COMMENTARY: When Anthropic identified a large-scale campaign in which a threat actor manipulated the Claude Code agentic model to conduct reconnaissance, credential harvesting, and lateral movement across roughly 30 global targets, even succeeding in a small number of cases, the issue was not simply alert volume or tooling gaps. It was a reflection of a detection architecture unprepared to identify intent before the damage trajectory advanced.The threat landscape has changed. Quietly and rapidly, artificial intelligence has become a force multiplier for attackers. Sophisticated adversaries now use AI to automate reconnaissance, rotate infrastructure, generate polymorphic code, and escalate privileges without triggering traditional alarms. They don’t break in. They log in, blend in, and adapt as they move.[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]These aren’t theoretical concerns. AI-assisted attacks are already bypassing conventional defenses using automation, obfuscation, and legitimate tools to operate undetected. Attackers no longer need known exploits or malware. They can blend into everyday system activity and evolve mid-operation. These incidents aren’t just warnings; they’re proof that detection strategies must evolve. It’s time to rethink what detection needs to uncover, and when.
Related reading:
Intent is the new perimeter. The difference between a legitimate user accessing a database and an attacker staging an exfiltration isn’t just in the data or timing; it’s in the sequence, progression, and context of the actions taken. That’s what legacy detection architectures miss.
Deep learning provides a path forward: models purpose-built for operational telemetry can learn how systems normally function and detect when activity begins to align with malicious goals, even in encrypted or east–west traffic. Instead of matching indicators, these models evaluate whether the sequence and context of events are consistent with legitimate workflow patterns.For detection engineers, this isn’t about replacing their stack. It’s about expanding detection coverage with a model that complements existing tools and closes the blind spots inherent in rule-based systems. Deep learning reduces the operational burden created by continually writing and maintaining rules for known patterns, allowing teams to focus on higher-value analysis. The result is earlier signals with less engineering overhead.
Security Operations, SOC, AI/ML, AI benefits/risks, Exposure management
AI is changing the game for cyber defenders. Detection needs to catch up

(Adobe Stock)
An In-Depth Guide to AI
Get essential knowledge and practical strategies to use AI to better your security program.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds



