Start your day with intelligence. Get The OODA Daily Pulse.
This year, attackers began using AI in a much more aggressive and systematic way. The threat is real and will continue to grow in 2026. We have already seen real breaches where attackers use advanced AI models to automate most of their steps. Moreover, we are seeing malware that can rewrite itself in real time to avoid detection. While attackers are advancing their techniques, defenders still have significant constraints when it comes to employing AI in the cybersecurity field. Internal corporate policies must be followed, which include respecting compliance requirements and privacy concerns. Furthermore, agreement and alignment are required across many teams before any new technology can be adapted into regular practice. Attackers face none of these limitations. This imbalance is becoming more and more obvious, creating new problems as traditional approaches to security fall behind. Periodic testing is no longer meaningful when attackers are adapting continuously. Detection alone is not enough.
Full opinion : How to use AI to counter AI-driven cybersecurity threats.