The research underscores how AI tools have matured in their cyber offensive capabilities, even as it doesn’t reveal novel or paradigm shifting uses of the technology.
As the U.S. promises a light-touch approach to AI regulation, businesses and other stakeholders must work out the rules of the road for themselves.
(Photo by Anna Barclay/Getty Images)
AI security requires more than cloud hardening. The real attack surface isn't your infrastructure—it's the supply chains, agents, and humans that make up the system around it.
Beijing is aggressively exploiting global data for strategic purposes. AI-powered cybersecurity is essential to Washington’s counter-offensive to win the global market.
U.S. President Donald Trump displays a signed executive order during the “Winning the AI Race” summit hosted by All‑In Podcast and Hill & Valley Forum at the Andrew W. Mellon Auditorium on July 23, 2025 in Washington, D.C. Trump signed executive orders related to his Artificial Intelligence Action Plan during the event. (Photo by Chip Somodevilla/Getty Images)
Activist group ‘Everyone Hates Elon’ anti-Musk and X poster placed in a bus stop on the 14th of January 2026, London, United Kingdom. The poster is a reference to the highly controversial new AI tool on X called Grok which can undress pictures of people on command, which this poster suggests enables it as a tool for child abuse. (photo by Kristian Buus/In Pictures via Getty Images)
A threat actor is seeding the internet with AI browser extensions that can intercept a user’s authenticated session tokens and hijack accounts. (Photo by VCG/VCG via Getty Images)
OpenAI and Anthropic said they turned over their models to government researchers, who found an array of previously undiscovered vulnerabilities and attack techniques. (Image via Getty)
The voluntary framework would provide legal clarity to third-party AI researchers, including those who study safety and other “unexpected” AI behaviors.