ARCHIVES

Review Article

How Artificial Intelligence is Revolutionising Cybersecurity: Challenges and the Future

Santosh Kumar Jadala1
1 Department of Computer and Information Sciences, University of the Cumberlands, United States of America.

Published Online: May-August 2026

Pages: 318-326

References

1. Abbas, N. N., Ahmed, T., Shah, S. H. U., Omar, M., & Park, H. W. (2019). Investigating the applications of artificial intelligence in cybersecurity. Scientometrics, 121(2), 1189-1211. https://doi.org/10.1007/s11192-019-03222-9
2. Ali, A., Khan, M. A., Farid, K., Akbar, S. S., Ilyas, A., Ghazal, T. M., & Al Hamadi, H. (2023, March). The effect of artificial intelligence on cybersecurity. In the 2023 International Conference on Business Analytics for Technology and Security (ICBATS) (pp. 1-7). IEEE. 10.1109/ICBATS57792.2023.10111151
3. Ansari, M. F., Dash, B., Sharma, P., & Yathiraju, N. (2022). The impact and limitations of artificial intelligence in cybersecurity: a literature review. International Journal of Advanced Research in Computer and Communication Engineering. https://ssrn.com/abstract=4323317
4. Basu, A. (2024, November). The impact of artificial intelligence on cybersecurity. In Abu Dhabi International Petroleum Exhibition and Conference (p. D021S077R001). SPE. https://doi.org/10.2118/222493-MS
5. Calderon, R. (2019). The benefits of artificial intelligence in cybersecurity. https://d1wqtxts1xzle7.cloudfront.net/104950055/viewcontent-libre.pdf?1691851508=&response-content-disposition=inline%3B+filename%3DThe_Benefits_of_Artificial_Intelligence.pdf&Expires=1777362488&Signature=F2gbQKxqgCeqCFqNFvJpb4a9d8Ii1xpVQEz8jXJq7FDEwgNR0KBAhGLys5yEVBf~AQOtTiwP8P~gWvz~3kQa3qvJPui6t9fmFi6UKYBOWaL3dZEZhsUH7LMUWFg7xcIdn6sQucz~NTZG7CpJwFWlzAGG05c3PnnRIDVWL6OVajdpRkUMdcsFEL~Eu5NkyLNh6rDegjzswCMM5OjoHs6Q-03KPwESUibXaaLEgn~ME1dks2f~7ZEi~yIcDQJbACYPXHQW2Z9nR1Ae8YMV3lbtEdFKjOcFKD6ZpucXBTZp0Of~QKVE2AGivBgv957t7GDg6cs3FtGHgoP9O36xYZqUg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA Dalal, A. (2018). Cybersecurity and artificial intelligence: How AI is being used in cybersecurity to improve detection and response to cyber threats. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 9(3), 10-61841. https://dx.doi.org/10.2139/ssrn.5403828
6. De Azambuja, A. J. G., Plesker, C., Schützer, K., Anderl, R., Schleich, B., & Almeida, V. R. (2023). Artificial intelligence-based cybersecurity in the context of Industry 4.0—a survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920
7. European Union Agency for Cybersecurity. (2025). ENISA threat landscape 2025. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025
8. IBM Security. (2025). Cost of a data breach report 2025. IBM. https://www.ibm.com/reports/data-breach
9. Jada, I., & Mayayise, T. O. (2024). The impact of artificial intelligence on organizational cybersecurity: An outcome of a systematic literature review. Data and Information Management, 8(2), 100063. https://doi.org/10.1016/j.dim.2023.100063
10. Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. Valley International Journal Digital Library, 1(2), 564-574. 10.18535/ijsrm/v9i2.ec01
11. Jonas, D., Yusuf, N. A., & Zahra, A. R. A. (2023). Enhancing security frameworks with artificial intelligence in cybersecurity. International Transactions on Education Technology (ITEE), 2(1), 83-91. https://doi.org/10.33050/itee.v2i1.428
12. Khan, K., Khurshid, A., & Cifuentes-Faura, J. (2024). Is artificial intelligence a new battleground for cybersecurity?. Internet of Things, 28, 101428. https://doi.org/10.1016/j.iot.2024.101428
13. Lysenko, S., Bobro, N., Korsunova, K., Vasylchyshyn, O., & Tatarchenko, Y. (2024). The role of artificial intelligence in cybersecurity: Automation of protection and detection of threats. Economic Affairs, 69, 43-51. https://www.proquest.com/openview/ebe74758eaa95b3e9ea9e2882b9cfb1d/1?pq-origsite=gscholar&cbl=2032164
14. Malatji, M., & Tolah, A. (2025). Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI. AI and Ethics, 5(2), 883-910. https://doi.org/10.1007/s43681-024-00427-4
15. Morel, B. (2011, October). Artificial intelligence and the future of cybersecurity. In Proceedings of the 4th ACM workshop on Security and artificial intelligence (pp. 93-98). https://doi.org/10.1145/2046684.2046699
16. Morovat, K., & Panda, B. (2020, December). A survey of artificial intelligence in cybersecurity. In the 2020 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 109-115). IEEE. 10.1109/CSCI51800.2020.00026
