Home / Technology / Generative AI Becomes the Apex Predator, Exploiting Chaos in Cybersecurity

Generative AI Becomes the Apex Predator, Exploiting Chaos in Cybersecurity

Summary

  • Generative AI acts as a "chaos agent" like the shark in Jaws
  • AI models fail 60% of the time, leading to unreliable real-world performance
  • 45% of AI-generated code contains OWASP Top 10 vulnerabilities
Generative AI Becomes the Apex Predator, Exploiting Chaos in Cybersecurity

According to Forrester's 2025 Security and Risk Summit, generative AI has become the new "apex predator" in cybersecurity, acting as a relentless "chaos agent" that exploits weaknesses to devastating effect. Forrester principal analyst Allie Mellen presented research showing that AI models fail 60% of the time, with AI agents failing 70-90% on real-world corporate tasks.

This unreliability is exacerbated by the rapid proliferation of AI, with 88% of security leaders admitting to using unauthorized AI in their workflows. Veracode's 2025 report found that 45% of AI-generated code contains OWASP Top 10 vulnerabilities, creating new attack surfaces that traditional security measures struggle to contain.

Forrester predicts a $27 billion surge in the identity management market by 2029 as organizations grapple with the identity sprawl caused by machine-generated identities. Weaponized generative AI has become the silent, relentless predator stalking enterprise networks, demanding urgent security measures to mitigate the chaos it sows.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Forrester warns that generative AI has become the new "apex predator" in cybersecurity, acting as a relentless "chaos agent" that exploits weaknesses to devastating effect.
The article states that AI models fail 60% of the time, with AI agents failing 70-90% on real-world corporate tasks.
The article cites a Veracode report finding that 45% of AI-generated code contains OWASP Top 10 vulnerabilities, creating new attack surfaces for cybercriminals.

Read more news on