{"id":19913,"date":"2026-04-28T11:22:23","date_gmt":"2026-04-28T11:22:23","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/19913\/"},"modified":"2026-04-28T11:22:23","modified_gmt":"2026-04-28T11:22:23","slug":"attack-of-the-killer-script-kiddies","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/19913\/","title":{"rendered":"Attack of the killer script kiddies"},"content":{"rendered":"<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _17nnmdy6 _17nnmdy5 _1xwtict1\">Last August, some of the best cybersecurity teams in the business gathered in Las Vegas to demonstrate the strength of their AI bug-finding systems at DARPA\u2019s Artificial Intelligence Cyber Challenge (AIxCC). The tools had scanned 54 million lines of actual software code that DARPA had injected with artificial flaws. The teams were capable enough to identify most of the artificial bugs, but their automated tools went beyond that \u2014 they found more than a dozen bugs that DARPA hadn\u2019t inserted at all.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Even before the security earthquake that Anthropic delivered this month with Claude Mythos \u2014 the new AI model that seems to find vulnerabilities in every piece of software it\u2019s pointed at \u2014 automated systems were growing increasingly capable of finding coding flaws. And fears are growing that not only can AI detect these flaws, but also be used to exploit them, putting hacking skills into the hands of everyone across the planet.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup qnnwq2 _1xwtict9\">\u201cMythos or not, this is coming.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">This isn\u2019t an empty threat. For decades, this type of no-skill hacker, known as a script kiddie, has wreaked havoc, running scripts they ripped from the internet or copied from exploit tool kits. They didn\u2019t fully understand or have the technical know-how to write these scripts themselves. And yet they were still able to deface websites and propagate viruses.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">What\u2019s happening now represents a major escalation, where people without technical backgrounds are able to use AI to enhance their capabilities in a way that wasn\u2019t possible with simple scripts. It is likely to have far more wide-reaching repercussions.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cThere\u2019s a tidal wave coming. You can see it. We can all see it,\u201d said Dan Guido, CEO and cofounder of cybersecurity firm Trail of Bits, which was a runner-up in the challenge. \u201cAre you going to lay down and die, or are you going to do something about it?\u201d<\/p>\n<p><a class=\"kqz8fh1\" href=\"https:\/\/platform.theverge.com\/wp-content\/uploads\/sites\/2\/2026\/04\/rogers-script-kiddies-Spot-1.jpg?quality=90&amp;strip=all&amp;crop=0,0,100,100\" data-pswp-height=\"2150\" data-pswp-width=\"2000\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"><img alt=\"\" data-chromatic=\"ignore\" loading=\"lazy\" decoding=\"async\" data-nimg=\"fill\" class=\"x271pn0\" style=\"position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image\/svg+xml;charset=utf-8,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' %3E%3Cfilter id='b' color-interpolation-filters='sRGB'%3E%3CfeGaussianBlur stdDeviation='20'\/%3E%3CfeColorMatrix values='1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1' result='s'\/%3E%3CfeFlood x='0' y='0' width='100%25' height='100%25'\/%3E%3CfeComposite operator='out' in='s'\/%3E%3CfeComposite in2='SourceGraphic'\/%3E%3CfeGaussianBlur stdDeviation='20'\/%3E%3C\/filter%3E%3Cimage width='100%25' height='100%25' x='0' y='0' preserveAspectRatio='none' style='filter: url(%23b);' href='data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mN8+R8AAtcB6oaHtZcAAAAASUVORK5CYII='\/%3E%3C\/svg%3E&quot;)\"   src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/rogers-script-kiddies-Spot-1.jpg\"\/><\/a><\/p>\n<p>Image: Joseph Rogers \/ The Verge<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _17nnmdy6 _17nnmdy5 _1xwtict1\">Even beyond Project Glasswing, Anthropic is trying to prevent the misuse of its software by criminals. A week after announcing Mythos, the company released Claude Opus 4.7, which for the first time built in safeguards meant to block malicious cybersecurity requests. (Security professionals who want to use the model defensively can apply to the company\u2019s Cyber Verification Program.)<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Anthropic\u2019s announcement of Mythos sent shockwaves throughout the industry, but there were warning signs of AI\u2019s cybersecurity prowess prior to it. In June 2025, the autonomous offensive security platform XBOW beat out human hackers to top the leaderboard of HackerOne, a bug bounty platform, indicating big leaps in the ability of AI models to find bugs.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">By the time AIxCC rolled around, \u201cthere were already 10 to 20 different bug-finding systems that could find orders of multitude more bugs than we could patch,\u201d Guido said.