News

Bionic Hackbots Rise, Powerful Partners to Humans

  • Teri Robinson--securityboulevard.com
  • published date: 2025-10-27 00:00:00 UTC

None

<p><span data-contrast="none">The rapid rise of AI and automation has helped create a new breed of researcher — the bionic hacker. Think of a Steve Austen-type researcher, only instead of body parts replaced by machines, human creativity is being augmented by automation</span><span data-contrast="none">. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">These bionic hackers use “</span><span data-contrast="auto">AI as a catalyst, accelerating recon, triage, scaling pattern recognition, and probing complex attack surfaces faster than ever before,” </span><span data-contrast="none">according to </span><span data-contrast="none">HackerOne’s 9</span><span data-contrast="none">th</span><span data-contrast="none"> Edition Hacker-Powered Security Report 2025/2025</span><span data-contrast="auto">. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><div class="code-block code-block-13" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-13-1" data-info="WyIxMy0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="U2hvcnQ=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://www.techstrongevents.com/cruisecon-virtual-west-2025/home?ref=in-article-ad-2&amp;utm_source=sb&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-2" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2025/10/Banner-770x330-social-1.png" alt="Cruise Con 2025"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><span data-contrast="auto">The report draws</span><span data-contrast="none"> on HackerOne’s more than two million-strong researcher community</span><span data-contrast="auto">. HackerOne found “the gap between traditional automation and human testing is closing; not because humans are being replaced, but because they are evolving with AI.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">That’s a good thing, because the report also found bad actors are exploiting “vulnerabilities at machine speed, often before defenders even recognize the threat.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">The report’s findings underscore the profound impact of <a href="https://securityboulevard.com/2025/07/thales-ai-cybersecurity-using-ai-protecting-ai-protecting-against-ai/" target="_blank" rel="noopener">AI on cybersecurity</a> — both for defenders and attackers. Seven in ten AI-native researchers use AI tools, while AI adoption has expanded 270%. The research showed that 1,121 distinct programs included AI in their scope or received a valid AI vulnerability and 41 percent already are testing AI assets as part of their work. Perhaps that’s why more than half of the respondents (58%). have upskilled in AI/ML. </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">That’s all well and good, but they may want to ramp up those efforts, since while 84% of CISOs oversee AI security and data privacy, plenty of them say they lack the resources to effectively manage the risks. They will likely pay for lapses in security, as 13% of the organizations had an AI-related incident in 2025 — and 97% of those didn’t have the proper AI access controls.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">They might be getting some help from autonomous hackbots, though — not only were 560 valid reports noted, the researchers found a 49% validity rate, which they say “shows bots excel at surface-level flaws while humans still uncover higher-order issues.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Adversaries clearly are using AI to gain the upper hand — HackerOne researchers say that prompt injection spikes are the fastest-growing AI threats, with valid reports shooting up 540%. As further evidence that defenders are fighting a difficult battle, HackerOne paid out $81 million in bounties in 2025, a record. And $2.9 billion in breach losses were avoided, also a record.</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">HackerOne noted a shift in AI “from isolated models to a connected ecosystem” where “new protocols and architectures now let systems operate with real-time context, coordinate across tools, and embed directly into security workflows.” </span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">That’s a shift that the company says is “reshaping both sides of the HackerOne community: Customers are rapidly bringing AI assets into scope, and researchers are growing the skills to test and secure them.”</span><span data-ccp-props='{"201341983":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Hackone’s Security report “validates what we are seeing across the industry: AI risks have rapidly moved from a watch list item to a front-line security concern, especially when it comes to data security and misuse,” says Diana Kelley, CISO at Noma Security. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“The 210% surge in valid AI-related vulnerability reports confirms the speed of this threat evolution and the fact that 78% of customers now cite growing concern over AI underscores this,” she says.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Even more crucial, “65% of the AI vulnerabilities are related to complex AI security issues like prompt injection, exposed endpoints, and model manipulation,” Kelley explains. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“We are also witnessing the rise of  AI-powered hackers and attackers, humans that leverage  AI-powered autonomous and agentic tools,” she says.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">To manage the emerging threat landscape, blue teams must take “a mature, continuous security approach.” Robust blue team programs complement current trends and the value of ethical hackers, “starting with a full inventory of all AI systems, including agentic components as a baseline for governance and risk management,” Kelley says. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">She suggests that as vulnerabilities increase, adopting an AI Bill of Materials (AIBOM) “is the foundation for effective supply chain security and AI vulnerability management.” </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">And she noted that “robust red team and pre-deployment testing remain vital as does runtime monitoring and logging, which round out the approach by providing the visibility to detect and in some cases even block attacks during use.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/10/bionic-hackbots-rise-powerful-partners-to-humans/" data-a2a-title="Bionic Hackbots Rise, Powerful Partners to Humans "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fbionic-hackbots-rise-powerful-partners-to-humans%2F&amp;linkname=Bionic%20Hackbots%20Rise%2C%20Powerful%20Partners%20to%20Humans%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fbionic-hackbots-rise-powerful-partners-to-humans%2F&amp;linkname=Bionic%20Hackbots%20Rise%2C%20Powerful%20Partners%20to%20Humans%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fbionic-hackbots-rise-powerful-partners-to-humans%2F&amp;linkname=Bionic%20Hackbots%20Rise%2C%20Powerful%20Partners%20to%20Humans%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fbionic-hackbots-rise-powerful-partners-to-humans%2F&amp;linkname=Bionic%20Hackbots%20Rise%2C%20Powerful%20Partners%20to%20Humans%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fbionic-hackbots-rise-powerful-partners-to-humans%2F&amp;linkname=Bionic%20Hackbots%20Rise%2C%20Powerful%20Partners%20to%20Humans%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>