Volume 17, Number 5
AI-Driven CTI for Business: Emerging Threats, Attack Strategies, and Defensive Measures
Authors
Mohammed Kashif 1, Mohammed Aasimuddin 2, Mubashir Ali Ahmed 3, Laxmi Bhavani Cheekatimalla 4, Eraj Farheen Ansari 5 and Ahwan Mishra 6, 1 Jamia Millia Islamia University, India, 2 Campbellsville University, USA, 3 University of the People, USA, 4 Kakatiya University, India, 5 East-West University, USA, 6 USA
Abstract
Artificial Intelligence (AI) has transformed multiple sectors but also introduced new risks through its use in sophisticated cybercrimes. AI-driven cyberattacks leverage machine learning, deep learning, and natural language processing to enhance the scale, speed, and precision of threats like phishing, malware, identity theft, and social engineering. This paper examines AI’s dual role—both as an enabler of complex cyberattacks and a tool for cybersecurity defence. Real-world examples include deepfake scams, heuristic malware, and AI-powered reconnaissance tools utilized by cybercriminals employing techniques such as Generative Adversarial Networks (GANs) and reinforcement learning to bypass conventional security systems. The dynamic nature of AI-enabled threats complicates detection and response, as these attacks adapt in real time. Conversely, AI is also applied defensively for predictive threat modelling, anomaly detection, behaviour-based intrusion prevention, and rapid incident response. The research underscores the necessity of robust AI governance, ethical AI use, and international collaboration to address these challenges. It concludes by proposing a strategic roadmap for stakeholders to develop AI-aware cybersecurity systems capable of evolving alongside the continuously changing threat landscape, aiming to harness AI’s potential for protection while mitigating its exploitation for malicious purposes.
Keywords
DUET, Cybercrime, Deepfake, Phishing, CTI, GANs, Social Engineering, Cybersecurity, AI Attacks, Defensive AI, AI Governance, Adversarial AI, Threat Detection, AI Ethics, AI Vulnerabilities