\u201cThis is actually not a new problem.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup qnnwq2 _1xwtict9\">\u201c2026 is the year when all security debt comes due\u2026 2026 is the make-it-or-break-it year.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">AI is great at pattern matching, and it\u2019s becoming easier and easier for people to find variants of bugs that are already known and ones that have not yet been discovered. And writing exploits is becoming easier as well.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cYou can use AI tools and with very minimal human guidance, and in some cases no human guidance, find a zero day in widely used software,\u201d said Tim Becker, senior security researcher at Theori, which was also a finalist in the competition.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">The concern is palpable across the industry, and improvements to models \u2014 along with improved understanding of their capabilities \u2014 are happening at lightning speed.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Open-weight models, or models whose trained parameters (also known as weights) are publicly available, also pose risk. In fact, sophisticated threat actors would be far more likely to run their own deployments to prevent the exploits from being exposed on Anthropic or OpenAI servers, Becker said, as Anthropic <a href=\"https:\/\/developers.openai.com\/api\/docs\/guides\/your-data#types-of-data-stored-with-the-openai-api\" rel=\"nofollow noopener\" target=\"_blank\">may retain data to monitor abuse<\/a>. And the industry is bracing for what may come next. Other model creators may not be as cautious as Anthropic, potentially unleashing their powerful new tools straight to the public.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cMythos or not, this is coming,\u201d Guido says.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Mythos represents a step up at writing exploits, but current models are capable, too. Security researchers are already using more widely available models to report vulnerabilities to vendors before they\u2019re exploited in the wild. That means there\u2019s also the risk of malicious actors using them for ill purposes, such as creating exploits for oppressive regimes or stealing sensitive data on their own.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Industry experts predict that the advancement in AI security capabilities is going to lead to a lot more exploits. Bad actors could direct AI to find bugs in uncommon pieces of software that no one previously would have put in the effort to exploit.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup qnnwq2 _1xwtict9\">\u201cThe bar to diving into a new million-line codebase and finding a bug is so much lower than it used to be.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cNow, because effort is cheap, you can do things that are lower down the food chain. You can write exploits for software that only one company has. You can write exploits for software that exists in only one configuration that one company has. And you can do it on the fly. So during the middle of an intrusion into some hospital and there\u2019s a wall standing between you and what you want, you can just point an LLM at that wall and say, \u2018Figure out a flaw here,\u2019 and it can grind until it\u2019s successful. And it\u2019ll find some vulnerability, it can find some configuration, it\u2019ll run an exploit, for a weakness that no one ever has before, and it\u2019ll do it with almost no effort on the part of the user\u2026 the hacker\u2026 the script kiddie,\u201d said Guido.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">This supercharges script kiddies, he says, because they\u2019ll be able to operate on their feet without the constraints of memorizing the weaknesses in random UNIX utilities but instead defaulting to the pretraining in the tool they are using. They\u2019ll be able to iterate through exploits targeting weaknesses at machine speed, something that no human \u2014 let alone script kiddie \u2014 can do.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">It\u2019s hard to determine exactly how much this is improving attacker capabilities, though there definitely <a href=\"https:\/\/ringmast4r.substack.com\/p\/we-may-be-living-through-the-most\" rel=\"nofollow noopener\" target=\"_blank\">seems to be a correlation<\/a>. Security researchers can help us try to wrap our heads around the scale of bugs being discovered.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Before Becker started working on automatic bug finding with AI, he worked on vulnerability research, finding zero days and reporting them to maintainers. He said it used to take him weeks or months to find a high-impact vulnerability in a brand-new codebase, and now it only takes hours.