11

He remarked: “The outcome might be the advancement of AI and modeling, which facilitates the identification of current weaknesses in core IT systems, and consequently, cybercriminals – the malicious entities – could attempt to take advantage of them.”