Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link
    Cybersecurity

    AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link

    adminBy adminMarch 26, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Identity Security
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Three primary concerns for cybersecurity teams today are identity, pace, and a battleground shaped by global politics.

    The influence of AI pervades cybersecurity, giving attackers added sophistication, speed and scale. Where attacks are directed and by whom is increasingly influenced by geopolitical tensions and international alliances. But the focus of cybersecurity must remain on identity, since identity is the fulcrum of entry; and is so easily lost.

    Infostealers and consequent stealer logs feed initial access brokers, who sell the identities to criminals. “At the same time, AI is enabling attackers to generate highly convincing phishing campaigns and impersonations themselves, including deepfake-enabled social engineering,” comments Allison Wikoff, global threat intelligence leader, Americas, at PwC. 

    “What has changed is the scale and efficiency: identity compromise has effectively become a supply chain, where threat actors mix buying and generating access depending on what is most efficient for how they are conducting their operations and engaging with targeted environments or people.”

    Allison Wikoff
    Allison Wikoff, Global Threat Intelligence Leader, Americas, at PwC. 

    This scenario is described in PwC’s report, Cyber threats in motion. With access-ability, attacker speed is increasingly problematic. AI is becoming a core component of threat actors’ tradecraft, who use it “to automate reconnaissance, generate convincing phishing lures, accelerate malware development, and scale social engineering across languages and platforms… autonomous AI agents capable of executing entire attack sequences without human intervention are a prime concern.”

    For the moment, entire automated attack sequences are a concern rather than a dire active threat. Wikoff explains: “This is emerging but not yet widespread at scale. Our report points to early examples – like proof-of-concept autonomous agents and campaigns where a significant portion of activity is AI-driven – but these remain relatively early-stage and not consistently reliable. In practice today, we’re seeing some autonomy: AI is being used to accelerate reconnaissance, phishing, and malware development rather than fully replacing human operators end-to-end.”

    The doomsday scenario of fully autonomous agentic-AI attacks operating at speed without attacker guidance may be coming but has not yet arrived – and may take longer than we fear. “There are some threat actors we track that have not significantly changed their TTPs in nearly 10 years. Traditional techniques like phishing and credential theft remain highly effective, and many organizations are still grappling with basic security fundamentals,” continues Wikoff.

    Advertisement. Scroll to continue reading.

    “Until those gaps are addressed, attackers will continue to target the lowest-hanging fruit, meaning AI is augmenting attacks, but the shift will likely be more evolutionary than revolutionary.”

    That doesn’t mean defenders can relax. The increasingly connected nature of modern business means that company infrastructures are connected between companies and across cloud platforms and continents. Threat actors, whether nation state, cybercriminal, or a blend of both, have already “found new ways to accelerate through the blind corners of edge devices, supply chains, and cloud ecosystems – turning trusted dependencies into high-speed attack paths with cascading impact.”

    Beyond better defense of identities, it is important for companies to understand their own ‘crown jewels’ and who might wish to steal them. This is largely, but not entirely, driven by geopolitical conditions.

    “Most organizations are not equally attractive to all threat actors. Some are targets for financial gain, others for intellectual property, strategic access, or geopolitical influence. And some attacks are still opportunistic in nature,” comments Wikoff. “Regardless, it makes it critical for leaders to clearly define their ‘crown jewels’ , the systems, data, identities, and relationships that would have the greatest business or strategic impact if compromised.” 

    She continues, “Once that’s established, organizations can better align their defenses to the threats most relevant to them, rather than trying to defend everything equally. In practice, effective network defense comes from combining threat intelligence with a clear understanding of what matters most to your business, and how different types of attackers are likely to pursue it.” 

    Different attackers are likely to have different motivations, from simple crime, espionage, and hacktivism to sabotage, with different tradecrafts. “We assess Russia-based threat actors will likely continue to blend cyber and influence operations against European and transatlantic democracies; China-based threat actors are assessed to sustain persistent access in telecommunications and other critical infrastructure; and tighter attribution and regulation will raise the cost of misjudged risk in mergers and acquisitions, entry into new jurisdictions and markets, and third-party selection,” says PWC.

    Know yourself and know your enemy is good advice. But the first step must be better protection of identities and access.

    “In an identity-driven, AI-accelerated threat landscape, resilience belongs to organizations that govern identity at speed, validate trust continuously, and treat cyber risk as inseparable from business and geopolitical strategy,” concludes PwC.

    Learn More at the AI Risk Summit

    Related: Russian APT Exploits Zimbra Vulnerability Against Ukraine

    Related: Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach

    Related: Cyber Insights 2026: Malware and Cyberattacks in the Age of AI

    Related: Cyber Insights 2026: Social Engineering

    attacks Cybersecuritys identity Link remains speeds Weakest
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Meet (formerly Google Duo) 351.0.888843116.duo.android_20260316.01_p6.s APK Download by Google LLC
    Next Article Why AI rack densities make liquid cooling nonnegotiable
    admin
    • Website

    Related Posts

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026

    April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026

    NYT Strands hints and answers for Thursday, April 16 (game #774)

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,340)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (821)
    • Tech Tools & Mobile / Apps (1,603)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026
    Most Popular
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    • New AgingFly malware used in attacks on Ukraine govt, hospitals
    • Capsule Security Emerges From Stealth With $7 Million in Funding
    • NYT Strands hints and answers for Thursday, April 16 (game #774)
    • The Modern SEO Center Of Excellence: Governance, Not Guidelines
    • Raspberry Pi OS is getting a new security measure, and people are already annoyed
    • April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
    • YouTube Premium is now 50% off for certain Google One subscribers
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.