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cI just drop the code into our AI bug-finding tool and in a couple hours I get a report with a bunch of candidate vulnerabilities, and most of them end up checking out and being real issues,\u201d he said. \u201cThe bar to diving into a new million-line codebase and finding a bug is so much lower than it used to be.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _17nnmdy6 _17nnmdy5 _1xwtict1\">Every release of an automated tool has led to some level of panic about how it might be exploited, whether that\u2019s text-to-image generators or open-source tools like the exploit development and delivery system Metasploit. The panic even goes back to 1995, when a free software vulnerability scanner named<a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_Administrator_Tool_for_Analyzing_Networks\" rel=\"nofollow noopener\" target=\"_blank\"> SATAN<\/a> (an acronym for Security Administrator Tool for Analyzing Networks) was released.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup qnnwq2 _1xwtict9\">\u201cYou can just point an LLM at that wall and say, \u2018Figure out a flaw here,\u2019 and it can grind until it\u2019s successful.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Often automated tools don\u2019t lead to the same level of mayhem that had been expected or predicted, due to prevention measures put in place, low adoption rates by attackers, or other factors.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Joshua Saxe, CTO and cofounder of Security Superintelligence Labs, <a href=\"https:\/\/joshuasaxe181906.substack.com\/p\/exploits-dont-cause-cyberattacks\" rel=\"nofollow noopener\" target=\"_blank\">wrote in a blog post<\/a> that exploits themselves don\u2019t cause cyberattacks, and that adoption of AI vulnerability research tools has been incremental.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cThere seems to be an implicit mental model where some new adversarial tool becomes available&#8230; and therefore we will immediately see criminal behavior with those tools. It\u2019s a kind of mental model where you don\u2019t even have to think about or do any empirical inquiry into what the humans are actually doing,\u201d he told The Verge.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Saxe points out that it\u2019s possible there\u2019ll be friction in various attacker constituencies adopting these tools within their existing workflows and organization cultures.\u201cThere\u2019s a whole human and organizational element here,\u201d he said.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cIt may be that there are certain attacker constituencies that are going to jump on these new tools, or it might be that the adoption curve is quite slow.\u201d Some may keep breaking into networks by phishing or using exploits they already have, while others might begin developing new exploits using these tools.<\/p>\n<p><a class=\"kqz8fh1\" href=\"https:\/\/platform.theverge.com\/wp-content\/uploads\/sites\/2\/2026\/04\/rogers-script-kiddies-Spot-2.jpg?quality=90&amp;strip=all&amp;crop=0,0,100,100\" data-pswp-height=\"1918\" data-pswp-width=\"2000\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"><img alt=\"\" data-chromatic=\"ignore\" loading=\"lazy\" decoding=\"async\" data-nimg=\"fill\" class=\"x271pn0\" style=\"position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent;background-size:cover;background-position:50% 50%;background-repeat:no-repeat;background-image:url(&quot;data:image\/svg+xml;charset=utf-8,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' %3E%3Cfilter id='b' color-interpolation-filters='sRGB'%3E%3CfeGaussianBlur stdDeviation='20'\/%3E%3CfeColorMatrix values='1 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 100 -1' result='s'\/%3E%3CfeFlood x='0' y='0' width='100%25' height='100%25'\/%3E%3CfeComposite operator='out' in='s'\/%3E%3CfeComposite in2='SourceGraphic'\/%3E%3CfeGaussianBlur stdDeviation='20'\/%3E%3C\/filter%3E%3Cimage width='100%25' height='100%25' x='0' y='0' preserveAspectRatio='none' style='filter: url(%23b);' href='data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mN8+R8AAtcB6oaHtZcAAAAASUVORK5CYII='\/%3E%3C\/svg%3E&quot;)\"   src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/rogers-script-kiddies-Spot-2.jpg\"\/><\/a><\/p>\n<p>Image: Joseph Rogers \/ The Verge<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _17nnmdy6 _17nnmdy5 _1xwtict1\">While the rate of adoption is impossible to predict, there are steps companies can take to prepare for the coming onslaught of vulnerability reports.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Katie Moussouris, founder and CEO of Luta Security, coined the term \u201c<a href=\"https:\/\/www.lutasecurity.com\/post\/vulnapalooza-why-anthropic-s-mythos-is-the-loudest-headliner-nobody-bought-tickets-to\" rel=\"nofollow noopener\" target=\"_blank\">Vulnapalooza<\/a>\u201d in a blog post complete with a concert poster and festival survival guide for security teams, explaining that this is the moment for companies to secure their weaker points. The advice for companies is not different from standard best practices: segmentation, working on identity and access management, using memory-safe code, and using phishing-resistant authentication and up-to-date software.