{"id":5987,"date":"2023-10-31T06:00:00","date_gmt":"2023-10-31T13:00:00","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=5987"},"modified":"2023-10-31T06:00:00","modified_gmt":"2023-10-31T13:00:00","slug":"ai-cyber-attack-prevention","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/","title":{"rendered":"How AI Became a Double Edged-Sword for Cybersecurity"},"content":{"rendered":"\n<p>AI holds immense potential in cybersecurity, with the ability to bolster defensive measures and mitigate threats while increasing efficiencies for threat detection and response teams.&nbsp;<\/p>\n\n\n\n<p>However, malicious hackers are also wielding AI\u2019s power to conduct cyber attacks. How can companies stay one step ahead? Learning directly from the experts and the perspective of an adversary can help.&nbsp;<\/p>\n\n\n\n<p>To close out <a href=\"https:\/\/security.salesforce.com\/cybersecurity-awareness-month\/?d=cta-body-promo-8\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Awareness Month<\/a>, Elamaran Vengatraman, an ethical hacker in the <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salesforce Bug Bounty Program<\/a>, and <a href=\"https:\/\/www.linkedin.com\/in\/kelly-mccracken-b357581\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kelly McCracken<\/a>, SVP of Information Security and leader of Salesforce\u2019s incident response team, share their first-hand experience with AI-powered threats and how to adapt security protocols accordingly.<\/p>\n\n\n\n<aside class=\"contextual-driver has-text-align-left contextual-driver--einstein\">\n\t<header class=\"tidbit-header\">\n\t\t<h2 class=\"tidbit-head\">\n\t\t\tProtect yourself, your business, and your Salesforce instance with cybersecurity tips and resources.\t\t<\/h2>\n\t<\/header>\n\t<div class=\"tidbit-body\">\n\t\t<p><\/p>\t<\/div>\n\t\t\t<p class=\"tidbit-link label\">\n\t\t\t<a class=\"label has-right-arrow has-right-arrow--small\" href=\"https:\/\/security.salesforce.com\/cybersecurity-awareness-month?d=cta-body-promo-8\" target=\"_blank\">\n\t\t\t\t<span>Go here<\/span>\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 14 10\">\n\t<path d=\"M13.92 5.38a1 1 0 000-.76.9.9 0 00-.17-.26.25.25 0 000-.07l-4-4a1 1 0 00-1.46 1.42L10.59 4H1.07a1 1 0 000 2h9.52l-2.3 2.29a1 1 0 000 1.42 1 1 0 001.42 0l4-4a.25.25 0 000-.07.9.9 0 00.21-.26z\" \/>\n<\/svg>\n\t\t\t<\/a>\n\t\t<\/p>\n\t\t\t\t<img class=\"tidbit img-einstein\"\n\t\tsrcset=\"\n\t\t\thttps:\/\/www.salesforce.com\/au\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@0.5x.png 84w,\n\t\t\thttps:\/\/www.salesforce.com\/au\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@1x.png 168w,\n\t\t\thttps:\/\/www.salesforce.com\/au\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@2x.png 336w\n\t\t\"\n\t\tsrc=\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/themes\/newsroom\/assets\/images\/article-tidbit-einstein-large@1x.png\"\n\t\talt=\"Illustration of einstein\"\n\t\tsizes=\"(min-width:1024px) 175px, 130px\"\n\t>\n\t<\/aside>\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ai-is-a-game-changer-for-cybersecurity-and-it-s-both-good-and-bad-news\">AI is a game changer for cybersecurity \u2014 and it\u2019s both good and bad news<\/h2>\n\n\n\n<p>AI has paved the way for a new era of enhanced cyber defense, with the ability to analyze data to recognize anomalies, detect fraud and phishing attempts, predict behaviors, and automate tedious tasks. This not only allows security teams to increase their efficiency, but to also identify threats quickly, on a large scale, and shorten response times.&nbsp;<\/p>\n\n\n\n<p>On the other hand, Elamaran Vengatraman explained how cyber criminals are leveraging AI to exponentially increase their attack surface area and evade traditional security measures. Some common tactics include automated attacks, code generation, password cracking, exploiting zero-day vulnerabilities, and more. For example, hackers are using <a href=\"https:\/\/www.salesforce.com\/news\/stories\/what-is-generative-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">generative AI<\/a> to impersonate individuals through convincing social media profiles or fake audio recordings for social engineering attacks.&nbsp;<\/p>\n\n\n\n<p>While experts agree that proper cyber hygiene measures, like enabling <a href=\"https:\/\/security.salesforce.com\/mfa\/?d=cta-body-promo-8\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a> and fostering a <a href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/security-awareness-and-training\/?d=cta-body-promo-8\" target=\"_blank\" rel=\"noreferrer noopener\">culture of cyber awareness<\/a>, are undoubtedly effective, even the most vigilant teams can become vulnerable to one of these sophisticated cyber attacks.<\/p>\n\n\n\n<p>\u201cYou can follow every best practice, but that doesn\u2019t mean you aren\u2019t leaving a digital breadcrumb behind that AI can use against you,\u201d said McCracken. \u201cA bad hacker only has to be right once. We have to be right every time.