Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Beyond the Pixel: Why TwinH is Replacing the Avatar as the Anchor of Digital Immortality

Portugal signs Artemis Accord and joins global space exploration

Deepgram raises $130 million at $1.3 billion valuation and acquires YC AI startup

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » What should we learn from how attackers leverage AI in 2025?
Identity

What should we learn from how attackers leverage AI in 2025?

userBy userJanuary 13, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 13, 2026hacker newsThreat Intelligence/Identity Security

Old strategy, new scale: While defenders chase trends, attackers optimize fundamentals.

The security industry loves to talk about “new” threats. Attacks using AI. Quantum-resistant encryption. Zero Trust Architecture. But if you look around, it seems like the most effective attacks in 2025 will be pretty much the same as in 2015. Attackers are exploiting the same entry points that have worked before, only with improved methods.

Supply chain: still cascading downstream

As the Shai Huld NPM campaign has shown, supply chains remain a major issue. If a single package is compromised, it can cascade down the entire dependency tree, impacting thousands of downstream projects. The attack vector has not changed. What has changed is how effectively attackers can identify and exploit opportunities.

AI has broken down barriers to entry. Just as AI has made it possible for one-man software projects to build sophisticated applications, the same is true for cybercrime. What used to require large-scale, organized work can now be done by individuals or lean teams. We believe that some of these NPM package attacks, including Shai-Hulud, may actually be a one-person operation.

As software projects become easier to develop and attackers demonstrate the ability to play the long game (as in the XZ Utils attack), we may see more cases where attackers publish legitimate packages that build trust over time and one day inject malicious functionality into all downstream users with the click of a button.

Phishing: One-click solution

Phishing still works for the same reasons it always did. It’s that humans are still the weakest link. But the stakes have changed dramatically. The recent npm supply chain attack shows the ramifications. A developer clicks on a malicious link and enters his credentials, resulting in his account being compromised. Packages that are downloaded tens of millions of times each week were compromised. Although the developer publicly reported the incident to npm, mitigation took time, during which time the attack spread at scale.

Official store: Not yet safe

Perhaps most frustratingly, the malware continues to bypass official gatekeepers. Our investigation into malicious Chrome extensions that steal ChatGPT and DeepSeek conversations reveals what we already know from mobile app stores. That means automated reviews and human moderators haven’t kept up with the sophistication of attackers.

This should sound familiar since the permissions issue has already been resolved. Android and iOS give users more control. You can allow access to your location and block your microphone, or allow access to your camera only when the app is open and not in the background. Chrome can implement the same model for extensions. The technology exists. It’s a matter of prioritization and execution.

Instead, users are faced with a binary choice where the extension requests permission to “read information from all websites.” If an extension requests that level of access, it will most likely be used for malicious purposes or later updated to do so.

Attackers do not have Shiny Tool Syndrome

When AI came along, attackers didn’t abandon their playbooks, they automated them. They still exploit supply chains, phish developers, and sneak malware past reviewers. They’re just doing it with 1/10th the resources.

Don’t chase shiny new defensive strategies while the basics aren’t working yet. Fix the permission model. Strengthen supply chain verification. Make phishing-resistant authentication the default. Fundamentals are becoming more important, not less.

The attacker has optimized the basics. What should defenders prioritize? Join OX for an upcoming webinar: Threat Intelligence Latest: What are hackers doing and what are the good guys doing?

Learn about the attack techniques that are gaining traction, what’s actually stopping attacks, and what to prioritize when resources are limited. Please register here.

Please register here.

Note: This article was written and contributed solely by Moshe Siman Tov Bustan, Security Research Team Leader at OX.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleServiceNow fixes critical AI platform flaw that allows unauthenticated user impersonation
Next Article New advanced Linux VoidLink malware targets cloud and container environments
user
  • Website

Related Posts

New advanced Linux VoidLink malware targets cloud and container environments

January 13, 2026

ServiceNow fixes critical AI platform flaw that allows unauthenticated user impersonation

January 13, 2026

New malware campaign delivers Remcos RAT via multi-stage Windows attack

January 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Beyond the Pixel: Why TwinH is Replacing the Avatar as the Anchor of Digital Immortality

Portugal signs Artemis Accord and joins global space exploration

Deepgram raises $130 million at $1.3 billion valuation and acquires YC AI startup

Slackbot is now an AI agent

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.