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">The Cloud Security Alliance <a href=\"https:\/\/labs.cloudsecurityalliance.org\/mythos-ciso\/\" rel=\"nofollow noopener\" target=\"_blank\">released an expedited strategy briefing<\/a> on developing a \u201cMythos-ready\u201d security plan detailing many of these concepts. The report also emphasized the need to not only patch vulnerabilities but also to identify which ones to prioritize. But the need to match machine speed threats is new, and the amount of bug reports is already skyrocketing, leading to the need to prepare for more incidents and mitigate and contain them at a faster rate.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Moussouris says that many people in cybersecurity roles have been laid off because of AI\u2019s efficiencies, even though those efficiencies are exactly why more humans need to remain in the mix. Companies will need human threat hunters, threat intelligence officers, and incident responders to deal with the onslaught of new exploits. And they\u2019ll need people to decide which patches to prioritize and implement.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cWe don\u2019t have the AI defensive equivalent to automate all of those tasks, and I think we\u2019re going to need to staff up and hire a lot of people,\u201d she said. And organizations will need to build out secure software and secure architecture for networks to avoid ending up in an endless cycle of patching. \u201cYou have to build more secure software in the first place. We can\u2019t incident respond our way to resilience.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Organizations that aren\u2019t ready to hire people could at least streamline their vendor onboarding processes to make it easier to bring on people or services as needed. \u201cYou don\u2019t want to be stuck in a four-month procurement process for a vendor when you\u2019re under fire and can\u2019t keep up with the patch rollout,\u201d Moussouris said.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _17nnmdy6 _17nnmdy5 _1xwtict1\">While many are concerned about vulnerabilities, Moussouris believes the so-called \u201cvulnpocalypse\u201d will actually manifest as a \u201cpatchpocalypse.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cThe model has already identified thousands of vulnerabilities, and that patch tsunami that\u2019s about to come from this coordination effort, that\u2019s going to be the first major pain point,\u201d she said.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Organizations that are slow to patch their systems may have a rude awakening. Waiting too long risks active attacks on services that target vulnerabilities found by AI, perhaps even using exploits written by the models.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cFrom the time a vulnerability is announced to the time where there is exploit code available has now shrunk to pretty much zero, and that is a major adjustment that I think people will have to take into account in their risk assessments and how long they can take to do things and how many resources they are applying towards this problem,\u201d she explained.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">There is an opportunity to use AI to at least speed up the remediation or mitigation process. Becker says that Theori is building a commercial tool called Xint that it\u2019s been running on open-source codebases, manually reporting high-severity findings to maintainers by sending detailed reports along with remediation suggestions on its own dime, both as a community hardening project and to demonstrate the tool\u2019s capabilities. Xint\u2019s current version was <a href=\"https:\/\/go.xint.io\/xint-mythos-appsec-findings-report\" rel=\"nofollow noopener\" target=\"_blank\">able to find all the bugs Mythos did<\/a> when scanning the same codebases. It also found 12 additional zero-day vulnerabilities that were not part of Anthropic\u2019s announcement.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">But mitigating these bugs will not be as quick as finding them because it requires engineers who are extremely familiar with the codebase to determine whether the patches are the best way to fix the issues found or whether they may make the code less maintainable or harder to understand in the future. Sometimes a patch represents a way to fix a problem, but not the best way, so it\u2019ll take human time and effort to get the solutions to the finish line.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">The huge surge in bugs being reported can lead to a long queue of things to patch, especially for <a href=\"https:\/\/xkcd.com\/2347\/\" rel=\"nofollow noopener\" target=\"_blank\">open-source maintainers<\/a>, who may be unable to keep up with the load.