{"id":3220,"date":"2026-03-02T10:52:09","date_gmt":"2026-03-02T10:52:09","guid":{"rendered":"https:\/\/deniztuncalp.com\/?p=3220"},"modified":"2026-03-13T14:00:47","modified_gmt":"2026-03-13T14:00:47","slug":"cybersecurity-of-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/deniztuncalp.com\/?p=3220","title":{"rendered":"Cybersecurity of Artificial Intelligence"},"content":{"rendered":"\n<p>Last week, as soon as Anthropic announced Claude Code Security, cybersecurity stocks dropped sharply. An AI model is claiming it can identify hundreds of vulnerabilities in open-source code that has been used for years. This is a development that changes the rules of speed and scale in software security. But we now need to ask a new question. AI will find vulnerabilities in software. Will the same structure also be able to find vulnerabilities in your AI systems? AI itself is opening up as a new field of cybersecurity.<\/p>\n\n\n\n<p>Software security is not the only dimension of cybersecurity. An organization\u2019s risk does not arise solely from coding flaws. Identity and access management, cloud configurations, secret management, supply chains, monitoring and response capabilities, and social engineering are all layers that are decisive for security. In fact, the disruption we are experiencing is not just about stronger code scanning. It is about AI being added across each of these layers as a new interface and a new set of capabilities.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-edited.jpg\" alt=\"\" class=\"wp-image-3366\" srcset=\"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-edited.jpg 1024w, https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-edited-300x200.jpg 300w, https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-edited-768x512.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>AI is turning into agents inside companies that query databases, access internal documents, open tickets, change configurations, and behave like security tools. It retrieves information, takes action by using tools, and moves decisions closer to implementation through autonomous workflows. But this transformation is also turning AI itself into a new attack surface, and this surface does not appear to be something that can be protected automatically through the reflexes of classical application security.<\/p>\n\n\n\n<p>The first examples we have been discussing revolve around prompt injection. An input that appears to come from a user triggers an unauthorized query in a background tool. A system that is supposed to function as a security tool ends up executing the wrong instruction as if it were legitimate work. Or the retrieval-augmented generation pipeline carries out sensitive data that your agent is supposed to protect, because of the wrong context. When weak access-control connectors, excessively broad permissions, and inadequate logging come together, what looks like a leak may actually be a natural consequence of how the AI system was designed. Worse still, as agents accumulate privileges in order to get work done, they may open up a new route for privilege-escalation attacks. Attackers are no longer targeting only the application itself, but also the AI layer that exercises authority through the application.<\/p>\n\n\n\n<p>Today, many large institutions and organizations will not deploy a web application without first conducting a penetration test. Yet those same organizations may put into operation an AI system that can run queries and read internal documents without conducting adequate testing. That is because the controls are focused on the model\u2019s generated output. But the risk now spreads across the systems the model is connected to, the permissions it holds, the tools it can use, the logs it generates, and the automation flows it triggers.<\/p>\n\n\n\n<p>AI will transform application security. But AI itself is now the new frontier of security. The next major loss will come either from AI vulnerabilities that no one tested, or from the unexpected consequences of decisions made by AI that no one properly controlled.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, as soon as Anthropic announced Claude Code Security, cybersecurity stocks dropped sharply. An AI model is claiming it can identify hundreds of vulnerabilities in open-source code that has been used for years. This is a development that changes the rules of speed and scale in software security. But we now need to ask [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4251,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,71],"tags":[],"class_list":["post-3220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity of Artificial Intelligence - DenizTuncalp.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/deniztuncalp.com\/?p=3220\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity of Artificial Intelligence - DenizTuncalp.com\" \/>\n<meta property=\"og:description\" content=\"Last week, as soon as Anthropic announced Claude Code Security, cybersecurity stocks dropped sharply. An AI model is claiming it can identify hundreds of vulnerabilities in open-source code that has been used for years. This is a development that changes the rules of speed and scale in software security. But we now need to ask [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/deniztuncalp.com\/?p=3220\" \/>\n<meta property=\"og:site_name\" content=\"DenizTuncalp.com\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-02T10:52:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-13T14:00:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#\\\/schema\\\/person\\\/a56d7465e4d1b2e960c528a700aa5e35\"},\"headline\":\"Cybersecurity of Artificial Intelligence\",\"datePublished\":\"2026-03-02T10:52:09+00:00\",\"dateModified\":\"2026-03-13T14:00:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220\"},\"wordCount\":520,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/deniztuncalp.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/aicyber-1.jpg\",\"articleSection\":[\"Artificial Intelligence\",\"Cybersecurity\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220\",\"url\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220\",\"name\":\"Cybersecurity of Artificial Intelligence - DenizTuncalp.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/deniztuncalp.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/aicyber-1.jpg\",\"datePublished\":\"2026-03-02T10:52:09+00:00\",\"dateModified\":\"2026-03-13T14:00:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#primaryimage\",\"url\":\"https:\\\/\\\/deniztuncalp.