/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Cybercriminals, spies, researchers, and corporate defenders are increasingly using AI, feeding into an escalating cat-and-mouse game of finding software flaws

good and bad actors leveraging AI in cybersecurity arms race Stephen E. Arnold / Beyond Search : News Flash from the Past: Bad Actors Use New Technology and Adapt Quickly Bluesky: Kevin Collier / @kevincollier : I've rolled my eyes for years at hyperbolic claims of AI revolutionizing cyber, but especially after Vegas this year I think it's now time to call it: Hackers of every stripe are using LLMs now. Jake Williams / @malwarejake : Respectfully, I think a large part of that is the innate drive to understand how LLMs work, and as a result what they will (and critically, won't) be good at.  —  This is a group that grew out of learning how a system worked specifically so they could find poor engineering decisions and break it. Jake Williams / @malwarejake : In that same vein, I regularly see hackers finding LLMs fitting their workflows where businesses struggle to do the same.  —  I think that's more about the user than the tool (and in some situations, even the use case). @wylienewmark : I'm sorry to do this with a quote-skeet of a reporter I actually respect, but: USING LLMS IS NOT THE SAME THING AS “HACKING WITH AI”.  LLM usage to support basic software development is now utterly ubiquitous but the fear we've seen of “AI-enabled intrusions” still has not come to pass. …

NBC News Kevin Collier

Discussion

  • @kevincollier Kevin Collier on bluesky
    I've rolled my eyes for years at hyperbolic claims of AI revolutionizing cyber, but especially after Vegas this year I think it's now time to call it: Hackers of every stripe are using LLMs now.
  • @malwarejake Jake Williams on bluesky
    Respectfully, I think a large part of that is the innate drive to understand how LLMs work, and as a result what they will (and critically, won't) be good at.  —  This is a group that grew out of learning how a system worked specifically so they could find poor engineering decisi…
  • @malwarejake Jake Williams on bluesky
    In that same vein, I regularly see hackers finding LLMs fitting their workflows where businesses struggle to do the same.  —  I think that's more about the user than the tool (and in some situations, even the use case).
  • @wylienewmark @wylienewmark on bluesky
    I'm sorry to do this with a quote-skeet of a reporter I actually respect, but: USING LLMS IS NOT THE SAME THING AS “HACKING WITH AI”.  LLM usage to support basic software development is now utterly ubiquitous but the fear we've seen of “AI-enabled intrusions” still has not come t…