* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://www2.paloaltonetworks.com/blog/category/cybersecurity-2/) * GenAI in Cybersecurity --- ... # GenAI in Cybersecurity --- Threats and Defenses [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F10%2Fgenai-in-cybersecurity-threats-and-defenses%2F) [](https://twitter.com/share?text=GenAI+in+Cybersecurity+%E2%80%94+Threats+and+Defenses&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F10%2Fgenai-in-cybersecurity-threats-and-defenses%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F10%2Fgenai-in-cybersecurity-threats-and-defenses%2F&title=GenAI+in+Cybersecurity+%E2%80%94+Threats+and+Defenses&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2024/10/genai-in-cybersecurity-threats-and-defenses/&ts=markdown) \[\](mailto:?subject=GenAI in Cybersecurity — Threats and Defenses) Link copied By [Michael J Graven](https://www.paloaltonetworks.com/blog/author/michael-j-graven/?ts=markdown "Posts by Michael J Graven") Oct 16, 2024 3 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) [AI risks](https://www.paloaltonetworks.com/blog/tag/ai-risks/?ts=markdown) [GenAI](https://www.paloaltonetworks.com/blog/tag/genai/?ts=markdown) [Unit 42 Threat Frontier](https://www.paloaltonetworks.com/blog/tag/unit-42-threat-frontier/?ts=markdown) In the[Unit 42 Threat Frontier: Prepare for Emerging AI Risks](http://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier.html) report, we aim to strengthen your grasp of how generative AI (GenAI) is reshaping the cybersecurity landscape. We explore how attackers are leveraging GenAI to support their efforts, and how you can formulate appropriate guardrails and protections for your organization. With this knowledge, you'll be better equipped to fully leverage this powerful technology without creating unnecessary risk. As GenAI adoption outpaces previous enterprise technologies, understanding these developments is crucial for protecting your assets and maintaining your competitive edge. This overview will provide you with key insights to lead your company safely through the AI revolution in cybersecurity, ensuring you're not just keeping pace, but staying ahead of emerging threats. ## **The Evolving Threat Landscape** GenAI is rapidly reshaping the cybersecurity landscape. Defenders and attackers alike are harnessing this technology to boost their capabilities. This report will help you grasp how attackers use GenAI and how to defend against these evolving threats. Attackers have already started using GenAI to speed up and enhance their operations. We've witnessed threat actors extracting massive data volumes in record time. The Muddled Libra group has even deployed AI-generated deepfakes in their intrusions. While significant, these changes represent an evolution rather than a revolution in attack techniques. ## **Offensive Security with GenAI** Our offensive security team now incorporates GenAI into red team engagements. We use it to bypass defenses, automate reconnaissance, generate authentic-looking content and create convincing deepfakes. These techniques showcase the potential capabilities of AI-equipped attackers. ## **Defensive Strategies in the AI Era** Defending in the AI era demands both conventional and new approaches. Zero Trust architecture, rapid patching and other foundational security practices remain crucial. However, you must also adopt AI-specific defenses to outpace attackers. Secure AI by design from the start. Monitor external AI usage, secure the AI application development lifecycle, and map the data pathways in your AI systems. Adopt AI safely by tracking AI application usage, scanning for sensitive data and implementing granular access control. ### Addressing Shadow AI Prepare for Shadow AI. Your organization likely uses AI tools already, whether you know it or not. Establish governance and rules of engagement for AI tool usage, tailored to your existing data security requirements. ### Leveraging AI for Defense Use AI to empower your defense team. Deploy AI and machine learning to uncover patterns in your logs, detections and other records. This will help your SOC scale up to match the increasing speed and volume of attacks. ### GenAI and Malware Creation Our research into GenAI and malware creation shows that while AI can't yet generate novel malware from scratch, it can accelerate attackers' activities. AI serves as a capable co-pilot for less skilled attackers and can regenerate or impersonate certain existing types of malware. ## **Action Steps for Executives** To stay ahead of these threats, take the following steps: 1. Follow our [CISO's AI Journey Checklist](https://www.paloaltonetworks.com/resources/infographics/ciso-ai-checklist) to guide your organization's AI adoption. 2. Engage Unit 42 for an [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment) to secure employee use of GenAI and harden AI-enabled application development. 3. Implement our AI-driven security products, such as [Cortex XSIAM](https://www.paloaltonetworks.com/engage/powering-the-modern-soc/cortex-xsiam-solution-brief), [AI Runtime Security](https://www.paloaltonetworks.com/network-security/ai-runtime-security) and [AI Access Security](https://www.paloaltonetworks.com/network-security/ai-access-security). 4. Study our [Unit 42 Incident Response Report](https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report) for insights from hundreds of engagements. 5. Apply our [recommendations to mitigate ransomware and extortion](https://start.paloaltonetworks.com/2023-unit42-mitre-attack-recommendations) risks. 6. Set up a [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer) for proactive and reactive consulting engagements. Remember, GenAI adoption outpaces any previous enterprise technology. By understanding these threats and implementing appropriate defenses now, you can harness AI's power while minimizing risks to your organization. Learn more about GenAI and security, access the [Unit 42 Threat Frontier: Prepare for Emerging AI Risks](http://www.paloaltonetworks.com/resources/ebooks/unit42-threat-frontier.html) report. *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Threat Research](https://www.paloaltonetworks.com/blog/category/threat-research/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) [#### Top Three Ways Organizations Were Unprepared for Cyberattacks in 2023](https://www2.paloaltonetworks.com/blog/2024/11/top-three-ways-organizations-were-unprepared-for-cyberattacks-in-2023/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Embracing the Future of Work with Innovations in Prisma SASE](https://www2.paloaltonetworks.com/blog/2025/04/embracing-future-work-innovations-prisma-sase/) ### [Product Features](https://www.paloaltonetworks.com/blog/sase/category/product-features/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Securing GenAI Apps in Your Web Browser](https://www2.paloaltonetworks.com/blog/sase/securing-genai-apps-in-your-web-browser/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Accelerating Real Time Security Outcomes with Precision AI](https://www2.paloaltonetworks.com/blog/2024/05/real-time-security-outcomes-with-precision-ai/) ### [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Copilots in Cybersecurity --- Realizing the Promise of Precision](https://www2.paloaltonetworks.com/blog/2024/05/copilots-in-cybersecurity-precision/) ### [Cloud-delivered Security](https://www.paloaltonetworks.com/blog/sase/category/cloud-delivered-security/?ts=markdown), [Mobile Users](https://www.paloaltonetworks.com/blog/sase/category/mobile-users/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Remote Workforce](https://www.paloaltonetworks.com/blog/category/remote-workforce/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown), [Web Security](https://www.paloaltonetworks.com/blog/category/web-security/?ts=markdown) [#### Five Misconceptions About Secure Web Gateways](https://www2.paloaltonetworks.com/blog/sase/five-misconceptions-about-secure-web-gateways/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language