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">While not all bugs are useful in an attacker\u2019s tool kit, sorting through the pile to determine which ones are a priority to fix can be almost as difficult as fixing them.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">\u201cA lot of the prioritization needs to be contextual,\u201d Moussouris said. For example, a very bad bug running internally that would be hard for an outsider to access might be lower priority than a less critical bug that is exposed on the company\u2019s perimeter.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Beyond prioritization of bugs, organizations will also need to decide when to apply patches that restrict functionality and may even lead to downtime, and when to wait. The fewer security controls they have in place, the more time they will need for patching.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Simply putting out a patch makes it easier for attackers to reverse engineer the bug fix and exploit vulnerabilities they may have been otherwise unaware of on devices that have not yet been updated. That means that consumers, too, will need to get used to updating their software as critical fixes for security flaws increase dramatically. And organizations will want to invest in secure architecture to minimize the amount of patches they need to manage in the first place.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup qnnwq2 _1xwtict9\">\u201cThe thing is, it\u2019s now or never. There\u2019s a tidal wave coming.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">But as Moussouris frames it, it doesn\u2019t have to be a reason to despair. \u201cYou don\u2019t have to treat it like this is going to be the worst thing that ever happened,\u201d she told The Verge. \u201cYou can treat it like, this is our opportunity to shore up some defenses and get some budget to do things we\u2019ve been putting off.\u201d<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _1xwtict1\">Whatever attitude organizations take, they need to be prepared. The stakes are higher, and even script kiddies have a lot more opportunities to find and exploit vulnerabilities. Companies need a plan to deal with this new threat of AI-enabled attacks.<\/p>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph _1ymtmqpi _17nnmdy1 _17nnmdy0 _17nnmdya _1xwtict1\">\u201c2026 is the make-it-or-break-it year,\u201d Guido said. Companies need to secure their systems now, while they still have time to get ahead. \u201cAnd if they don\u2019t do that, we\u2019re going to end 2026 with everything on fire.\u201d<\/p>\n<p>Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.Yael GrauerClose<\/p>\n<p>Yael Grauer<\/p>\n<p class=\"fv263x1\">Posts from this author will be added to your daily email digest and your homepage feed.<\/p>\n<p>FollowFollow<\/p>\n<p class=\"fv263x4\"><a class=\"fv263x5\" href=\"https:\/\/www.theverge.com\/authors\/yael-grauer\" rel=\"nofollow noopener\" target=\"_blank\">See All by Yael Grauer<\/a><\/p>\n<p>AIClose<\/p>\n<p>AI<\/p>\n<p class=\"fv263x1\">Posts from this topic will be added to your daily email digest and your homepage feed.<\/p>\n<p>FollowFollow<\/p>\n<p class=\"fv263x4\"><a class=\"fv263x5\" href=\"https:\/\/www.theverge.com\/ai-artificial-intelligence\" rel=\"nofollow noopener\" target=\"_blank\">See All AI<\/a><\/p>\n<p>SecurityClose<\/p>\n<p>Security<\/p>\n<p class=\"fv263x1\">Posts from this topic will be added to your daily email digest and your homepage feed.<\/p>\n<p>FollowFollow<\/p>\n<p class=\"fv263x4\"><a class=\"fv263x5\" href=\"https:\/\/www.theverge.com\/cyber-security\" rel=\"nofollow noopener\" target=\"_blank\">See All Security<\/a><\/p>\n<p>TechClose<\/p>\n<p>Tech<\/p>\n<p class=\"fv263x1\">Posts from this topic will be added to your daily email digest and your homepage feed.<\/p>\n<p>FollowFollow<\/p>\n<p class=\"fv263x4\"><a class=\"fv263x5\" href=\"https:\/\/www.theverge.com\/tech\" rel=\"nofollow noopener\" target=\"_blank\">See All Tech<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Last August, some of the best cybersecurity teams in the business gathered in Las Vegas to demonstrate the&hellip;\n","protected":false},"author":2,"featured_media":19914,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[24,25,314,781],"class_list":{"0":"post-19913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-security","11":"tag-tech"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/19913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=19913"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/19913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/19914"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=19913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=19913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=19913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}