\u201d&nbsp;<\/p>\n\n\n\n<aside class=\"more-from-block more-from-block--2 alignfull wp-block-newsroom-moreontopic\">\n\t<div class=\"more-from-block__content\">\n\t\t\t\t\t<h4 class=\"more-from-block__title\">Related<\/h4>\n\t\t\n\t\t<div class=\"more-from-block__cards more-from-block__cards--2\"\n\t\t\t\t>\n\t\t\t\n\n<article\t\t\titemscope=\"\"\n\t\titemtype=\"https:\/\/schema.org\/Article\"\n\t\tdata-card-id=\"13204\"\n\t\tclass=\"content-card content-card--large-inline is-entire-area-clickable content-card--is-boxed\"\n\t\t\tdata-clickable-area-link=\"https:\/\/www.salesforce.com\/au\/news\/stories\/agentforce-for-communications-announcement\/\"\n\t>\n\t\t\t<div class=\"content-card__image-container\" itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t\t\t<img width=\"1024\" height=\"576\" src=\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=1024\" class=\"content-card__image\" alt=\"A screenshot of the Quadstar COMS Sales Console showing an SD-WAN quote interface\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png 1200w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=1024&amp;h=576 1024w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=264&amp;h=149 264w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=500&amp;h=281 500w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=678&amp;h=381 678w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=150&amp;h=84 150w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=314&amp;h=177 314w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2026\/02\/Salesforce-Launches-Telco-Specific-Agents-to-Improve-Customer-Service-and-Maximize-Revenue.png?w=343&amp;h=193 343w\" \/>\t\t\t\t\t<\/div>\n\t\n\t<div class=\"content-card__content-container content-card__content-container--style-\">\n\t\t\n\t\t\n\t\t\t\t\t<h3 itemprop=\"headline\" class=\"content-card__title\">\n\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.salesforce.com\/au\/news\/stories\/agentforce-for-communications-announcement\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-card__title-link\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\tSalesforce Launches Agentforce for Communications to Turn Every Customer Interaction into a Growth Opportunity for Telcos\t\t\t\t<\/a>\t\t\t<\/h3>\n\t\t\n\t\t\t\t\n\t\t\n\t\t\t\t\t<div itemprop=\"readTime\" class=\"content-card__read-time\">\n\t\t\t\t6 min read\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/article>\n\n\n\n<article\t\t\titemscope=\"\"\n\t\titemtype=\"https:\/\/schema.org\/Article\"\n\t\tdata-card-id=\"13114\"\n\t\tclass=\"content-card content-card--large-inline is-entire-area-clickable content-card--is-boxed\"\n\t\t\tdata-clickable-area-link=\"https:\/\/www.salesforce.com\/au\/news\/stories\/state-of-sales-report-2026\/\"\n\t>\n\t\t\t<div class=\"content-card__image-container\" itemprop=\"image\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t\t\t<img width=\"1024\" height=\"576\" src=\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=1024\" class=\"content-card__image\" alt=\"How Conversation Design Enables Agentic AI\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png 1200w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=1024&amp;h=576 1024w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=264&amp;h=149 264w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=500&amp;h=281 500w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=678&amp;h=381 678w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=150&amp;h=84 150w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=314&amp;h=177 314w, https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2025\/12\/Lets-Talk_-How-Conversation-Design-Enables-the-Agentic-Enterprise.png?w=343&amp;h=193 343w\" \/>\t\t\t\t\t<\/div>\n\t\n\t<div class=\"content-card__content-container content-card__content-container--style-\">\n\t\t\n\t\t\n\t\t\t\t\t<h3 itemprop=\"headline\" class=\"content-card__title\">\n\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/www.salesforce.com\/au\/news\/stories\/state-of-sales-report-2026\/\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\ttarget=\"_blank\"\n\t\t\t\t\t\t\t\t\t\t\t\tclass=\"content-card__title-link\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\tThe Productivity Gap: New Survey Shows ANZ Sales Teams Are Betting On AI Agents To Help\t\t\t\t<\/a>\t\t\t<\/h3>\n\t\t\n\t\t\t\t\n\t\t\n\t\t\t\t\t<div itemprop=\"readTime\" class=\"content-card__read-time\">\n\t\t\t\t6 min read\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/article>\n\n\t\t<\/div>\n\t\t<noscript>\n<div class=\"pagination-fallback\">\n\n\t\t<a href=\"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/posts\/5987\/page\/2\/?bc=OTH#section-title\">\n\t\t\tOlder Posts\t\t<\/a>\n\t\t<\/div>\n<\/noscript>\n\t<\/div>\n<\/aside>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ai-is-only-as-good-as-the-data-that-powers-it\"><strong>AI is only as good as the data that powers it<\/strong><\/h2>\n\n\n\n<p>The biggest threats with AI in cybersecurity aren\u2019t always from external adversaries. AI models are powered by data, and if that data is outdated, incomplete, or introduces bias, it can greatly skew the results. For instance, biases in data could result in false positives, and incomplete data could limit visibility on viable security risks or not recognize an emerging threat altogether.&nbsp;<\/p>\n\n\n\n<p>\u201cDiscrepancies, overlooking anomalies, and introducing biases within AI models can significantly erode trust in an organization,\u201d said McCracken. \u201cTo help stay ahead of these possible pitfalls, human interaction and oversight is crucial. Cybersecurity professionals should continually monitor the AI models and prioritize transparency in the decision-making process.\u201d<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>To help stay ahead of these possible pitfalls, human interaction and oversight is crucial. Cybersecurity professionals should continually monitor the AI models and prioritize transparency in the decision-making process.