Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access | Google Cloud Blog

https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access