AI vs. Endpoint Attacks: What Security Leaders Need To Know


This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.

Enterprises run the very real risk of losing the AI arms race to adversaries who weaponize large language models (LLMs) and create fraudulent bots to automate attacks.

Trading on the trust of legitimate tools, adversaries are using generative AI to create malware that doesn’t create a unique signature but instead relies on fileless execution, making the attacks often undetectable. Gen AI is extensively being used to create large-scale automated phishing campaigns and automate social engineering, with attackers looking to exploit human vulnerabilities at scale.

Gartner points out in its latest Magic Quadrant for Endpoint Protection Platforms that  “leaders in the endpoint protection market are prioritizing integrated security solutions that unify endpoint detection and response (EDR), extended detection and response (XDR) and identity protection into a single platform. This shift enables security teams to reduce complexity while improving threat visibility.”

The result? A more complex threat landscape moving at machine speed while enterprise defenders rely on outdated tools and technologies designed for a different era.

The scale of these attacks is staggering. Zscaler’s ThreatLabz indicated a nearly 60% year-over-year increase in global phishing attacks, and attributes this rise in part to the proliferation of gen AI-driven schemes. Likewise, Ivanti’s  2024 State of Cybersecurity Report found that 74% of businesses are already seeing the impact of AI-powered threats. And, nine in 10 executives said they believe that AI-powered threats are just getting started.

“If you’ve got adversaries breaking out in two minutes, and it takes you a day to ingest data and another day to run a search, how can you possibly hope to keep up?” Elia Zaitsev, CTO of CrowdStrike noted in a recent interview with VentureBeat​.

The new cyber arms race: Adversarial AI vs. defensive AI on the endpoint

Adversaries, especially cybercrime syndicates and nation-state actors, are refining their tradecraft with AI, adding to their arsenals faster than any enterprise can keep up. Gen AI has democratized how adversaries, from rogue attackers to large-scale cyberwar operations, can create new weapons.

“Even if you’re not an expert, gen AI can create scripts or phishing emails on your behalf,” George Kurtz, CrowdStrike CEO and founder at the recent World Economic Forum, said in an interview with CNBC. “It’s never been easier for adversaries. But the good news is, if we properly harness AI on the defensive side, we have a massive opportunity to stay ahead.”

As Gartner advises: “AI-enhanced security tools should be viewed as force multipliers rather than standalone replacements for traditional security measures. Organizations must ensure that AI-driven solutions integrate effectively with human decision-making to mitigate risks.”

Etay Maor, chief security strategist at Cato Networks, told VentureBeat that “adversaries are not just using AI to automate attacks — they’re using it to blend into normal network traffic, making them harder to detect. The real challenge is that AI-powered attacks are not a single event; they’re a continuous process of reconnaissance, evasion and adaptation.”

Cato outlined in its 2024 business highlights how it expanded its secure access service edge (SASE) cloud platform five times in the last year, introducing Cato XDR, Cato endpoint protection platform (EPP), Cato managed SASE, Cato digital experience monitoring (DEM) and Cato IoT/OT Security, all of which aim to streamline and unify security capabilities under one platform. “We’re not just taking share,” said Shlomo Kramer, Cato co-founder and CEO. “We’re redefining how organizations connect and secure their operations, as AI and cloud transform the security landscape.”

Unifying endpoints and identities is the future of zero trust. Adversaries are quick to capitalize on unchecked agent sprawl, which is made more unreliable due to a surge in dozens of identities’ data being integral to an endpoint. Using AI to automate reconnaissance at scale, adversaries have an upper hand.

All these factors, taken together, set the stage for a new era of AI-powered endpoint security.

AI-powered endpoint security ushers in a new era of unified defense

Legacy approaches to endpoint security — interdomain trust relationships, assumed trust, perimeter-based security designs, to name a few — are no longer enough. If any network’s security is based on assumed or implied trust, it is as good as breached already.

Likewise, relying on static defenses, including antivirus software, perimeter firewalls or, worse, endpoints with dozens of agents loaded on them, leaves an organization just as vulnerable as if they had no cyber defense strategy at all.

Gartner observes that: “Identity theft, phishing and data exfiltration are workspace security risks that require further attention. To address these issues, organizations need a holistic workspace security strategy that places the worker at the center of protection and integrates security across device, email, identity, data and application access controls.”

Daren Goeson, SVP of unified endpoint management at Ivanti, underscored the growing challenge. “Laptops, desktops, smartphones and IoT devices are essential to modern business, but their expanding numbers create more opportunities for attackers,” he said. “An unpatched vulnerability or outdated software can open the door to serious security risks. But as their numbers grow, so do the opportunities for attackers to exploit them.”

