Source link : https://tech365.info/the-11-runtime-assaults-breaking-ai-safety-and-the-way-cisos-are-stopping-them-or-can-cease-them/

Enterprise safety groups are shedding floor to AI-enabled assaults — not as a result of defenses are weak, however as a result of the menace mannequin has shifted. As AI brokers transfer into manufacturing, attackers are exploiting runtime weaknesses the place breakout instances are measured in seconds, patch home windows in hours, and conventional safety has little visibility or management.

CrowdStrike’s 2025 International Menace Report paperwork breakout instances as quick as 51 seconds. Attackers are shifting from preliminary entry to lateral motion earlier than most safety groups get their first alert. The identical report discovered 79% of detections had been malware-free, with adversaries utilizing hands-on keyboard methods that bypass conventional endpoint defenses solely.

CISOs’ newest problem isn’t getting reverse-engineered in 72 hours

Mike Riemer, discipline CISO at Ivanti, has watched AI collapse the window between patch launch and weaponization.

“Threat actors are reverse engineering patches within 72 hours,” Riemer instructed VentureBeat. “If a customer doesn’t patch within 72 hours of release, they’re open to exploit. The speed has been enhanced greatly by AI.”

Most enterprises take weeks or months to manually patch, with firefighting and different pressing priorities usually taking priority.

Why conventional safety is failing at runtime

An SQL injection sometimes has a recognizable signature. Safety groups are bettering their tradecraft, and lots…

—-

Author : tech365

Publish date : 2026-01-09 19:26:00

Copyright for syndicated content belongs to the linked Source.

—-

12345678