When Attackers Weaponize AI and Defenders Fight Back with Smarter Remediation
Attackers are no longer working alone. AI is now their ally. From automating reconnaissance to crafting convincing phishing lures and developing exploits at scale, adversaries are using AI to operate faster and with greater precision.
In this webinar hosted by Scott Kuffer (co-founder and CPO of Nucleus Security), and featuring guest Corey Brunkow from Horizon3.ai, we explored how artificial intelligence is reshaping the cybersecurity landscape, particularly in penetration testing and vulnerability management. This engaging and conversational session emphasized thought leadership and practical insights in a rapidly evolving space.
The Rise of AI in Cybersecurity Threats
A major theme was the accelerated adoption of AI by attackers. Both speakers highlighted that malicious actors no longer require deep technical expertise to weaponize exploits, as AI lowers the barrier to entry. This trend has led to faster development and dissemination of new tactics, techniques, and procedures (TTPs). Whereas phishing remains a growing threat, the real concern is the rapid weaponization of vulnerabilities and misconfigurations—making defense far more difficult over the last 18 months.
Defensive Challenges and Data Overload
During the conversation, Scott stressed that while most organizations already contend with an overload of alerts from dozens of security tools, the increasing speed of AI-driven attacks makes prioritization and response even more urgent. Traditional wisdom that only 5% of vulnerabilities truly matter still holds, but now the emphasis has shifted to fixing those critical issues faster. The discussion pointed to triage, ownership, and data aggregation as essential processes for enabling security teams to act effectively at scale.
Looking Ahead
Corey emphasized the need for actionable, high-quality data to support rapid decision-making in defense. Both speakers underscored that AI has not simply increased the number of threats but has accelerated their velocity, shrinking defenders’ response windows. The takeaway for organizations was clear: resilience now depends on combining prioritization with speed, backed by streamlined processes and effective use of security tooling.
See Nucleus in Action
Discover how unified, risk-based automation can transform your vulnerability management.