To mitigate risks, Goeson emphasizes the importance of centralized security and AI-powered endpoint management. “AI-powered security tools can analyze vast amounts of data, detecting anomalies and predicting threats faster and more accurately than human analysts,” he said.

Vineet Arora, CTO at WinWire, agreed: “AI tools excel at rapidly analyzing massive data across logs, endpoints and network traffic, spotting subtle patterns early. They refine their understanding over time — automatically quarantining suspicious activities before significant damage can spread.”

Gartner’s recognition of Cato Networks as a Leader in the 2024 Magic Quadrant for Single-Vendor SASE further underscores this industry shift. By delivering networking and security capabilities through a single cloud-based platform, Cato enables organizations to address endpoint threats, identity protection and network security in a unified manner — which is critical in an era when adversaries exploit any gap in visibility.

Integrating AI, UEM and zero-trust

Experts agree that AI-powered automation enhances threat detection, reducing response times and minimizing security gaps. By integrating AI with unified endpoint management (UEM), businesses gain real-time visibility across devices, users and networks — proactively identifying security gaps before they can be exploited.”

By proactively preventing problems, “the strain on IT support is also minimized and employee downtime is drastically reduced,” said Ivanti’s field CISO Mike Riemer.

Arora added that, while AI can automate routine tasks and highlight anomalies, “human analysts are critical for complex decisions that require business context — AI should be a force multiplier, not a standalone replacement.”

To counter these threats, more organizations are relying on AI to strengthen their zero-trust security frameworks. Zero trust comprises systems that continuously verify every access request while AI actively detects, investigates and, if necessary, neutralizes each threat in real time. Advanced security platforms integrate EDR, XDR and identity protection into a single, intelligent defense system.

“When combined with AI, UEM solutions become even more powerful,” said Goeson. “AI-powered endpoint security tools analyze vast datasets to detect anomalies and predict threats faster and more accurately than human analysts. With full visibility across devices, users and networks, these tools proactively identify and close security gaps before they can be exploited.”

AI-powered platforms and the growing demand for XDR solutions

Nearly all cybersecurity vendors are fast-tracking AI and gen AI-related projects in their DevOps cycles and across their roadmaps. The goal is to enhance threat detection incident response, reduce false positives and create platforms capable of scaling out with full XDR functionality. Vendors in this area include BlackBerry, Bitdefender, Cato Networks, Cisco, CrowdStrike, Deep Instinct, ESET, Fortinet, Ivanti, SentinelOne, Sophos, Trend Micro and Zscaler.

Cisco is also pushing a platform-first approach, embedding AI into its security ecosystem. “Security is a data game,” Jeetu Patel, EVP at Cisco, told VentureBeat. “If there’s a platform that only does email, that’s interesting. But if there’s a platform that does email and correlates that to the endpoint, to the network packets and the web, that’s far more valuable.”

Nearly every organization interviewed by VentureBeat values XDR for unifying security telemetry across endpoints, networks, identities and clouds. XDR enhances threat detection by correlating signals, boosting efficiency and reducing alert fatigue.

Riemer highlighted AI’s defensive shift: “For years, attackers have been utilizing AI to their advantage. However, 2025 will mark a turning point as defenders begin to harness the full potential of AI for cybersecurity purposes.”

Riemer noted that AI-driven endpoint security is shifting from reactive to proactive. “AI is already transforming how security teams detect early warning signs of attacks. AI-powered security tools can recognize patterns of device underperformance and automate diagnostics before an issue impacts the business — all with minimal employee downtime and no IT support required.”

Arora emphasized: “It’s also crucial for CISOs to assess data handling, privacy and the transparency of AI decision-making before adopting such tools — ensuring they fit both the organization’s compliance requirements and its security strategy.”

Cato’s 2024 rollouts exemplify how advanced SASE platforms integrate threat detection, user access controls, and IoT/OT protection in one service. This consolidation reduces complexity for security teams and supports a true zero-trust approach, ensuring continuous verification across devices and networks.

Conclusion: Embracing AI-driven security for a new era of threats

Adversaries are moving at machine speed, weaponizing gen AI to create sophisticated malware, launch targeted phishing campaigns and circumvent traditional defenses. The takeaway is clear: Legacy endpoint security and patchwork solutions are not enough to protect against threats designed to outmaneuver static defenses.