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/aicyber-1.jpg\",\"contentUrl\":\"https:\\\/\\\/deniztuncalp.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/aicyber-1.jpg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/?p=3220#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/deniztuncalp.com\\\/?page_id=39&lang=tr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity of Artificial Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#website\",\"url\":\"https:\\\/\\\/deniztuncalp.com\\\/\",\"name\":\"DenizTuncalp.com\",\"description\":\"Deniz Tun\u00e7alp Home Page\",\"publisher\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/deniztuncalp.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#organization\",\"name\":\"DenizTuncalp.com\",\"url\":\"https:\\\/\\\/deniztuncalp.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/deniztuncalp.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/cropped-cropped-logo.png\",\"contentUrl\":\"https:\\\/\\\/deniztuncalp.com\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/cropped-cropped-logo.png\",\"width\":232,\"height\":96,\"caption\":\"DenizTuncalp.com\"},\"image\":{\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/deniztuncalp.com\\\/#\\\/schema\\\/person\\\/a56d7465e4d1b2e960c528a700aa5e35\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/308af9463f973bc69c753b05993c9bb5800bc5226814c2f0f48ec340630ff79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/308af9463f973bc69c753b05993c9bb5800bc5226814c2f0f48ec340630ff79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/308af9463f973bc69c753b05993c9bb5800bc5226814c2f0f48ec340630ff79c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/deniztuncalp.com\"],\"url\":\"https:\\\/\\\/deniztuncalp.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity of Artificial Intelligence - DenizTuncalp.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/deniztuncalp.com\/?p=3220","og_locale":"tr_TR","og_type":"article","og_title":"Cybersecurity of Artificial Intelligence - DenizTuncalp.com","og_description":"Last week, as soon as Anthropic announced Claude Code Security, cybersecurity stocks dropped sharply. An AI model is claiming it can identify hundreds of vulnerabilities in open-source code that has been used for years. This is a development that changes the rules of speed and scale in software security. But we now need to ask [&hellip;]","og_url":"https:\/\/deniztuncalp.com\/?p=3220","og_site_name":"DenizTuncalp.com","article_published_time":"2026-03-02T10:52:09+00:00","article_modified_time":"2026-03-13T14:00:47+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"admin","Tahmini okuma s\u00fcresi":"4 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/deniztuncalp.com\/?p=3220#article","isPartOf":{"@id":"https:\/\/deniztuncalp.com\/?p=3220"},"author":{"name":"admin","@id":"https:\/\/deniztuncalp.com\/#\/schema\/person\/a56d7465e4d1b2e960c528a700aa5e35"},"headline":"Cybersecurity of Artificial Intelligence","datePublished":"2026-03-02T10:52:09+00:00","dateModified":"2026-03-13T14:00:47+00:00","mainEntityOfPage":{"@id":"https:\/\/deniztuncalp.com\/?p=3220"},"wordCount":520,"commentCount":0,"publisher":{"@id":"https:\/\/deniztuncalp.com\/#organization"},"image":{"@id":"https:\/\/deniztuncalp.com\/?p=3220#primaryimage"},"thumbnailUrl":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg","articleSection":["Artificial Intelligence","Cybersecurity"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/deniztuncalp.com\/?p=3220#respond"]}]},{"@type":"WebPage","@id":"https:\/\/deniztuncalp.com\/?p=3220","url":"https:\/\/deniztuncalp.com\/?p=3220","name":"Cybersecurity of Artificial Intelligence - DenizTuncalp.com","isPartOf":{"@id":"https:\/\/deniztuncalp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/deniztuncalp.com\/?p=3220#primaryimage"},"image":{"@id":"https:\/\/deniztuncalp.com\/?p=3220#primaryimage"},"thumbnailUrl":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg","datePublished":"2026-03-02T10:52:09+00:00","dateModified":"2026-03-13T14:00:47+00:00","breadcrumb":{"@id":"https:\/\/deniztuncalp.com\/?p=3220#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/deniztuncalp.com\/?p=3220"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/deniztuncalp.com\/?p=3220#primaryimage","url":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg","contentUrl":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/deniztuncalp.com\/?p=3220#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/deniztuncalp.com\/?page_id=39&lang=tr"},{"@type":"ListItem","position":2,"name":"Cybersecurity of Artificial Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/deniztuncalp.com\/#website","url":"https:\/\/deniztuncalp.com\/","name":"DenizTuncalp.com","description":"Deniz Tun\u00e7alp Home Page","publisher":{"@id":"https:\/\/deniztuncalp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/deniztuncalp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/deniztuncalp.com\/#organization","name":"DenizTuncalp.com","url":"https:\/\/deniztuncalp.com\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/deniztuncalp.com\/#\/schema\/logo\/image\/","url":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2022\/01\/cropped-cropped-logo.png","contentUrl":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2022\/01\/cropped-cropped-logo.png","width":232,"height":96,"caption":"DenizTuncalp.com"},"image":{"@id":"https:\/\/deniztuncalp.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/deniztuncalp.com\/#\/schema\/person\/a56d7465e4d1b2e960c528a700aa5e35","name":"admin","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/308af9463f973bc69c753b05993c9bb5800bc5226814c2f0f48ec340630ff79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/308af9463f973bc69c753b05993c9bb5800bc5226814c2f0f48ec340630ff79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/308af9463f973bc69c753b05993c9bb5800bc5226814c2f0f48ec340630ff79c?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/deniztuncalp.com"],"url":"https:\/\/deniztuncalp.com\/?author=1"}]}},"jetpack_featured_media_url":"https:\/\/deniztuncalp.com\/wp-content\/uploads\/2026\/03\/aicyber-1.jpg","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/posts\/3220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3220"}],"version-history":[{"count":2,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/posts\/3220\/revisions"}],"predecessor-version":[{"id":3369,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/posts\/3220\/revisions\/3369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=\/wp\/v2\/media\/4251"}],"wp:attachment":[{"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deniztuncalp.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}