The Shift from AI-Assisted to AI-Driven Attacks
For years, cybersecurity professionals have warned about AI-powered threats. The reality, until recently, was more modest: attackers used machine learning for password cracking, basic phishing personalisation, and automated vulnerability scanning. That era is ending. Agentic AI represents a fundamental shift. These are autonomous systems capable of planning multi-step attack campaigns, adapting to defensive responses in real time, and operating without continuous human oversight. An agentic AI does not just generate a phishing email; it researches the target organisation, identifies the most vulnerable individuals, crafts contextually appropriate lures, monitors delivery success, pivots when emails are blocked, and escalates through alternative attack vectors.
1,265%
increase in AI-generated phishing emails since 2023 (SlashNext)
92%
of SA organisations report increased sophistication in social engineering attacks
< 30 sec
time for an AI agent to generate a contextually tailored spear-phish
Autonomous Reconnaissance at Scale
Traditional reconnaissance is time-consuming. An attacker manually reviews LinkedIn profiles, scrapes corporate websites, analyses DNS records, maps network infrastructure, and pieces together an attack surface. An agentic AI compresses this to minutes. For South African organisations, this is particularly concerning. Many local enterprises have a false sense of security rooted in the belief that they are not high-profile enough to attract sophisticated attackers. Agentic AI eliminates the economics that made targeting decisions necessary. When reconnaissance costs nothing, every organisation becomes a viable target.
The Phishing Paradigm Has Changed
Traditional security awareness training teaches users to spot grammatical errors, suspicious sender addresses, and generic greetings. AI-generated phishing eliminates all of these tells. Agentic systems produce flawless, contextually rich messages that reference real projects, real colleagues, and real business events. The old heuristics for identifying phishing are increasingly useless against these threats.
Adaptive Malware and Polymorphic Evasion
Perhaps the most alarming application of agentic AI is in malware development and deployment. Adaptive malware powered by agentic AI can modify its own code to evade detection, alter its execution patterns based on the defensive tools it encounters, and select exploitation techniques based on the specific vulnerabilities present in the target environment. This represents an inversion of the traditional advantage defenders held. Where security teams once had time to analyse, signature, and block new threats, adaptive malware closes that window to near zero.
We are entering an era where the attacker's most dangerous capability is not a zero-day exploit or a novel technique. It is patience, scale, and adaptation, all of which AI provides in unlimited supply.
Defensive AI: Fighting Agents with Agents
The response to agentic threats must itself be agentic. Human analysts cannot match the speed, scale, or adaptability of autonomous attack systems through manual processes alone. Defensive AI, deployed in security operations centres, can triage alerts at machine speed, correlate signals across endpoints, network, identity, and cloud telemetry, and initiate containment actions before a human analyst has finished reading the first alert. South African organisations should be evaluating AI-augmented SOC platforms now. A single analyst supported by effective AI tooling can handle the alert volume that previously required a team of five.
Three Actions for Security Leaders
First, stress-test your defences against AI-generated social engineering. Commission a red team exercise that uses AI-generated phishing to measure your organisation's actual resilience. Second, evaluate AI-augmented SOC platforms that can triage, correlate, and respond at machine speed. Third, update your threat models. If your risk register does not include agentic AI as a distinct threat category, it is already outdated.
Sources & Further Reading
Assess your AI-readiness posture
Talk to our security advisory team about your specific environment.
Book a Briefing