Enterprises must embrace an AI-first strategy that unifies endpoint, identity and network security within a zero-trust framework. AI-powered platforms — built with real-time telemetry, XDR capabilities and predictive intelligence — are the key to detecting and mitigating evolving threats before they lead to a full-on breach.

As Kramer put it, “The era of cobbled-together security solutions is over.” Organizations choosing a SASE platform are positioning themselves to proactively combat AI-driven threats. Cato, among other leading providers, underscores that a unified, cloud-native approach — marrying AI with zero-trust principles — will be pivotal in safeguarding enterprises from the next wave of cyber onslaughts.



Source link

Share

Latest Updates

Frequently Asked Questions

Related Articles

Meta Tries to Stop Sarah Wynn-Williams From Further Selling Scathing Memoir

Meta won a legal victory on Wednesday against a former employee who published...

Google issues a fix for Chromecast ‘untrusted’ bug

If you’re one of the unlucky Chromecast owners whose “untrusted” device stopped working...

Samsung Galaxy S25 long term review – Perfect for people looking for a compact smartphone

Samsung introduced the Galaxy S25 series in January 2025, with 3 devices. The...

New technique helps LLMs rein in CoT lengths, optimizing reasoning without exploding compute costs

Join our daily and weekly newsletters for the latest updates and exclusive content...
PORN VIDEO
PORN VIDEO
PORN VIDEO
SULTAN88
SULTANSLOT
RAJA328
JOIN88
GFC88
HOKIBET
RUSIASLOT88
TAHU69
BONANZA99
PRAGMABET
MEGA55
LUXURY777
LUXURY333
BORJU89
QQGAMING
KEDAI168
MEGA777
NAGASLOT777
TAKSU787
KKSLOT777
MAS77TOTO
bandar55
BOS303
HOKI99
NUSA365
YUHUSLOT
KTP168
GALAXY138
NEXIA138
PETIR33
BOOM138
MEGA888
CABE888
FOSIL777
turbospin138
KAPAKBET
SUPERJP
sultankoin99
dragon88
raffi888
kenzobet
aladin666
rgo365
ubm4d
GERCEP88
VIVA99
CR777
VOXY88
delman567
intan69
CABE888
RNR303
LOGO303
PEMBURUGACOR
mpo383
cermin4d
bm88
ANGKA79
WOWHOKI
ROKET303
MPOXL
GURITA168
SUPRASLOT
SGCWIN
DESA88
ARWANA388
DAUNEMAS
ALADDIN666
BIOWIN69
SKY77
DOTA88
NAGA138
API5000
y200m
PLAYBOOK88
LUXURY12
A200M
MPO700
KENANGAN4D
cakrabola
PANDAGENDUT
MARVEL77
UG300
HOKI178
MONTE77
JASABOLA
UNTAR4D
LIDO88
MAFIABOLA77
GASPOL189
mpo999
untung138
TW88
JAGUAR33
MPOBOS
SHIO88
VIVO4D
MPOXL
JARISAKTI
BBO303
AONCASH
ANGKER4D
LEVIS4D
JAGO88
REPUBLIK365
BOSDEAL88
BOLA168
akunjp
WARTEGBET
EZEBET
88PULSA
KITAB4D
BOSDEAL88
STUDIOBET
MESINKOIN
BIMA88
PPNUSA
ABGBET88
TOP77
BAYAR77
YES77
BBTN4D
BBCA4D
VSLOTS88
MPO800
PAHALA4D
KPI4D
JURAGAN77
QQ188
BOLAPELANGI
C200M
QQ998
GWKTOGEL
MEGABANDAR
COLOWIN
VIP579
SEVEN4D
MPO188
DEWATA88
SURAT4D
SINAR123
LAMBO77
GUDANG4D
AWAN4D
PLANETLIGA
GT88
ROYALSPIN88
MAMAJITU
MITO99
PEDIA4D
WIBU69JP
333HOKI
SIDARMA88
NAGAEMAS99
HOLA88
CAKAR76
KINGTOTO