17. Naik, B., Mehta, A., Yagnik, H., & Shah, M. (2022). The impacts of artificial intelligence techniques in the augmentation of cybersecurity: a comprehensive review. Complex & Intelligent Systems, 8(2), 1763-1780. https://doi.org/10.1007/s40747-021-00494-8
18. Namiot, D., Ilyushin, E., & Chizhov, I. (2022). Artificial intelligence and cybersecurity. International Journal of Open Information Technologies, 10(9), 135-147. https://injoit.org/index.php/j1/article/view/1402
19. National Cyber Security Centre. (2024). The near-term impact of AI on the cyber threat. https://www.ncsc.gov.uk/report/impact-of-ai-on-cyber-threat
20. National Institute of Standards and Technology. (2024a). The NIST cybersecurity framework (CSF) 2.0 (NIST CSWP 29). https://doi.org/10.6028/NIST.CSWP.29
21. Okdem, S., & Okdem, S. (2024). Artificial intelligence in cybersecurity: A review and a case study. Applied Sciences, 14(22), 10487. https://doi.org/10.3390/app142210487
22. OWASP Foundation. (2025). OWASP top 10 for large language model applications https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-v2025.pdf
23. Polito, C., & Pupillo, L. (2024). Artificial intelligence and cybersecurity. Intereconomics, 59(1), 10-13. 10.2478/ie-2024-0004
24. Shamiulla, A. M. (2019). Role of artificial intelligence in cybersecurity. International Journal of Innovative Technology and Exploring Engineering, 9(1), 4628-4630. https://d1wqtxts1xzle7.cloudfront.net/103482360/A6115119119-libre.pdf?1687044419=&response-content-disposition=inline%3B+filename%3DRole_of_Artificial_Intelligence_in_Cyber.pdf&Expires=1777363231&Signature=gWEMci4dKW8eGBw~DtSycE5jmUa9vJzKh94J0So2YIm0yjPVg4X0offutKePI8hiV28XAMcYMaLR6GhjQ7rbrQNUWSe6sUJK5dZ63XwU2hgvwhh0g8NCyZQSDyPxzWKpttftfREGyl3stgDh6hy9TgySR2oaPhv3CWJeJJHjA4Uu4xPkp2EtRPjcQsR4ATJjUOziwSp3Yqw355mJBu7iWfMT0aY6BHO7BJtY~65k5bUFxiOi2a3k~0xaY5qr44CLs9z3OoJKBtROCDAmW2dbgjmXPl3GNAtX9yAXj9PTQqz8RhW~lTr5RL3LtdU02n-YReRbvZ3r12ZBBGb8AZlrg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
25. Soni, V. D. (2020). Challenges and Solutions for Artificial Intelligence in Cybersecurity of the USA. Available at SSRN 3624487. https://dx.doi.org/10.2139/ssrn.3624487
26. Sontan, A. D., & Samuel, S. V. (2024). The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities. World Journal of Advanced Research and Reviews, 21(2), 1720-1736. https://doi.org/10.30574/wjarr.2024.21.2.0607
27. Taddeo, M. (2019). Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity: M. Taddeo. Minds and machines, 29(2), 187-191. https://doi.org/10.1007/s11023-019-09504-8
28. Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557-560. https://doi.org/10.1038/s42256-019-0109-1
29. Tao, F., Akhtar, M. S., & Jiayuan, Z. (2021). The future of artificial intelligence in cybersecurity: A comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28). 10.4108/eai.7-7-2021.170285
30. Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020). Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access, 8, 146598-146612. 10.1109/ACCESS.2020.3013145
31. Wirkuttis, N., & Klein, H. (2017). Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), 103-119. https://d1wqtxts1xzle7.cloudfront.net/52464497/Artificial_Intelligence_in_Cybersecurity-libre.pdf?1491298654=&response-content-disposition=inline%3B+filename%3DArtificial_Intelligence_in_Cybersecurity.pdf&Expires=1777362362&Signature=Ptc14IJTaUEDK6SGzhucDHqjqcEYFtRYn48kDrZJBJa1i4dQkwYODwyDVWxDp8RTGxC~xbtuKTjLChUpdwq6E00nJOq-NGsNIHq1fcVpfo2I~gGH~jahU9IUanafocPc1V6HMacH5QKfpZ4JUikQWmPhRqLySOr5YY7O8-gcgTw1a9IPVFhNBHB5gWSEMbWW6XWKgZnKPO7K7WjKiBWlD9RiWbXjIYgIn8Q-TZziP57Zi4VOdEeppdg5nx7fj~TNmfIQHOlUKgkn6FZxF4nT990YvZJNp8PlqlSsIFjM4lk2qCdfpsEJpSaGxuPD27T-a6XYMjQ08olTA3EzHcN4vA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
32. Zavushchak, I. (2025). The impact of artificial intelligence on cybersecurity and data protection. Int. J. Wireless Microwave Technol.(IJWMT), 15(4), 65-72. https://orcid.org/ 0000-0002-5371-8775

Related Articles

2026

Artificial Intelligence in Learning and Teaching

2026

Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application

2026

Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach

2026

Eco-Genius: Power Up Smart, Power Down Waste

2026

Crowd-Sourced Disaster Response and Rescue Assistant

2026

Unveiling Deepfake Detection Using Vision Transformers: A Survey and Experimental Study

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20260502035

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.