
Redazione RHC : 1 November 2025 09:30
By Vicki Vinci, SOC Architect – International at Fortinet
The most significant technological trend of recent years is undoubtedly the advent of Artificial Intelligence, especially its generative component (GenAI). Putting aside for the moment considerations about its market adoption, it’s undeniable that this evolution has brought about a series of very significant changes in the security world.

Let’s try to analyze some use cases on which the security industry and the community have tried to focus more attention:
Starting from the first example, there is no doubt that the possibility of using GenAI tools has greatly facilitated the attackers’ task on many fronts:
At the same time, those whose mission is defense are supported by solutions capable of:
For this set of options to be implemented, one of the key elements is the availability of an LLM engine (whether public or private), which inevitably becomes the target of potential attacks. The availability, integrity, and confidentiality of content are jeopardized both individually and jointly, depending on the methodologies used.
In this regard, the modus operandi that we see being implemented by Threat Actors most frequently are:
Ultimately, the cybersecurity industry has stepped up to contribute to the defense of this increasingly crucial component of our digital economy. Mapping the types of attacks mentioned above, the solutions driving the market are:
In each of these use cases, the introduction of Artificial Intelligence tools has radically changed the quality level as well as the timeframes associated with the various phases of the attack. While human intervention was previously still a key component in some stages, today many of these activities can be delegated to machines that can both accelerate and parallelize tasks, shortening their timeframes and multiplying their volumes.
Given these premises, it becomes mandatory to provide Blue Teams with tools that can counter new attack methods, balancing both their timing and quantity. The ultimate goal is to provide analysts with the most detailed information possible, minimizing the time it takes to analyze and decide on countermeasures, when they haven’t already been implemented automatically.
As attackers increasingly leverage technology (in addition to social engineering techniques) to elevate their operations to the scale of “machine time,” defenders must also adopt strategies and tools that allow them to respond within the same timescale. Minimizing dwell time will increasingly make the difference between a successful attack and excellent response and containment capabilities.
For further information on this case, please visit the dedicated page.
Redazione