RATUGAMING
SSI168
PILAR168
ACTOTO
EYANGTOGEL
KAISAR328
SLOT628
KAISAR88
DOTA88
MAXWIN369
ALIBABA99
MM168
SQUAD777
NAGABET88
JAYABOLA
SEMPATIGAME
PANDAJAGO
PIKAT4D
SINGA77
YUYU33
MASTERPLAY99
VICTORY39
NASA4D
PERMATA55
SAKAUSLOT
CK303
MPOTOWER
CIPUTRABET
WINJUDI
DEWI5000
IYA777
MAHIRTOTO
GOSLOT88
TIPTOP4D
RAJA787
JBO680
JOKER188
EPICPLAY88
TRIVABET
KAISAR189
JOKER81
JPSPIN88
MAYORA4D
DJARUMPLAY
OVO88
BAKTI78
WINGSLOT77
ICAFE4D
PDTOTO
JETPLAY88
JETPLAY88
STADIUM4D
RAJAVIP777
ISB388
GASSPOL168
JITU33
ISTANA8899
CERI123
VIPPELANGI99
55WEALTH
LIGAJUARA
RAJAPKV
HMTOTO
PERKASA99
DEWIGG
MASTERKIU
DAFTARJP268
BATENGMERAH
YOGATOTO
GRAZYRICH88
RGO365
TIKI4D
GBOSKY
RANS4D
GRAND4D
GARUDABET77
BOLABESAR
KASIR777
WINPALACE88
SAMUDRBET
JAGO89
IBCBET
SUPER126
BIZZ77GAMES
ASET69
GAMESPOLLS
LOGO303
JETHOKI
FERRARITOTO
SULTAN69
BARUNATOTO
MDSBET
HOBBIQQ
SARANG188
HEPI55
NARUTOBET
ASIABET4D
PRAGMABET
OKEBOS138
HAHA55
VOCAL77
GATOT4D
LANANGBET
BONCEL4D
TUKUL777
BOOKIE7
PAJAKBOLA
5DEWA
WAHIDTOTO
CSOWIN
OMG303
WINLIVE4D
ALADDIN666
LUMIO777
GBOPLAY777
GEBER88
BETWIN89
BIBIT88
BIJITOGEL
BIMOIN88
BINGOSLOT88
BINTANG29
BINTANG4D
BISABET
BOJO88
BOLA99
BOLAKAWAN
BOROBUDURBET
BOSDEAL88
BOSKU123
HOKI138
BOSS177
BOSSKLIK
BP77
GARUDA999
ABO777
MAXBET268
BANDARSBO
UGDEWA
ANAKNAGA
BIGSLOT
FYP138
SKYWIN386
KOBOY789
YYPAUS
LUCKY77
ISTANAIMPIAN4
PEDRO4D
SEMAR123
AKSARA88
VIRGO168
JUALTOTO
KAISAR89
CAPSAWINS
SUKI99
SIARIL
BOSSLOT138
PRAGMATIC777
ARWANA89
DUKUN138
KOI77
SBA99
GOWD
ANAKTOTO
JAKJP
EU9
ZONA66
MURAH138
SULE88
PPNUSA
PENCETAJA
RAFI168
MURAH138_LOGIN
PATEN77
ACETOTO888
CUAN368
KENZO123
DEWAWIN365
KUPONTOTO
MPOTOP88
TOKYO188
SLOT88RESMI
CAPTAIN77
PECINTA4D
PANEN33
TANTAN88
OMEGA138
KUDA77
BLURAYUFR
YANDEXEU
K86SPORT
ASIAKLUB
ION55
OTW78
POOLS303
ALL303
MPOBOS
MEGA118
MAMEN123
MEVIUS88
77ROYAL
DRAGON222
337SPORTS
QQ1221
CAFE69
TKO77
GELEK4D
DOMINO76
PPSNUSA
ANDAHOKI
OASIS88
SOHIB4D
HERMES21
NEON4D
GASWIN
HOLA88
ALEXIS17
Y200M
MPLAY5000
MPOLANGIT
SIHOKI
SULTAN33
SAVAYASLOT
MONTE77
BARDI4D
PSTOTO99
SGO777
MACO4D
TAJIR77
UNOSLOT
BABE168
SULTANJP
KINGS128
KADERSLOT
TOTO911
KUATJP
LUNAS168
JOKER888
GIGASLOT88
GMSLOT88
HOBI188
IBET44
IDWIN
IGCWIN
OVOKER
TEXASPOKER
HOKIVEGAS
POKERBOYA
RGOPOKER
INDOWINBET
HKBPOKER
ROYALPOKER
HKBPOKERQQ
ALFA303
INDODINGDONG
RGOBET
EYANGPOKER
BROVEGAS
GITARTOGEL
GITARPOKER
AHABET
KTP303
MABOSWAY
KBO77
GIGASLOT88
GMSLOT88
HOBI188
IBET44
IDWIN
IGCWIN
DEWIJOKER
DRAGON303
FANTASYSLOT
FORWIN77
GBO007
GBOPLAY138
GBOSLOT
GBOWIN
NAGA168
PBOWIN
UANG77
MVP288
MURAHSLOT
MASHOKI
GITAR100
ERAPLAY88
GOLDENCROWNPOKER
HPPOKER
DNDPOKER
SUPER138
RAKSASA123
MOTORSLOT77
KUDASAKTI168
ERA77
526BET
52TOGEL
76SLOT
LEXISPOKER
LVONLINE
KAPAL4D
KAPAL4D2
MOMOPOKER
K7BOLA
NAGABOLA
TOGELHOK
WAZEPOKER
WARKOPPOKER
PORN VIDEO
https://link.space/@Hikaribet
https://bio.site/Hikaribet
https://heylink.me/Hikaribet39

