AI & TechArtificial IntelligenceCybersecurityNewswireTechnology

Black Hat 2025: AI Tools as the New Insider Threat

▼ Summary

– Cloud intrusions surged by 136% in six months, with North Korean operatives infiltrating 320 companies using AI-generated identities.
– Agentic AI emerged as a practical solution at Black Hat 2025, shifting from theoretical promises to measurable security improvements like faster threat investigations.
– CrowdStrike identified 28 North Korean operatives using agentic AI, highlighting its evolution from concept to real-world threat detection.
– Adversaries like FAMOUS CHOLLIMA are leveraging AI for synthetic identities and deepfakes, increasing enterprise security threats by 220% year-over-year.
– Despite AI advancements, human analysts remain critical, as agentic AI augments but doesn’t replace their role in high-stakes security decisions.

The cybersecurity landscape is undergoing a seismic shift as AI-powered threats redefine enterprise risk. Recent data reveals a 136% surge in cloud intrusions, while North Korean operatives have compromised 320 companies using AI-generated identities. At Black Hat 2025, the industry showcased a breakthrough: agentic AI is no longer theoretical, it’s delivering measurable results in threat detection and response.

CrowdStrike’s exposure of 28 North Korean operatives posing as remote IT workers highlights how AI-driven adversaries exploit synthetic identities to infiltrate networks. Unlike traditional attacks, these threats leverage generative AI for deepfake interviews, fabricated credentials, and automated code execution, blurring the line between insider and external threats.

Operational readiness took center stage at this year’s conference. CISOs reported faster alert processing, reduced investigation times, and improved resource allocation, though outcomes vary by implementation maturity. The shift from hype to tangible impact was undeniable. Microsoft Security Copilot now autonomously correlates threats across platforms, while Palo Alto Networks’ Cortex XSOAR triages and remediates alerts without human intervention.

A standout announcement came from Cisco, which unveiled Foundation-sec-8B-Instruct, the first open-source AI model built exclusively for cybersecurity. Optimized for single-GPU deployment, this 8-billion-parameter model outperforms general-purpose alternatives like GPT-4o-mini on security tasks. Its permissive licensing allows on-premises or air-gapped use, a game-changer for organizations wary of vendor lock-in.

SentinelOne’s Purple AI introduced predictive capabilities, anticipating adversary moves based on behavioral patterns. Meanwhile, CrowdStrike’s Falcon platform demonstrated how AI automates threat hunting at scale, processing 60 billion leads into actionable investigations. Yet despite these advances, experts unanimously agreed: human analysts remain irreplaceable. As CrowdStrike’s Adam Meyers noted, “Agentic AI augments, it doesn’t replace, the creativity and intuition of threat hunters.”

North Korea’s FAMOUS CHOLLIMA group epitomizes the new threat paradigm. Their operatives use AI to craft convincing resumes, deepfake interviews, and even automate their workload once hired. With 220% year-over-year growth in infiltrations, these attacks target not just data but payroll systems, siphoning funds to finance weapons programs.

Looking ahead, AI itself is emerging as the next insider threat. Over-reliance on autonomous systems risks blind spots, prompting initiatives like the Cloud Security Alliance’s agentic AI standards and Cisco’s AI supply chain security collaboration with Hugging Face.

The bottom line? Cyberdefense is now a race against AI-empowered adversaries. Organizations must balance automation with human oversight, adopt open-source solutions for flexibility, and treat HR processes as critical attack surfaces. The stakes extend beyond data breaches, national security and intellectual property hang in the balance.

(Source: VentureBeat)

Topics

agentic ai cybersecurity 95% cloud intrusions surge 95% north korean operatives using ai-generated identities 90% human analysts irreplaceable role 90% national security intellectual property risks 90% balancing automation human oversight 85% ai-driven adversaries synthetic identities 85% ciscos open-source ai model cybersecurity 85% famous chollima groups ai tactics 85% operational readiness cybersecurity 80%