recent Posts
  • China’s MOGU stock explodes 84% after m crypto buy
    China’s MOGU stock explodes 84% after $20m crypto buy
    • September 12, 2025
  • Markets have no risk-on ‘safe haven’ right now
    Markets have no risk-on ‘safe haven’ right now
    • September 12, 2025
  • Chipper Cash Scales Lightning in Africa: Over 50% of Bitcoin Transactions Now on Network
    Chipper Cash Scales Lightning in Africa: Over 50% of Bitcoin Transactions Now on Network
    • September 12, 2025
Categories
  • Business (2,057)
  • Crypto (1,667)
  • Economy (123)
  • Finance Expert (1,687)
  • Forex (1,666)
  • Invest News (2,362)
  • Investing (1,588)
  • Tech (2,056)
  • Trading (2,024)
  • Uncategorized (2)
  • Videos (816)

Subscribe

Subscribe now to our newsletter

Money Visa
  • Privacy Policy
  • DMCA
  • Terms of Use
Money & Invest Advices

Input your search keywords and press Enter.