<\/p>\n<cite>Kelly McCracken, SVP of Information Security<\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-collaboration-is-critical-for-staying-ahead-of-evolving-cyber-threats\"><strong>Collaboration is critical for staying ahead of evolving cyber threats<\/strong><\/h2>\n\n\n\n<p>According to Elamaran Vengatraman, even the most effective intel tactics may soon become outdated as hackers learn new ways to leverage AI. \u201cAs the technology advances, attackers are developing AI models to circumvent AI-based security measures. Companies must work together to adapt their defense accordingly,\u201d he added.&nbsp;<\/p>\n\n\n\n<p>Building relationships with vendors, partners, and government agencies is among the most effective, proactive measures to help stay ahead of evolving AI-powered cyber threats. Experts agree that sharing information about threat intelligence, emerging threats, and potential vulnerabilities helps protect the entire digital ecosystem and reinforces trust in the event of a breach.&nbsp;<\/p>\n\n\n\n<p>Companies should also prioritize relationships with ethical hackers through <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bug Bounty<\/a> programs and <a href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\" target=\"_blank\" rel=\"noreferrer noopener\">live hacking events<\/a>. With ethical hackers like Elamaran Vengatraman helping to inform security teams on criminal hackers\u2019 tactics, companies gain an advantage and can stay ahead of the malicious hacking trends.<\/p>\n\n\n\n<p>Experts say that bug bounty programs, combined with a collaborative approach, is the best way to protect against malicious actors.<\/p>\n\n\n\n<p>\u201cCybersecurity is a shared responsibility, and we are stronger together,\u201d said McCracken. \u201cI guarantee we are all going to need to lean on one another at some point, and having established relationships before an incident occurs leads to better outcomes.\u201d<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-explore-further\">Explore further<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn more about <a href=\"https:\/\/www.salesforce.com\/news\/stories\/why-salesforce-paid-hackers-2-8m-in-2021-to-break-into-its-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salesforce\u2019s Bug Bounty program<\/a> and recent <a href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-event\/\" target=\"_blank\" rel=\"noreferrer noopener\">live hacking event<\/a>\u00a0<\/li>\n\n\n\n<li>Hear from one of Salesforce\u2019s top ethical hackers about his <a href=\"https:\/\/www.salesforce.com\/news\/stories\/salesforce-bug-bounty-program-swinnen\/\" target=\"_blank\" rel=\"noreferrer noopener\">bug bounty experience<\/a><\/li>\n\n\n\n<li>Check out Salesforce\u2019s cybersecurity tips and resources <a href=\"https:\/\/security.salesforce.com\/security-best-practices\/?d=cta-body-promo-8\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li>\n\n\n\n<li>Learn more about how to leverage AI without compromising security <a href=\"https:\/\/reprints2.forrester.com\/#\/assets\/2\/177\/RES179522\/report\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>AI holds immense potential in cybersecurity, with the ability to bolster defensive measures and mitigate threats while increasing efficiencies for threat detection and response teams.&nbsp; However, malicious hackers are also wielding AI\u2019s power to conduct cyber attacks. How can companies stay one step ahead? Learning directly from the experts and the perspective of an adversary [&hellip;]<\/p>\n","protected":false},"author":128,"featured_media":5988,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"sf_subhead":"","sf_i18n_disclaimer":false,"_jetpack_memberships_contains_paid_content":false,"alternateThumbnailId":0,"sf_product_cta_id":0,"footnotes":""},"categories":[],"tags":[],"sf_content_type":[1099],"sf_theme":[1115],"sf_topic":[1092,1093],"sf_product":[],"sf_industry":[],"sf_role":[],"sf_multimedia_asset":[],"sf_location":[1094],"sf_collection":[],"sf_visibility":[],"coauthors":[1206],"class_list":["post-5987","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_content_type-snapshots","sf_theme-digital-transformation","sf_topic-artificial-intelligence","sf_topic-digital-transformation","sf_location-global"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How AI Became a Double Edged-Sword for Cybersecurity - Salesforce<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI Became a Double Edged-Sword for Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"AI holds immense potential in cybersecurity, with the ability to bolster defensive measures and mitigate threats while increasing efficiencies for threat detection and response teams.