{"id":27365,"date":"2021-03-05T17:01:00","date_gmt":"2021-03-05T16:01:00","guid":{"rendered":"https:\/\/perseus.de\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/"},"modified":"2026-03-30T16:14:36","modified_gmt":"2026-03-30T14:14:36","slug":"ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/","title":{"rendered":"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27365\" class=\"elementor elementor-27365 elementor-22662\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"553\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27363\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1-300x216.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: possessed photography via unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50740273 e-flex e-con-boxed e-con e-parent\" data-id=\"50740273\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a79d2d2 e-con-full e-flex e-con e-child\" data-id=\"a79d2d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-db24453 e-con-full e-flex e-con e-child\" data-id=\"db24453\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27dbfeb elementor-widget elementor-widget-text-editor\" data-id=\"27dbfeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>05.03.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e0f1ba elementor-widget elementor-widget-heading\" data-id=\"2e0f1ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5835c8a elementor-widget elementor-widget-text-editor\" data-id=\"5835c8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d298e54 e-con-full e-flex e-con e-child\" data-id=\"d298e54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8270321 elementor-widget elementor-widget-text-editor\" data-id=\"8270321\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Artificial intelligence \u2013 or &#8220;AI&#8221; for short \u2013 is intended to replicate human thinking in a way that is as automated or mechanized as possible. AI is also playing an increasingly important role in cyber security: it is used both as an attack weapon and to defend against cyberattacks. Which side will win in the end?  <\/strong><\/p><p>It&#8217;s the nightmare for every cyber security expert: cyberattacks supported by artificial intelligence. Phishing emails that rely on social engineering and precisely analyze certain behaviors would be many times more harmful with AI. It could help to write e-mail texts that would no longer be distinguishable from those of real senders. The attacks would be intelligently automated, malware attacks would run faster and more effectively. And the most threatening thing is that with every failed attack, the attacker learns from his own mistakes and improves his techniques with each subsequent attack.    <\/p><p>But what causes cyber security experts headaches as a serious threat also offers the opportunity to strengthen their own protective shields against cyberattacks and to be able to better identify attackers. AI will therefore be a curse and a blessing at the same time. <\/p><p><strong> <\/strong><\/p><p><strong>AI as an offensive weapon<\/strong><\/p><p>Cybercriminals are increasingly using artificial intelligence as a weapon. With the help of penetration techniques, behavioral analysis and behavioral imitation, AI can carry out attacks much faster, more coordinated and more efficiently &#8211; and on thousands of targets at the same time. <\/p><p><strong> <\/strong><\/p><p><strong>AI looks for vulnerabilities<\/strong><\/p><p>Cyber attackers use AI, which automatically examines a large number of interfaces in the victim&#8217;s IT for vulnerabilities. In the event of a &#8220;hit&#8221;, the AI can distinguish whether an attack at the vulnerability can paralyze the system or whether it can be a gateway for malicious code. <\/p><p><strong> <\/strong><\/p><p><strong>&#8220;AI-as-a-Service&#8221;<\/strong><\/p><p>Hackers are already offering AI-based systems on the darknet as &#8220;AI-as-a-Service&#8221;. These are ready-made IT solutions for criminal hackers without any major knowledge of artificial intelligence. This also lowers the barrier to entry for many smaller hacker gangs.  <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Guess passwords<\/strong><\/em><br>AI-based systems already exist that can automatically guess <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/passwortsicherheit\/\">passwords <\/a>through machine learning. In addition, new dangers arise for AI-protected IT networks: <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>AI-driven malware<\/strong><\/em><br>Cybercriminals most often use AI in connection with malware sent via email. The malware can imitate user behavior even better through AI: Intelligent assistants can create texts of such high semantic quality that recipients find it very difficult to distinguish them from real emails. <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Self-learning phishing attacks<\/strong><\/em><br>Adapting a phishing email to the sender&#8217;s writing style has so far required knowledge of human nature and background knowledge. With the help of AI systems, information available online can be extracted in a more targeted manner in order to tailor websites, links or emails to the target of an attack. AI systems learn from past mistakes and successes and improve their tactics with each attack.  <br><strong><br><\/strong><\/p><p><strong>AI as a protective shield<\/strong><\/p><p>AI will play a major role in cyber security in threat detection and defense against cyberattacks. Learning algorithms are supposed to recognize the behavior patterns of the attackers and their programs and take targeted action against them. <\/p><p><em style=\"font-size: 1rem;\"><strong> <\/strong><\/em><\/p><p><em style=\"font-size: 1rem;\"><strong>Time-saving pattern recognition<\/strong><\/em><\/p><p>AI applications are particularly strong at recognizing and comparing patterns by quickly filtering out and processing the essentials from large amounts of data. This pattern recognition makes it easy to find hidden channels that are harvesting data, faster than human analysts could. <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Identify spam emails<\/strong><\/em><br>The classic filter methods for identifying and classifying spam e-mails on the basis of statistical models, blacklists or database solutions are reaching their limits. AI solutions can help identify and learn complex patterns and structures of spam emails. <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Authenticate authorized users<\/strong><\/em><br>Passive, continuous authentication is a future field for AI algorithms. Sensor data from accelerometers or gyroscopes is collected and evaluated during the use of the device. In this way, AI prevents unauthorized use of the device.  <\/p><p><em><strong> <\/strong><\/em><\/p><p><em><strong>Detect malware<\/strong><\/em><br>Conventional malware detection is usually based on checking the signatures of files and programs. When a new form of malware appears, the AI then compares it with previous forms in its database and decides whether the malware should be automatically fended off. In the future, AI could evolve to detect ransomware, for example, before it encrypts data.  <\/p><p>Spying on attackers using algorithms<\/p><p>Hackers almost always use infiltrated programs or commands. Artificial intelligences could learn here, for example, which programs a malicious code opens, which files it overwrites or deletes, and which data it uploads or downloads. According to corresponding patterns, the trained AI algorithm can then look for suspicious activity on users&#8217; computers.  <\/p><p><strong> <\/strong><\/p><p><strong>Decrypt the identity of attackers<\/strong><\/p><p>The AI&#8217;s algorithms could also soon find out the identity of attackers. This is because programmers leave individual traces in their program code. These can be found, among other things, in the style of the comments that programmers write in their program lines. Learning algorithms can extract these traces and thus assign the code to an author.   <\/p><p><strong> <\/strong><\/p><p><strong>Cyber security not possible without people<\/strong><\/p><p>Cyber security should definitely not be left exclusively to artificial intelligence (AI). Only a team of man and machine can be successful in the fight against cyberattacks. Because the threat situation changes almost daily. New attack methods, new vulnerabilities and repeated human error lead to a complex mix of contingencies for which a purely AI-based system can never be prepared.   <\/p><p>Therefore, it is better to trust our expertise! Contact us so that we can develop a cyber security concept for your company together. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence \u2013 or &#8220;AI&#8221; for short \u2013 is intended to replicate human thinking in a way that is as automated or mechanized as possible. AI is also playing an increasingly important role in cyber security: it is used both as an attack weapon and to defend against cyberattacks. Which side will win in the end?  <\/p>\n","protected":false},"author":3,"featured_media":27363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence \u2013 or &quot;AI&quot; for short \u2013 is intended to replicate human thinking in a way that is as automated or mechanized as possible. AI is also playing an increasingly important role in cyber security: it is used both as an attack weapon and to defend against cyberattacks. Which side will win in the end?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-05T16:01:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:14:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"553\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time\",\"datePublished\":\"2021-03-05T16:01:00+00:00\",\"dateModified\":\"2026-03-30T14:14:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/\"},\"wordCount\":939,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/\",\"name\":\"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg\",\"datePublished\":\"2021-03-05T16:01:00+00:00\",\"dateModified\":\"2026-03-30T14:14:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg\",\"width\":768,\"height\":553},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/","og_locale":"en_US","og_type":"article","og_title":"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time - Perseus Technologies","og_description":"Artificial intelligence \u2013 or \"AI\" for short \u2013 is intended to replicate human thinking in a way that is as automated or mechanized as possible. AI is also playing an increasingly important role in cyber security: it is used both as an attack weapon and to defend against cyberattacks. Which side will win in the end?","og_url":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/","og_site_name":"Perseus Technologies","article_published_time":"2021-03-05T16:01:00+00:00","article_modified_time":"2026-03-30T14:14:36+00:00","og_image":[{"width":768,"height":553,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time","datePublished":"2021-03-05T16:01:00+00:00","dateModified":"2026-03-30T14:14:36+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/"},"wordCount":939,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/","url":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/","name":"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg","datePublished":"2021-03-05T16:01:00+00:00","dateModified":"2026-03-30T14:14:36+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/possessed-photography-jIBMSMs4_kA-unsplash-2-768x553-1.jpg","width":768,"height":553},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/ai-in-cyber-security-attack-weapon-and-protective-shield-at-the-same-time\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27365"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27365\/revisions"}],"predecessor-version":[{"id":27366,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27365\/revisions\/27366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27363"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}