{"id":3463,"date":"2025-08-21T11:59:00","date_gmt":"2025-08-21T10:59:00","guid":{"rendered":"https:\/\/euroone.hu\/?p=3463"},"modified":"2025-08-14T15:49:45","modified_gmt":"2025-08-14T14:49:45","slug":"invisible-battles-how-ai-defends-against-its-own-kind","status":"publish","type":"post","link":"https:\/\/euroone.hu\/en\/invisible-battles-how-ai-defends-against-its-own-kind\/","title":{"rendered":"Invisible Battles: How AI Defends Against Its Own Kind"},"content":{"rendered":"\n<p>Artificial intelligence has rapidly become an essential part of modern business operations, driving productivity and innovation across industries. Generative AI and large language models (LLMs) now power customer service chatbots, automate document processing, and even assist in software development. Yet the same technology that enables progress is also creating a new class of cyber threats, forcing organizations into a high-stakes battle of AI against AI.<br>Palo Alto Networks has launched three tools\u2014<strong>AI Access Security<\/strong>, <strong>AI-SPM<\/strong>, and <strong>AI Runtime Security<\/strong>\u2014built to tackle today\u2019s AI-driven threats by detecting risks, blocking attacks, and safeguarding data from loss, tampering, or misuse.   <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Rising Risks of AI Misuse<\/h2>\n\n\n\n<p>Attackers are already leveraging AI to enhance traditional cybercrime. Social engineering, once easy to spot through poor grammar or awkward phrasing, is now nearly undetectable as AI can generate flawless, tailored messages. Malicious \u201cdark\u201d LLMs such as <em>WormGPT<\/em> and <em>Evil Bart<\/em> are designed specifically to create harmful code, plan cyberattacks, and generate convincing phishing attempts.<br>Another emerging danger is <em>prompt injection<\/em>\u2014manipulating an AI system\u2019s input so it bypasses built-in security controls. This can result in the AI revealing restricted information, inserting false data, or performing harmful actions. The threat is no longer limited to text-based deception; these vulnerabilities can compromise complex AI-powered applications in real time.     <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Palo Alto Networks\u2019 Three-Tiered Defense Strategy<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. AI Access Security<\/h3>\n\n\n\n<p>Monitors and identifies all AI usage within an organization, including unauthorized \u201c<em>shadow AI<\/em>\u201d tools. It categorizes AI applications (e.g., chatbots, code generators), blocks sensitive data such as personal IDs or credit card numbers from being transmitted, and applies policy-based controls to approve or restrict certain AI tools. This is not just a security measure\u2014it also supports compliance with privacy laws and contractual data protection requirements.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d9e5456eb67&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d9e5456eb67\" class=\"aligncenter size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Access-Security-1024x575.png\" alt=\"\" class=\"wp-image-3455\" srcset=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Access-Security-1024x575.png 1024w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Access-Security-300x168.png 300w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Access-Security-768x431.png 768w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Access-Security-1536x862.png 1536w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Access-Security.png 1924w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><br>2. AI-SPM (Security Posture Management)<\/h3>\n\n\n\n<p>Offers a full security overview of an AI ecosystem, which can include GPUs, containers, databases, APIs, and third-party integrations. It inventories all system components, identifies vulnerabilities, maps how data flows between sources, and ranks risks so security teams can focus on the most urgent threats first. This is especially valuable for businesses that develop or customize AI tools. <\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d9e5456f938&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d9e5456f938\" class=\"aligncenter size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-SPM-1024x575.png\" alt=\"\" class=\"wp-image-3457\" srcset=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-SPM-1024x575.png 1024w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-SPM-300x168.png 300w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-SPM-768x431.png 768w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-SPM-1536x862.png 1536w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-SPM.png 1924w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><br>3. AI Runtime Security<\/h3>\n\n\n\n<p><strong>Provides<\/strong> live protection for operational AI environments. It detects and blocks prompt injection attacks, scans AI outputs for poisoned data or malicious links, and controls network traffic between AI components, even in distributed cloud systems. This layer is critical for defending against attacks that occur after deployment, when systems are actively in use. <\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69d9e54570677&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69d9e54570677\" class=\"aligncenter size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Runtime-Security-1024x575.png\" alt=\"\" class=\"wp-image-3459\" srcset=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Runtime-Security-1024x575.png 1024w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Runtime-Security-300x168.png 300w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Runtime-Security-768x431.png 768w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Runtime-Security-1536x862.png 1536w, https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/AI-Runtime-Security.png 1924w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><br>Addressing AI\u2019s Top Security Challenges<\/h2>\n\n\n\n<p>With the launch of the <strong>LLM OWASP Top 10<\/strong>, the most common AI-specific vulnerabilities are now documented\u2014<strong>prompt injection<\/strong> leads the list, followed by weaknesses in output handling and data access control. Palo Alto Networks\u2019 solutions directly address several of these categories, shrinking the attack surface and strengthening overall resilience.  <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Securing the Future of AI<\/h2>\n\n\n\n<p>Adopting AI is no longer a competitive differentiator\u2014it\u2019s a basic requirement for staying relevant. But securing AI systems is just as essential as deploying them. <strong>Palo Alto<\/strong><strong> Networks\u2019<\/strong><strong> combined approach<\/strong> delivers visibility into AI usage, identifies and prioritizes vulnerabilities, and provides real-time defenses against malicious activity. <\/p>\n\n\n\n<p>Artificial intelligence represents one of the greatest opportunities of the digital age\u2014and one of its greatest risks. The key question is not whether organizations will use AI, but whether they can protect its value while defending against increasingly intelligent threats.  <\/p>\n\n\n\n<p>Read the full article on our International subsidiary\u2019s website by clicking on the logo:<a href=\"https:\/\/socwise.eu\/grc-platforms-excel-does-not-protect-against-ransomware\/?utm_source=EO_blog&amp;utm_medium=clickthrough\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/socwise.eu\/the-intersection-of-law-and-ai-responsibility-risk-regulation\/?utm_source=EO_blog&amp;utm_medium=clickthrough_Kerecsen_Summit\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/socwise.eu\/fighting-invisible-threats-how-does-ai-protect-against-ai\/?utm_source=EO_blog&amp;utm_medium=clickthrough_Vilhelm_Summit\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"488\" height=\"329\" src=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/10\/socwise-poweredArtboard-1@4x-100.jpg\" alt=\"\" class=\"wp-image-1534\" style=\"width:220px\" srcset=\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/10\/socwise-poweredArtboard-1@4x-100.jpg 488w, https:\/\/euroone.hu\/wp-content\/uploads\/2024\/10\/socwise-poweredArtboard-1@4x-100-300x202.jpg 300w\" sizes=\"auto, (max-width: 488px) 100vw, 488px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The front line of cyber warfare is AI: Palo Alto Networks&#8217; innovative solutions detect, block, and prevent invisible, AI-based attacks and data loss in real time.<\/p>\n","protected":false},"author":3,"featured_media":3476,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87],"tags":[],"class_list":["post-3463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Invisible Battles: How AI Defends Against Its Own Kind - EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.<\/title>\n<meta name=\"description\" content=\"Invisible AI threats are lurking. Discover how Palo Alto Networks&#039; groundbreaking protection stops them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Invisible Battles: How AI Defends Against Its Own Kind - EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.\" \/>\n<meta property=\"og:description\" content=\"Invisible AI threats are lurking. Discover how Palo Alto Networks&#039; groundbreaking protection stops them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/euroone\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T10:59:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"631\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mancz\u00e1k Rich\u00e1rd\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mancz\u00e1k Rich\u00e1rd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\"},\"author\":{\"name\":\"Mancz\u00e1k Rich\u00e1rd\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96\"},\"headline\":\"Invisible Battles: How AI Defends Against Its Own Kind\",\"datePublished\":\"2025-08-21T10:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\"},\"wordCount\":581,\"publisher\":{\"@id\":\"https:\/\/euroone.hu\/#organization\"},\"image\":{\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\",\"url\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\",\"name\":\"Invisible Battles: How AI Defends Against Its Own Kind - EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.\",\"isPartOf\":{\"@id\":\"https:\/\/euroone.hu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png\",\"datePublished\":\"2025-08-21T10:59:00+00:00\",\"description\":\"Invisible AI threats are lurking. Discover how Palo Alto Networks' groundbreaking protection stops them.