Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations

<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically addres...

Full description

Saved in:
Bibliographic Details
Main Author: Mueen Uddin (4903510) (author)
Other Authors: Muhammad Saad Irshad (22466725) (author), Irfan Ali Kandhro (17541876) (author), Fuhid Alanazi (22466728) (author), Fahad Ahmed (825921) (author), Muhammad Maaz (5600600) (author), Saddam Hussain (3144783) (author), Syed Sajid Ullah (17541507) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513533669015552
author Mueen Uddin (4903510)
author2 Muhammad Saad Irshad (22466725)
Irfan Ali Kandhro (17541876)
Fuhid Alanazi (22466728)
Fahad Ahmed (825921)
Muhammad Maaz (5600600)
Saddam Hussain (3144783)
Syed Sajid Ullah (17541507)
author2_role author
author
author
author
author
author
author
author_facet Mueen Uddin (4903510)
Muhammad Saad Irshad (22466725)
Irfan Ali Kandhro (17541876)
Fuhid Alanazi (22466728)
Fahad Ahmed (825921)
Muhammad Maaz (5600600)
Saddam Hussain (3144783)
Syed Sajid Ullah (17541507)
author_role author
dc.creator.none.fl_str_mv Mueen Uddin (4903510)
Muhammad Saad Irshad (22466725)
Irfan Ali Kandhro (17541876)
Fuhid Alanazi (22466728)
Fahad Ahmed (825921)
Muhammad Maaz (5600600)
Saddam Hussain (3144783)
Syed Sajid Ullah (17541507)
dc.date.none.fl_str_mv 2025-05-07T03:00:00Z
dc.identifier.none.fl_str_mv 10.1007/s10462-025-11219-5
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Generative_AI_revolution_in_cybersecurity_a_comprehensive_review_of_threat_intelligence_and_operations/30448103
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Engineering
Control engineering, mechatronics and robotics
Information and computing sciences
Artificial intelligence
Cybersecurity and privacy
Data management and data science
Generative AI
Security
Artificial intelligence
Machine learning
Natural language processing
Learning systems
LMM
dc.title.none.fl_str_mv Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. It can work on more critical security aspects where human intervention is required and handle everyday threat situations autonomously. This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. Moreover, this research study also highlights autonomous security enhancements, improved security posture against emerging threats, anomaly detection, and threat response. Besides this, we have discussed the GAI limitations, such as occasional incorrect results, expensive training, and the potential for misuse by malicious actors for illegal activities. This research study also provides valuable insights into the balanced adoption of GAI in cybersecurity, ensuring effective threat migration without compromising system integrity.</p><h2>Other Information</h2><p dir="ltr">Published in: Artificial Intelligence Review<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10462-025-11219-5" target="_blank">https://dx.doi.org/10.1007/s10462-025-11219-5</a></p>
eu_rights_str_mv openAccess
id Manara2_b6111371010e14216034f1e5d5bf9fbd
identifier_str_mv 10.1007/s10462-025-11219-5
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/30448103
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operationsMueen Uddin (4903510)Muhammad Saad Irshad (22466725)Irfan Ali Kandhro (17541876)Fuhid Alanazi (22466728)Fahad Ahmed (825921)Muhammad Maaz (5600600)Saddam Hussain (3144783)Syed Sajid Ullah (17541507)EngineeringControl engineering, mechatronics and roboticsInformation and computing sciencesArtificial intelligenceCybersecurity and privacyData management and data scienceGenerative AISecurityArtificial intelligenceMachine learningNatural language processingLearning systemsLMM<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. It can work on more critical security aspects where human intervention is required and handle everyday threat situations autonomously. This research paper explores GAI in enhancing cybersecurity by leveraging AI Models and algorithms. GAI can autonomously address common security issues, detect novel threats, and augment human intervention in critical security aspects. Moreover, this research study also highlights autonomous security enhancements, improved security posture against emerging threats, anomaly detection, and threat response. Besides this, we have discussed the GAI limitations, such as occasional incorrect results, expensive training, and the potential for misuse by malicious actors for illegal activities. This research study also provides valuable insights into the balanced adoption of GAI in cybersecurity, ensuring effective threat migration without compromising system integrity.</p><h2>Other Information</h2><p dir="ltr">Published in: Artificial Intelligence Review<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s10462-025-11219-5" target="_blank">https://dx.doi.org/10.1007/s10462-025-11219-5</a></p>2025-05-07T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1007/s10462-025-11219-5https://figshare.com/articles/journal_contribution/Generative_AI_revolution_in_cybersecurity_a_comprehensive_review_of_threat_intelligence_and_operations/30448103CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/304481032025-05-07T03:00:00Z
spellingShingle Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Mueen Uddin (4903510)
Engineering
Control engineering, mechatronics and robotics
Information and computing sciences
Artificial intelligence
Cybersecurity and privacy
Data management and data science
Generative AI
Security
Artificial intelligence
Machine learning
Natural language processing
Learning systems
LMM
status_str publishedVersion
title Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
title_full Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
title_fullStr Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
title_full_unstemmed Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
title_short Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
title_sort Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
topic Engineering
Control engineering, mechatronics and robotics
Information and computing sciences
Artificial intelligence
Cybersecurity and privacy
Data management and data science
Generative AI
Security
Artificial intelligence
Machine learning
Natural language processing
Learning systems
LMM