&nbsp; However, malicious hackers are also wielding AI\u2019s power to conduct cyber attacks. How can companies stay one step ahead? Learning directly from the experts and the perspective of an adversary [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lindsey Swartz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lindsey Swartz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/#\/schema\/person\/image\/60dd99cfa81c2d2ef042e5f4a01687c3\"}],\"headline\":\"How AI Became a Double Edged-Sword for Cybersecurity\",\"datePublished\":\"2023-10-31T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\"},\"wordCount\":753,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg\",\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\",\"name\":\"How AI Became a Double Edged-Sword for Cybersecurity - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg\",\"datePublished\":\"2023-10-31T13:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/#\/schema\/person\/166c24b185a9ea6a1fae7869cc3d1e5f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/au\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How AI Became a Double Edged-Sword for Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/news\/\",\"name\":\"Salesforce\",\"description\":\"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/news\/#\/schema\/person\/image\/60dd99cfa81c2d2ef042e5f4a01687c3\",\"name\":\"Lindsey Swartz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Lindsey Swartz\"},\"url\":\"https:\/\/www.salesforce.com\/au\/news\/stories\/author\/lindseyswartz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How AI Became a Double Edged-Sword for Cybersecurity - Salesforce","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/","og_type":"article","og_title":"How AI Became a Double Edged-Sword for Cybersecurity","og_description":"AI holds immense potential in cybersecurity, with the ability to bolster defensive measures and mitigate threats while increasing efficiencies for threat detection and response teams.&nbsp; However, malicious hackers are also wielding AI\u2019s power to conduct cyber attacks. How can companies stay one step ahead? Learning directly from the experts and the perspective of an adversary [&hellip;]","og_url":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/","og_site_name":"Salesforce","article_published_time":"2023-10-31T13:00:00+00:00","og_image":[{"width":1200,"height":675,"url":"http:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg","type":"image\/jpeg"}],"author":"Lindsey Swartz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lindsey Swartz","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/news\/#\/schema\/person\/image\/60dd99cfa81c2d2ef042e5f4a01687c3"}],"headline":"How AI Became a Double Edged-Sword for Cybersecurity","datePublished":"2023-10-31T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/"},"wordCount":753,"image":{"@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg","inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/","url":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/","name":"How AI Became a Double Edged-Sword for Cybersecurity - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg","datePublished":"2023-10-31T13:00:00+00:00","author":{"@id":"https:\/\/www.salesforce.com\/au\/news\/#\/schema\/person\/166c24b185a9ea6a1fae7869cc3d1e5f"},"breadcrumb":{"@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg","contentUrl":"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/au\/news\/stories\/ai-cyber-attack-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/au\/news\/"},{"@type":"ListItem","position":2,"name":"How AI Became a Double Edged-Sword for Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/news\/#website","url":"https:\/\/www.salesforce.com\/au\/news\/","name":"Salesforce","description":"Get the latest Salesforce press releases, announcements, stories, and media contacts. See today\u2019s CRM news.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/news\/#\/schema\/person\/image\/60dd99cfa81c2d2ef042e5f4a01687c3","name":"Lindsey Swartz","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Lindsey Swartz"},"url":"https:\/\/www.salesforce.com\/au\/news\/stories\/author\/lindseyswartz\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/news\/wp-content\/uploads\/sites\/19\/2023\/12\/Cybersecurity.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/news","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/posts\/5987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/users\/128"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/comments?post=5987"}],"version-history":[{"count":0,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/posts\/5987\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/media\/5988"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/media?parent=5987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/categories?post=5987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/tags?post=5987"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_content_type?post=5987"},{"taxonomy":"sf_theme","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_theme?post=5987"},{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_topic?post=5987"},{"taxonomy":"sf_product","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_product?post=5987"},{"taxonomy":"sf_industry","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_industry?post=5987"},{"taxonomy":"sf_role","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_role?post=5987"},{"taxonomy":"sf_multimedia_asset","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_multimedia_asset?post=5987"},{"taxonomy":"sf_location","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_location?post=5987"},{"taxonomy":"sf_collection","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_collection?post=5987"},{"taxonomy":"sf_visibility","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/sf_visibility?post=5987"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/news\/wp-json\/wp\/v2\/coauthors?post=5987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}