\",\"breadcrumb\":{\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage\",\"url\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png\",\"contentUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png\",\"width\":1201,\"height\":631},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\/\/euroone.hu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Invisible Battles: How AI Defends Against Its Own Kind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/euroone.hu\/#website\",\"url\":\"https:\/\/euroone.hu\/\",\"name\":\"Euroone\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/euroone.hu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/euroone.hu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/euroone.hu\/#organization\",\"name\":\"Euroone\",\"url\":\"https:\/\/euroone.hu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png\",\"contentUrl\":\"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png\",\"width\":741,\"height\":768,\"caption\":\"Euroone\"},\"image\":{\"@id\":\"https:\/\/euroone.hu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/euroone\",\"https:\/\/www.linkedin.com\/company\/euro-one\/\",\"https:\/\/www.youtube.com\/@euroonezrt\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96\",\"name\":\"Mancz\u00e1k Rich\u00e1rd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/euroone.hu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g\",\"caption\":\"Mancz\u00e1k Rich\u00e1rd\"},\"url\":\"https:\/\/euroone.hu\/en\/author\/richard-manczak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Invisible Battles: How AI Defends Against Its Own Kind - EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.","description":"Invisible AI threats are lurking. Discover how Palo Alto Networks' groundbreaking protection stops them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/","og_locale":"en_US","og_type":"article","og_title":"Invisible Battles: How AI Defends Against Its Own Kind - EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.","og_description":"Invisible AI threats are lurking. Discover how Palo Alto Networks' groundbreaking protection stops them.","og_url":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/","og_site_name":"EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.","article_publisher":"https:\/\/www.facebook.com\/euroone","article_published_time":"2025-08-21T10:59:00+00:00","og_image":[{"width":1201,"height":631,"url":"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png","type":"image\/png"}],"author":"Mancz\u00e1k Rich\u00e1rd","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mancz\u00e1k Rich\u00e1rd","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#article","isPartOf":{"@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/"},"author":{"name":"Mancz\u00e1k Rich\u00e1rd","@id":"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96"},"headline":"Invisible Battles: How AI Defends Against Its Own Kind","datePublished":"2025-08-21T10:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/"},"wordCount":581,"publisher":{"@id":"https:\/\/euroone.hu\/#organization"},"image":{"@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/","url":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/","name":"Invisible Battles: How AI Defends Against Its Own Kind - EURO ONE Sz\u00e1m\u00edt\u00e1stechnikai Zrt.","isPartOf":{"@id":"https:\/\/euroone.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage"},"image":{"@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png","datePublished":"2025-08-21T10:59:00+00:00","description":"Invisible AI threats are lurking. Discover how Palo Alto Networks' groundbreaking protection stops them.","breadcrumb":{"@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#primaryimage","url":"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png","contentUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2025\/08\/cybersummit81x.png","width":1201,"height":631},{"@type":"BreadcrumbList","@id":"https:\/\/euroone.hu\/harc-a-lathatatlan-fenyegetesek-ellen-hogyan-vedi-az-ai-t-az-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/euroone.hu\/en\/"},{"@type":"ListItem","position":2,"name":"Invisible Battles: How AI Defends Against Its Own Kind"}]},{"@type":"WebSite","@id":"https:\/\/euroone.hu\/#website","url":"https:\/\/euroone.hu\/","name":"Euroone","description":"","publisher":{"@id":"https:\/\/euroone.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/euroone.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/euroone.hu\/#organization","name":"Euroone","url":"https:\/\/euroone.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/euroone.hu\/#\/schema\/logo\/image\/","url":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png","contentUrl":"https:\/\/euroone.hu\/wp-content\/uploads\/2024\/09\/EURO-ONE-szines-logo.png","width":741,"height":768,"caption":"Euroone"},"image":{"@id":"https:\/\/euroone.hu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/euroone","https:\/\/www.linkedin.com\/company\/euro-one\/","https:\/\/www.youtube.com\/@euroonezrt"]},{"@type":"Person","@id":"https:\/\/euroone.hu\/#\/schema\/person\/a07dfdf169ad4d7ad526398a17dbcb96","name":"Mancz\u00e1k Rich\u00e1rd","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/euroone.hu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37677d3586c5a3e5e28c7713cc9b9d23ab531d902697720841f10cc10264deba?s=96&d=mm&r=g","caption":"Mancz\u00e1k Rich\u00e1rd"},"url":"https:\/\/euroone.hu\/en\/author\/richard-manczak\/"}]}},"_links":{"self":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts\/3463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/comments?post=3463"}],"version-history":[{"count":7,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts\/3463\/revisions"}],"predecessor-version":[{"id":3480,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/posts\/3463\/revisions\/3480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/media\/3476"}],"wp:attachment":[{"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/media?parent=3463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/categories?post=3463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euroone.hu\/en\/wp-json\/wp\/v2\/tags?post=3463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}