Strategi Ampuh Menang di Slot Zeus: Panduan Pemula hingga Pro

Slot Zeus Online: Game RTP Tinggi yang Wajib Dicoba Pemain Slot!

Slot Gacor Paling Gacor Terbaik

Review Lengkap Slot Zeus Online: Apakah Game Ini Layak Dimainkan?

Rahasia Menang di Slot Zeus Online: Strategi dan Tips Terbaru 2025

Mitos vs Fakta: Apakah Slot Zeus Benar-benar Menguntungkan?

Keunggulan Slot Zeus Dibandingkan Game Slot Lain, Wajib Tahu!

Fakta Menarik Slot Zeus Online: Fitur Bonus dan Jackpot Besar!

Cara Bermain Slot Zeus Online Agar Maksimal dan Menghasilkan Cuan

Slot Zeus Online: Cara Memanfaatkan Free Spin untuk Maksimal Jackpot!

10 Alasan Kenapa Slot Zeus Online Jadi Favorit Para Pemain Slot

CMBET88
Gamelantogel
CMBET88
didascaliasdelteatrocaminito.com
glenellynrent.com
gypsumboardequipment.com
realseller.org
https://harrysphone.com/upin
gyergyoalfalu.ro/tokek
vipokno.by/gokil
winjospg.com
winjos801.com/
www.logansquarerent.com
internationalfintech.com/bamsz
condowizard.ca
jawatoto889.com
hikaribet3.live
hikaribet1.com
heylink.me/hikaribet
www.nomadsumc.org
condowizard.ca/aromatoto
euro2024gol.com
www.imaracorp.com
daftarsekaibos.com
stuffyoucanuse.org/juragan
Toto Macau 4d
Aromatoto
Lippototo
Mbahtoto
Winjos
152.42.229.23
bandarlotre126.com
heylink.me/sekaipro
www.get-coachoutletsonline.com
wholesalejerseyslord.com
Lippototo
Zientoto
Lippototo
Situs Togel Resmi
Fajartoto
Situs Togel
Toto Macau
Winjos
Winlotre
Aromatoto
design-develop-test.com
winlotre.online
winlotre.xyz
winlotre.us
winlotrebandung.com
winlotrepalu.com
winlotresurabaya.shop
winlotrejakarta.com
winlotresemarang.shop
winlotrebali.shop
winlotreaceh.shop
winlotremakmur.com
Dadu Online
Taruhantoto
a Bandarlotre
bursaliga
lakitoto
aromatoto
Rebahin
untungslot.pages.dev
slotpoupler.pages.dev
rtpliveslot88a.pages.dev
tipsgameslot.pages.dev
pilihslot88.pages.dev
fortuertiger.pages.dev
linkp4d.pages.dev
linkslot88a.pages.dev
slotpgs8.pages.dev
markasjudi.pages.dev
saldo69.pages.dev
slotbenua.pages.dev
saingtoto.pages.dev
markastoto77.pages.dev
jowototo88.pages.dev
sungli78.pages.dev
volatilitas78.pages.dev
bonusbuy12.pages.dev
slotoffiline.pages.dev
dihindari77.pages.dev
rtpdislot1.pages.dev
agtslot77.pages.dev
congtoto15.pages.dev
hongkongtoto7.pages.dev
sinarmas177.pages.dev
hours771.pages.dev
sarana771.pages.dev
kananslot7.pages.dev
balitoto17.pages.dev
jowototo17.pages.dev
aromatotoding.com
unyagh.org
fairparkcounseling.com/gap/
impress-newtex.com/ajax/
SULTAN88
SULTANSLOT
RAJA328
JOIN88+
HOKIBET
GFC88
RusiaSlot88
Tahu69
BONANZA99
Pragmabet
mega55
luxury777
luxury333
borju89
qqgaming
KEDAI168
mega777
nagaslot777
TAKSU787
kkslot777
MAS77TOTO
BANDAR55+
BOS303
Login-HOKI99/
NUSA365
YUHUSLOT
ktp168
GALAXY138