Cyber Threats Evolve with AI, Exploiting Vulnerabilities

Unsplash

Recent attacks highlight the growing role of AI in cybersecurity and the need for adaptive defense strategies

TITLE: Cyber Threats Evolve with AI, Exploiting Vulnerabilities
SUBTITLE: Recent attacks highlight the growing role of AI in cybersecurity and the need for adaptive defense strategies
EXCERPT: From AI-powered botnets to geometry-based evasion techniques, cyber threats are becoming increasingly sophisticated, exploiting vulnerabilities in routers, HR workflows, and endpoint management software.

Cyber threats are evolving rapidly, with artificial intelligence (AI) playing a significant role in both the offense and defense. Recent attacks have highlighted the need for adaptive defense strategies that combine human expertise with AI-driven solutions.

What Happened

A newly discovered botnet malware called KadNap has been targeting ASUS routers and other edge networking devices to create a proxy network for malicious traffic. The botnet has grown to 14,000 devices since August 2025, with nearly half of the infected devices connected to command-and-control (C2) infrastructure dedicated to ASUS-based bots. Meanwhile, researchers have identified a new evasion technique used by malware developers, which employs geometry-based human-verification tests to remain undetected.

In another development, a campaign by Russian-speaking cyberattackers has been hijacking HR workflows to deliver security-busting malware, allowing attackers to steal data without detection. The attackers, known as "BlackSanta," have been targeting companies in the United States and Europe.

Why It Matters

The evolving threat landscape, augmented by AI, poses significant challenges for organizations. Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) need to understand the threat landscape and map their assets to identify vulnerabilities. As Jakub Debski, Chief Product Officer at ESET, notes, "It's not AI vs AI, but 'Human + AI' vs 'Human+AI'. And who has better people, processes, and technology will win."

What Experts Say

> "Attackers are pivoting away from bold 'smash-and-grab' breaches in favor of sneakier 'death by a thousand cuts' approaches." — Sila Ozeren Hacioglu, Security Research Engineer at Picus Security.

Key Numbers

  • 14,000: The number of devices infected by the KadNap botnet.
  • 60%: The percentage of infected devices located in the United States.
  • 1.1 million: The number of malicious files analyzed by the Picus Red Report 2026.
  • 15.5 million: The number of actions mapped to MITRE ATT&CK in the Picus Red Report 2026.

Background

The Cybersecurity and Infrastructure Security Agency (CISA) has flagged a high-severity Ivanti Endpoint Manager (EPM) vulnerability as actively exploited in attacks. The vulnerability, tracked as CVE-2026-1603, can be exploited by remote threat actors to bypass authentication and steal credential data.

What Comes Next

As cyber threats continue to evolve, organizations must adapt their defense strategies to stay ahead of the attackers. This includes investing in AI-driven solutions, improving threat intelligence, and enhancing human expertise. By combining these elements, organizations can build robust cyber resilience and protect themselves against increasingly sophisticated attacks.

Fact-checked Real-time synthesis Bias-reduced

This article was synthesized by Fulqrum AI from 5 trusted sources, combining multiple perspectives into a comprehensive summary. All source references are listed below.

Story Coverage Workspace

5 sources

Compare coverage, inspect perspective spread, and open primary references side by side.

Linked Sources

5

Unique Domains

3

Perspective Center

Not enough mapped outlets

Diversity

Very Narrow
0 mapped perspectives 0 high-credibility sources
Coverage is still narrow. Treat this as an early map and cross-check additional primary reporting.

Blindspot Signals

  • Thin mapped perspectives

    Most sources do not have mapped perspective data yet, so viewpoint spread is still uncertain.

  • No high-credibility anchors

    No source in this set reaches the high-credibility threshold. Cross-check with stronger primary reporting.

Expand Your Lens

Full Coverage Workbench

Search by outlet or domain, then filter the source bench by credibility, perspective mapping, or the dominant lane.

Showing 5 of 5 linked sources.

Unmapped Perspective (5)

bleepingcomputer.com

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
bleepingcomputer.com

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
bleepingcomputer.com

CISA: Recently patched Ivanti EPM flaw now actively exploited

Open

bleepingcomputer.com

Unmapped bias Credibility unknown Dossier
csoonline.com

The CSO role is evolving fast with AI in Cyber Defense strategy

Open

csoonline.com

Unmapped bias Credibility unknown Dossier
darkreading.com

'BlackSanta' EDR Killer Targets HR Workflows

Open

darkreading.com

Unmapped bias Credibility unknown Dossier

Emergent News aggregates and curates content from trusted sources to help you understand reality clearly.

Powered by Fulqrum , an AI-powered autonomous news platform.

Get the latest news

Join thousands of readers who trust Emergent News.