How GenAI Is Becoming A Prime Target For Cyberattacks

Generative AI News

How GenAI Is Becoming A Prime Target For Cyberattacks
GenaiAI SecurityPillar Security
  • 📰 ForbesTech
  • ⏱ Reading Time:
  • 342 sec. here
  • 14 min. at publisher
  • 📊 Quality Score:
  • News: 164%
  • Publisher: 59%

Tony Bradley is a reporter who covers the cybersecurity industry and the cross-section of technology and entertainment. He has been a Forbes contributor since 2014. He is the founder and editor of TechSpective and a senior PR manager with NetApp.

As generative AI continues to revolutionize industries such as healthcare, finance, and customer service, it also presents unprecedented risks for cybersecurity. While these systems are transforming how organizations leverage data and automation, they are also emerging as prime targets for increasingly sophisticated attacks.

According to Pillar Security’s “With attackers exploiting GenAI’s inherent vulnerabilities, the need for advanced, AI-driven defenses has never been more urgent.GenAI models have quickly become essential for businesses seeking innovation and efficiency. They power applications like chatbots, content generation, and decision-making systems. However, the very capabilities that make GenAI so transformative also expose it to unique threats. Models trained on large datasets often lack sufficient safeguards, making them vulnerable to attacks like prompt injection, data poisoning, and model manipulation. These weaknesses are particularly concerning because traditional security measures often fall short in detecting and mitigating attacks targeting GenAI. GenAI operates in a black box fashion, where the intricacies of its decision-making processes are not always transparent. This opacity creates opportunities for attackers to exploit the model’s behavior. By inserting malicious inputs—often disguised as legitimate requests—attackers can alter the model's responses, manipulate its data, or even extract confidential information embedded in its training data. The stakes are high: a successful attack on a GenAI system could result in widespread misinformation, financial loss, or a breach of sensitive data.highlights the alarming nature of GenAI-focused attacks. Unlike traditional cyberattacks, which often involve a series of complex steps and human interactions, attacks on GenAI systems are highly automated and executed at lightning speed. In fact, the average time for a successful attack is just 42 seconds, requiring minimal interaction from the attacker. This speed and efficiency mean that security teams have less time to detect and respond to an intrusion.Northern Lights Alert: Here’s Where Aurora Borealis Can Be Seen Tonight—As Forecasters Predict Strong ShowingOne of the most prevalent attack types involves prompt injection, where an attacker provides a specially crafted input designed to manipulate the AI model’s output. For example, an AI-driven chatbot designed to answer customer service queries can be tricked into revealing confidential data or executing unintended actions. Data poisoning, another common attack, involves corrupting the dataset used to train a GenAI model, leading to incorrect predictions or behavior. These attacks are not only becoming more frequent but also more sophisticated. The attackers’ tools and tactics are evolving at the same pace as AI technologies, making it difficult for organizations to stay ahead of emerging threats.The consequences of a successful GenAI attack can be severe. Imagine a financial institution that relies on AI to automate lending decisions. A data poisoning attack could cause the AI system to approve loans for high-risk individuals, leading to significant financial losses. In healthcare, a compromised AI model used for diagnostics could make inaccurate predictions, jeopardizing patient safety. In many cases, the immediate damage from an attack is compounded by the long-term reputational and legal ramifications of a data breach. Recent reports indicate that critical industries such as defense, healthcare, and government are particularly vulnerable to GenAI breaches. The leakage of sensitive data, whether it’s personal information or proprietary business intelligence, can lead to identity theft, intellectual property theft, and even national security risks.The growing sophistication of attacks on GenAI systems underscores the urgent need for a new approach to cybersecurity. Traditional defenses, which are typically designed to protect static networks and endpoints, are not equipped to deal with the dynamic and autonomous nature of GenAI. These systems process vast amounts of data in real time, creating more opportunities for attackers to find and exploit vulnerabilities., “Generative AI has been found to be quite vulnerable to adversarial prompt injections, jailbreaks and data poisoning. It requires Generative AI Runtime Defense be used to actively defend the large language model APIs and their use cases.” Additionally, as GenAI becomes more integrated into critical business operations, the attack surface expands, making it easier for adversaries to find weak points. Each interaction with a GenAI model—whether through APIs, user inputs, or data exchanges—introduces potential entry points for cyberattacks. The decentralized nature of AI ecosystems also complicates defense efforts, as models are often trained and deployed across various environments, from cloud infrastructures to edge devices., notes, “In the near future, every application will be an AI application, that means that everything we know about security controls is changing.” AI-driven security solutions offer the most promising path forward. By leveraging AI to monitor, detect, and respond to threats in real time, organizations can gain the upper hand against attackers. These systems can analyze vast amounts of data, identify patterns of malicious behavior, and adapt to new attack vectors, all without the need for human intervention. Real-time monitoring and anomaly detection are crucial for protecting GenAI models. AI-powered defenses can analyze input data and flag any unusual or potentially malicious activity before it reaches the model. Additionally, autonomous security systems can be deployed to constantly test and update GenAI models, ensuring they remain resilient against evolving threats. Organizations should also consider integrating security into the AI development lifecycle from the outset. By embedding security measures into model training, deployment, and maintenance, businesses can reduce their exposure to risk. This proactive approach, combined with AI-driven defenses, will be essential for staying ahead of attackers in an increasingly hostile cyber environment.As the adoption of GenAI accelerates, so too does the need to secure these systems against a growing array of cyber threats. The high success rate of attacks on GenAI, as highlighted by Pillar Security’s report, underscores the urgency for organizations to rethink their cybersecurity strategies. By embracing AI-powered security solutions and adopting a proactive stance toward risk management, businesses can protect their most valuable assets and ensure the future of innovation remains secure.Our community is about connecting people through open and thoughtful conversations. We want our readers to share their views and exchange ideas and facts in a safe space.Insults, profanity, incoherent, obscene or inflammatory language or threats of any kindContinuous attempts to re-post comments that have been previously moderated/rejectedAttempts or tactics that put the site security at riskProtect your community.

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

ForbesTech /  🏆 318. in US

Genai AI Security Pillar Security Dor Sarig Lawrence Pingree Gartner State Of Attacks On Genai

 

United States Latest News, United States Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

Morgan Stanley lists stocks with 'underappreciated upside potential' from GenAIMorgan Stanley lists stocks with 'underappreciated upside potential' from GenAIMorgan Stanley lists stocks with 'underappreciated upside potential' from GenAI
Read more »

GenAI Drives On-Track Analytics For One High-Performing Race TeamGenAI Drives On-Track Analytics For One High-Performing Race TeamTor Constantino is a communications professional with 25 years experience as a former journalist and corporate communications executive with an MBA degree. His career has spanned a wide range of technological industries including telecommunications, cloud-based SaaS applications, Big Data analytics, artificial intelligence (AI), and MedTech.
Read more »

5 Easy Ways To Tell If Written Content Came From GenAI5 Easy Ways To Tell If Written Content Came From GenAITor Constantino is a communications professional with 25 years experience as a former journalist and corporate communications executive with an MBA degree. His career has spanned a wide range of technological industries including telecommunications, cloud-based SaaS applications, Big Data analytics, artificial intelligence (AI), and MedTech.
Read more »

Six Key Ways GenAI Can Enhance Your Fraud Management StrategySix Key Ways GenAI Can Enhance Your Fraud Management StrategyForrester is one of the most influential research and advisory firms in the world. We help leaders across technology, customer experience, digital, marketing, sales, and product functions use customer obsession to accelerate growth.
Read more »

Leveraging GenAI for asset managementLeveraging GenAI for asset managementLeveraging GenAI for asset management
Read more »

How GenAI Can Help Build and Scale Startups Intelligently and EthicallyHow GenAI Can Help Build and Scale Startups Intelligently and EthicallyMarco Barber Salvat discusses the potential of Generative AI (GenAI) for startups, highlighting its ability to automate processes, create content, and enhance customer interactions. He emphasizes the importance of ethical considerations and views GenAI as a tool for augmenting human staff rather than replacing them.
Read more »



Render Time: 2026-04-01 18:12:54