Daylila

Tuesday, 12 May 2026

How AI accelerates the oldest problem in cybersecurity

7 min Cybersecurity attack-defense cycles and AI-driven asymmetry
Source: Axios via Google
0:00

Hook

Google just confirmed what security researchers have been tracking quietly: attackers are already using AI to write exploits, scan for vulnerabilities, and automate intrusions at scale.

“AI-assisted” means automated vulnerability scanning across millions of systems in hours. It means generating exploit code that adapts to different software configurations without human rewriting. It means phishing campaigns that tailor messages to individuals using scraped LinkedIn data and email patterns.

This isn’t theoretical. It’s operational, and it’s changing the math of a problem that’s been structural since the first networked computer.

The Adversarial Loop

Cybersecurity has always been a cycle: attackers find weaknesses, defenders patch them, attackers find new ones.

The loop never closes because software is complex and humans write it imperfectly. A web application with 100,000 lines of code has thousands of potential entry points—input fields, API endpoints, authentication checks, file upload handlers. Each is a door. Some are locked, some swing open, some have broken hinges no one noticed.

Attackers probe those doors methodically. When they find one that opens, they write an exploit—a piece of code that walks through that specific door reliably. Defenders discover the breach, issue a patch, and the door locks. Attackers move to the next door.

This has been the rhythm for fifty years. What changes is the speed.

The Asymmetry

One attacker can probe millions of systems simultaneously. Defenders must secure every entry point on every system they operate.

The math is structural: finding one hole costs less than closing all of them. An attacker needs one success. A defender needs zero failures.

Say you manage a company network with 500 computers, each running 50 software packages. That’s 25,000 potential vulnerability surfaces. You must monitor all of them, apply patches as they’re released, test that patches don’t break other systems, and verify that no one bypassed the patch by running outdated software on a forgotten machine in accounting.

The attacker only needs to find one unpatched system running one outdated package with one known vulnerability. They scan your network perimeter in minutes, find it, and exploit it.

This imbalance is not accidental. It’s the nature of defensive work versus offensive work. Defense is comprehensive; offense is opportunistic.

What Ai Changes

AI accelerates reconnaissance, exploit generation, and social engineering—all at once.

Reconnaissance. Before AI, an attacker scanned networks manually or used scripts that checked for known vulnerabilities one at a time. Scanning the entire public internet for a specific weakness took weeks. AI-driven tools now run reconnaissance across millions of IP addresses in hours, adapting the scan in real time as they learn which ports respond, which services are running, which versions have known holes.

Exploit generation. Writing an exploit used to require understanding the target system’s architecture, reading the vulnerable code, and crafting input that triggers the flaw without crashing the program. AI models trained on public exploit databases can now generate working exploits from vulnerability descriptions, adapting the code for different operating systems and configurations without human rewriting.

Security researcher reads CVE, studies source code, writes exploit by hand—days to weeks per vulnerability. Model reads CVE, generates exploit variations for multiple platforms, tests them in sandbox—hours per vulnerability.

Social engineering. Phishing emails used to be generic (“Your account has been compromised—click here”). AI scrapes LinkedIn, company websites, and public records to generate emails that reference real projects, real colleagues, real meeting schedules. The message reads like it came from someone who knows you.

The adversarial loop accelerates. The asymmetry widens.

Why Defense Lags

Defenders use AI too—anomaly detection systems, automated patching tools, threat intelligence platforms that learn attack patterns.

But defense remains human-bottlenecked in ways offense does not.

Anomaly detection flags thousands of events per day. A human must decide which are real threats and which are false positives—an employee logging in from a new location, a software update that changes network traffic patterns, a legitimate API call that looks like data exfiltration. Get it wrong and you either ignore a breach or burn analyst time investigating normal behavior.

Automated patching sounds simple: new patch released, system applies it, done. But patches break things. A security update for a web server might conflict with a custom plugin the company relies on. Someone has to test the patch, prioritize which systems get it first, and verify it didn’t disable a critical function.

Threat intelligence platforms ingest data from thousands of sources—malware signatures, IP addresses used in previous attacks, domain names registered by known threat actors. The system can correlate patterns, but a human must interpret what the correlation means and decide whether to block traffic, isolate a system, or investigate further.

Attackers need one success. Defenders need zero failures. AI helps both sides, but the structural advantage stays with offense.

What This Means For Ordinary Users

You don’t face nation-state hackers with custom AI exploits. You face automated tools that check if your password is “password123,” if your router firmware is three years out of date, if your email client has an unpatched vulnerability from 2024.

The threat isn’t sentient AI. It’s that more attackers can now run campaigns that used to require expert skill.

A teenager with no coding experience can download an AI-assisted hacking toolkit, point it at a target, and let it probe for weaknesses. The AI does the reconnaissance, generates the exploit, writes the phishing email. The attacker just clicks “run.”

Most attacks are opportunistic, not targeted. The attacker doesn’t care about you—they care about finding someone vulnerable. They scan ten thousand systems, find fifty with outdated software, exploit five that don’t have backups, and move on.

Basic hygiene still works because it removes you from the opportunistic pool. Software updates close known holes. Strong passwords (long, random, unique per account) resist automated cracking. Two-factor authentication blocks stolen credentials. None of this stops a determined attacker with resources—but it stops the automated sweep.

Close

The adversarial loop doesn’t end. It evolves.

AI is the latest evolution, not the final one. What changes is the speed and scale, not the fundamental structure. Attackers probe, defenders patch, attackers adapt. The cycle has run for fifty years and will run for fifty more.

Security remains a process, not a product. The process just got faster.

Companion lab

Asymmetric Search Costs

Finding one weakness in a system costs less than securing every possible entry point—attackers need one success while defenders need zero failures, creating a structural imbalance that determines how resources flow in any adversarial contest.

Try the lab

Then check the pattern