Years ago, a forgotten temporary credential or a cloud service with extensive permits were, above all, operational problems: technical debt that would be met at some point. Today the equation changed. Artificial intelligence capabilities have compressed weeks of attack recognition and planning in minutes, which makes morning negligence an active threat before lunch.
The rate at which vulnerabilities are exploited has grown dramatically. Studies of the sector show that a significant proportion of failures are taken advantage of at the same time or very shortly after their disclosure; in addition, the automated scan activity driven by IA reaches volumes that were unthinkable just a few years ago. The risk management analysis published by VulnCheck and Fortinet's report on the explosion of automated attacks global level. These works make it clear that the problem is no longer just the existence of vulnerabilities, but the speed and context with which those that really allow to reach critical assets are selected and chained.

The essential difference is that the IA adds efficient context: as long as human teams drown in alerts, automated agents filter and prioritize what can really be useful to advance laterally within an infrastructure. They seek not only the most serious failure, but the combinations of medium and neglected failures that, together, form a viable attack route.. This makes it dangerous, scattered pieces of "noise" that were previously considered low priority.
A vector that becomes especially attractive to attackers is the proliferation of machine identities. The modern infrastructure is populated by keys, tokens and service accounts that multiply the access vectors. When a malicious actor can chart how these credentials are exchanged between development environments, automations and backup, climbing to production systems becomes a problem of drawing rather than discovery. Technology organizations and security manufacturers have long been warning about this phenomenon; Microsoft, for example, documents in its annual report the attacks that take advantage of configurations and identities in cloud environments in your Digital Defense Report.
The concrete techniques with which the IA accelerates the attack do not always involve new exploits: it is often the scale and the mix that changes the equation. Automated tools can channel minor vulnerabilities, obsolete credentials and configuration errors in a matter of minutes; processes that previously required weeks of manual research are now carried out in fractions of time. This automation also facilitates large-scale social engineering: messages and messages with plausible tone and corporate context, created by models, scale up the effectiveness of phishing and deceive employees who under normal conditions would detect warning signals.
In addition to accelerating attacks on traditional infrastructure, the internal adoption of IA models opens up new and specific attack surfaces. When conversational agents or attendees connect with internal data, there is a risk that they will be manipulated for undue consultation: an injection of malicious instructions into a public entrance may cause a legitimate agent to recover sensitive information. Community projects such as OWASP LLM Security they gather research and guidelines on these types of vectors, commonly known as "prompt injection" or attacks of confusion by the delegate.
Another less visible but far-reaching risk is the contamination of vector memories or warehouses. If an agent incorporates corrupt or malicious data into his body of knowledge, these false assumptions can then be served to legitimate users, functioning as a sleeping internal threat difficult to detect by traditional endpoints monitoring tools. At the same time, the software supply chain is exposed to "squatting" tactics and package supplanting: attackers can anticipate names of units suggested by encoding assistants and record malicious packages before legitimate suppliers, a problem known since the discussion on "dependent confusion" and documented by platforms such as GitHub and in studies on the safety of supply chain such as Sonatype.
In view of this scenario, traditional defense tactics - grabbing by numerical priority, multiplying alerts, or measuring progress in volume of tickets - show their limits. The key is no longer just how many problems are encountered and it becomes which of those problems allow an opponent to move to what we care most about.. This is the premise of emerging practices such as continuous risk exposure management: it is not a question of putting out isolated fires, but of identifying and closing the convergence points where several exposures combine to create an attack route.
The practical strategy requires moving several elements at the same time. On the one hand, strengthen basic controls with rigour: minimum privileged policies in services and roles, rotation and centralized management of credentials, updated inventories of machine identities and segmentation that breaks simple side chains. On the other hand, incorporate analyses that model potential attack routes, so that the mitigation is prioritized by their ability to "deactivate" multiple paths with one intervention. In addition, IA agents and their access should be implemented with validation policies, context limits and audit to minimize the surface of prompt injection and the possibility of vector memories being poisoned.

The role that IA's own tools can play in defense is no less: well-trained models and analysis pipelines can help to detect patterns of chaining, identity anomalies and remediation recommendations that point to high-effect cutting points. Institutions and standardisation bodies also provide frameworks for addressing these risks in a systematic manner, for example, the work of the NIST on risk management in IA provides guidance to help integrate security and technological governance.
The conclusion is clear and urgent: It is not enough to speed up patches or to rely on retrospective processes; roads must be closed before the IA can draw them and exploit them.. To achieve this, there is a need for a solid mix of operational hygiene, visibility focused on attack routes and specific policies to protect both the traditional infrastructure and the IA systems that organizations adopt. Only then will we recover the time that the adversary automation has stolen from us and we can continue to operate with a controlled risk in this new era.
If you want to go into any of these points - for example, how to model attack routes with your own data, or what specific controls to prioritize tomorrow - I can develop practical guides adapted to different environments (native cloud, hybrid, or teams with strong IA dependencies).
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...