Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Winning Against AI-Based Attacks Requires a Combined Defensive Approach

Posted on January 26, 2026January 26, 2026 By CWS

The Hacker InformationJan 26, 2026Endpoint Safety / Synthetic Intelligence
If there is a fixed in cybersecurity, it is that adversaries are all the time innovating. The rise of offensive AI is remodeling assault methods and making them tougher to detect. Google’s Menace Intelligence Group, just lately reported on adversaries utilizing Giant Language Fashions (LLMs) to each conceal code and generate malicious scripts on the fly, letting malware shape-shift in real-time to evade typical defenses. A deeper take a look at these novel assaults reveals each unprecedented sophistication and deception.
In November 2025, Anthropic reported on what it described as the primary recognized “AI-orchestrated cyber espionage marketing campaign.” This operation featured AI built-in all through the levels of assault, from preliminary entry to exfiltration, which was executed largely autonomously by the AI itself.
One other latest development issues ClickFix-related assaults utilizing steganography strategies (hiding malware inside picture information) that slipped previous signature-based scans. Skillfully disguised as legit software program replace screens or CAPTCHAs, these assaults deceived customers into deploying distant entry trojans (RATs), info-stealers, and different malware payloads on their very own gadgets.
Adversaries are additionally exploiting methods to set off after which compromise anti-virus (AV) exclusion guidelines by utilizing a mixture of social engineering, attack-in-the-middle, and SIM swapping strategies. Primarily based on analysis from Microsoft’s risk staff from October 2025, the risk actor they name Octo Tempest satisfied its victims to disable numerous safety merchandise and robotically delete e-mail notifications. These steps allowed their malware to unfold throughout an enterprise community with out tripping endpoint alerts. Actors are additionally simply deploying dynamic and adaptive instruments focusing on detecting and disabling AV software program on endpoints.
All these strategies share a typical thread: the flexibility to evade legacy defenses similar to endpoint detection and response (EDR), exposing the restrictions of relying solely on EDR. Their success illustrates the place EDR, performing alone and with out extra defensive measures, will be weak. These are new assaults in each sense of the phrase, utilizing AI automation and intelligence to subvert digital defenses. This second indicators a elementary shift within the cyber risk panorama, and it is quickly driving a change in defensive technique.

NDR and EDR, working collectively
Community detection and response (NDR) and EDR each deliver totally different protecting advantages. EDR, by its nature, is concentrated on what is going on inside every particular endpoint, whereas NDR repeatedly displays the community surroundings, detecting threats as they traverse the group. It excels at choosing up what EDR doesn’t, figuring out behavioral anomalies and deviations from typical community patterns.
Within the age of AI-based threats, there’s a want for each sorts of techniques to work collectively, particularly as these assaults can function at greater speeds and better scale. Some EDR techniques weren’t designed for the pace and scale of AI-fueled assaults. NDR can choose up these community anomalies and strengthen defenses and achieve deeper insights from this community information, leveraging the extra safety this complementary know-how can present.
Compounding the problem is that right this moment’s assault floor is increasing and rising extra complicated. Subtle risk actors now mix threats that transfer throughout quite a lot of domains, compromising id, endpoint, cloud and on-premises infrastructure in a deadly combine. This implies the corresponding safety techniques in every of those focus areas have to work collectively, sharing metadata and different indicators, to search out and cease these threats. The dangerous actors disguise behind this complexity in order to maximise their attain, improve their blast radius, and supply cowl whereas they use totally different hacking instruments to imagine numerous roles and concentrate on totally different intermediate targets.
Blockade Spider, a gaggle lively since April 2024, makes use of these combined domains for ransomware assaults. After gaining entry by means of discovering unmanaged techniques, they transfer laterally throughout a community, looking for a file assortment to encrypt to attempt to extract a ransom. The complete breadth of their method was found by utilizing NDR to acquire visibility into the digital techniques and cloud properties, after which utilizing EDR as quickly because the assault moved throughout the community into managed endpoints.
One of many extra notorious variants is what was used within the Volt Hurricane assault noticed by Microsoft in 2023. It is attributed to Chinese language state-sponsored actors utilizing dwelling off the land (LoTL) strategies that helped them keep away from endpoint detection. Its targets have been unmanaged community edge gadgets, similar to SOHO routers and different Web of Issues (IoT) {hardware}. The actors have been in a position to alter the originating packets to look like coming from a cable modem in Texas, slightly than a direct hyperlink to a Chinese language IP deal with. What gave the sport away was the community visitors. Whereas they have been profitable in avoiding EDR, variations in community visitors quantity detected by NDR indicated the originating cable modem visitors was really hiding one thing much more nefarious. On this case, NDR served as a safety security web by detecting malicious exercise that slipped previous EDR techniques.

Rising distant work additionally provides vulnerability. As VPNs have develop into extra broadly used to assist distant workforces, they pose new alternatives for exploitation. An absence of visibility on distant networks means a compromised endpoint on a trusted connection can introduce harm to the group’s surroundings. If an EDR does not detect {that a} native machine operating the VPN is already contaminated with malware, it may well simply unfold throughout an enterprise as soon as the machine connects to the company community. Compromised VPNs also can disguise lateral community motion that disguises itself amongst typical community operations and administration instruments. For instance, two latest breaches of Salesforce provide chains have been completed by utilizing AI to reap OAuth credentials to achieve unauthorized entry to varied buyer accounts. NDR can determine weak entry and transit factors, serving to determine the riskiest areas to repair first, and EDR can share the proof of a compromised account getting used as a pivot level.
These and different exploits spotlight the advantages of steady monitoring with EDR and NDR working in tandem, enabling defenders to identify progressive adversary strategies and reply rapidly and decisively to rising threats. Adversaries will develop extra succesful as AI evolves, making this mixed method important for lowering threat and bettering your group’s capability to reply rapidly and decisively.
Corelight’s Open NDR Platform allows SOCs to detect novel assault sorts, together with these leveraging AI strategies. Its multi-layered detection method contains behavioral and anomaly detections that may determine a variety of distinctive and strange community exercise. As adversaries develop new strategies of evading EDR techniques, safety groups that deploy NDR can strengthen their enterprise’s defensive recreation. Go to corelight.com/elitedefense to be taught extra.

Discovered this text attention-grabbing? This text is a contributed piece from considered one of our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:AIBased, Approach, Attacks, Combined, Defensive, Requires, Winning

Post navigation

Previous Post: MITRE Releases New Cybersecurity Framework to Protect the Embedded Systems
Next Post: Lazarus Hackers Actively Attacking European Drone Manufacturing Companies

Related Posts

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus The Hacker News
New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module The Hacker News
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation The Hacker News
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse The Hacker News
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure The Hacker News
Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Curl to End Bug Bounty Following Low-Quality AI-Generated Vulnerability Reports
  • Upwind Raises $250 Million at $1.5 Billion Valuation
  • Crunchbase Confirms Data Breach After Hacking Claims
  • New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same
  • Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Curl to End Bug Bounty Following Low-Quality AI-Generated Vulnerability Reports
  • Upwind Raises $250 Million at $1.5 Billion Valuation
  • Crunchbase Confirms Data Breach After Hacking Claims
  • New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same
  • Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark