{"id":498,"date":"2021-02-22T14:28:36","date_gmt":"2021-02-22T14:28:36","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=498"},"modified":"2021-02-22T14:28:36","modified_gmt":"2021-02-22T14:28:36","slug":"the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/","title":{"rendered":"The future of cybersecurity will be about \u2018fighting fire with fire\u2019"},"content":{"rendered":"<p>In many ways, cybersecurity has always been a contest; vendors race to develop security products that can identify and mitigate any threats, while cybercriminals aim to develop <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-malware-removal\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\"><u>malware<\/u><\/a> and exploits capable of bypassing protections.<\/p>\n<p>With the emergence of <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/what-is-ai-everything-you-need-to-know\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\"><u>artificial intelligence<\/u><\/a> (AI), however, this combative exchange between attackers and defenders is about to become more complex and increasingly ferocious.<\/p>\n<aside class=\"hawk-placeholder\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" data-viewports=\"mobile\" data-widget-id=\"3983712974954355700\" data-result=\"missing\"><\/aside>\n<p>According to Max Heinemeyer, Director of Threat Hunting at AI security firm Darktrace, it is only a matter of time before AI is co-opted by malicious actors to automate attacks and expedite the discovery of vulnerabilities.<\/p>\n<ul>\n<li>Here&#8217;s our list of the <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">best endpoint protection<\/a> services available<\/li>\n<li>Check out our list of the <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-identity-management-software\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">best identity management<\/a> services right now<\/li>\n<li>We&#8217;ve built a list of the <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-patch-management-tools\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\">best patch management<\/a> solutions out there<\/li>\n<\/ul>\n<p>\u201cWe don\u2019t know precisely when offensive AI will begin to emerge, but it could already be happening behind closed doors,\u201d he told <em>TechRadar Pro<\/em>.<\/p>\n<p>\u201cIf we are able to [build complex AI products] here in our labs with a few researchers, imagine what nation states that invest heavily in cyberwar could be capable of.\u201d<\/p>\n<p>When this trend starts to play out, as seems inevitable, Heinemeyer says cybersecurity will become a \u201cbattle of the algorithms\u201d, with AI pitted against AI.<\/p>\n<p>However, the consensus in recent years has been that intelligence-based services are ill-equipped to handle the pace of the modern threat landscape. In other words, as new threat types and attack vectors emerge, these legacy tools are powerless until updated with new intelligence, by which time it is too late.<\/p>\n<p>This problem will only be aggravated by the emergence of offensive AI, which will allow cybercriminals to automate attacks in a way never before seen, as well as to identify potential exploits at a faster rate.<\/p>\n<p>An example of a contemporary malware campaign capable of eluding signature-based security solutions is Emotet, a loader botnet that was <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/emotet-botnet-taken-offline-in-huge-police-operation\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\"><u>recently taken down<\/u><\/a> in a sting operation that spanned multiple international intelligence agencies.<\/p>\n<p>\u201cEmotet is really interesting because it was so resilient and its structure extremely modular. It used different levels of backups and command and control <a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/best-small-business-servers\" target=\"_blank\" rel=\"noopener\" data-component-tracked=\"1\"><u>servers<\/u><\/a>, some of which were even peer-to-peer,\u201d Heinemeyer explained.<\/p>\n<p>Source: Tech Radar<\/p>\n<p><a href=\"https:\/\/www.techradar.com\/news\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In many ways, cybersecurity has always been a contest; vendors race to develop security products that can identify and mitigate any threats, while cybercriminals aim to develop malware and exploits capable of bypassing protections. With the emergence of artificial intelligence (AI), however, this combative exchange between attackers and defenders is about to become more complex [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The future of cybersecurity will be about \u2018fighting fire with fire\u2019 - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The future of cybersecurity will be about \u2018fighting fire with fire\u2019 - Community\" \/>\n<meta property=\"og:description\" content=\"In many ways, cybersecurity has always been a contest; vendors race to develop security products that can identify and mitigate any threats, while cybercriminals aim to develop malware and exploits capable of bypassing protections. With the emergence of artificial intelligence (AI), however, this combative exchange between attackers and defenders is about to become more complex [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-22T14:28:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1599\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/\",\"name\":\"The future of cybersecurity will be about \u2018fighting fire with fire\u2019 - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\",\"datePublished\":\"2021-02-22T14:28:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg\",\"width\":1280,\"height\":1599},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The future of cybersecurity will be about \u2018fighting fire with fire\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The future of cybersecurity will be about \u2018fighting fire with fire\u2019 - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/","og_locale":"en_US","og_type":"article","og_title":"The future of cybersecurity will be about \u2018fighting fire with fire\u2019 - Community","og_description":"In many ways, cybersecurity has always been a contest; vendors race to develop security products that can identify and mitigate any threats, while cybercriminals aim to develop malware and exploits capable of bypassing protections. With the emergence of artificial intelligence (AI), however, this combative exchange between attackers and defenders is about to become more complex [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-02-22T14:28:36+00:00","og_image":[{"width":1280,"height":1599,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/","name":"The future of cybersecurity will be about \u2018fighting fire with fire\u2019 - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","datePublished":"2021-02-22T14:28:36+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/02\/pexels-akwice-3094799.jpg","width":1280,"height":1599},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/the-future-of-cybersecurity-will-be-about-fighting-fire-with-fire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"The future of cybersecurity will be about \u2018fighting fire with fire\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=498"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/498\/revisions"}],"predecessor-version":[{"id":500,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/498\/revisions\/500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/499"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}