{"id":4540,"date":"2026-02-06T07:36:57","date_gmt":"2026-02-06T06:36:57","guid":{"rendered":"https:\/\/enthec.com\/?p=4540"},"modified":"2026-02-06T07:36:57","modified_gmt":"2026-02-06T06:36:57","slug":"ai-in-cognitive-warfare-how-are-cyberattacks-evolving","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/","title":{"rendered":"AI in cognitive warfare: how are cyberattacks evolving?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">When we talk about cyberattacks, we used to think almost exclusively of viruses, data theft, or system outages, but today the scenario is much more complex.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Technology, and especially artificial intelligence, has opened a new dimension to digital conflict: cognitive warfare. It&#8217;s no longer just about breaking systems, but about  <\/span><b>influencing, confusing, and manipulating people&#8217;s and organizations&#8217; perceptions<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>AI in cognitive warfare<\/b><span style=\"font-weight: 400;\"> has become an essential concept for understanding how cyberattacks evolve and why traditional defense is no longer sufficient. Threats target not only technical infrastructure but also decision-making, reputation, and trust. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is cognitive warfare, and why does it matter?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cognitive warfare is a form of conflict that seeks to influence how we think, decide, and react. In the digital environment, this translates into disinformation campaigns, identity theft, narrative manipulation, and attacks aimed at eroding trust. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike classic cyberattacks,<\/span> <b>the objective is not always technical.<\/b><span style=\"font-weight: 400;\">. Sometimes, all it takes is one person clicking where he shouldn&#8217;t, believing a false message, or making a bad decision under pressure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AI in cognitive warfare amplifies this problem by enabling the automation and scaling of these attacks with a precision that did not exist before.<\/span><\/p>\n<h3><b>From systems to minds<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Today, attackers no longer just look for vulnerabilities in servers or applications. They also look for human weaknesses such as lack of information, overconfidence, fatigue, urgency, and stress. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">AI allows<\/span> <b>analyzing behaviors, adapting messages, and launching customized attacks in real time.<\/b><span style=\"font-weight: 400;\">. The result is a type of threat that is much harder to detect and stop.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The role of artificial intelligence in new attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Artificial intelligence is neither good nor bad in itself. <\/span><b>The problem arises when it is used for malicious purposes.<\/b><span style=\"font-weight: 400;\">. In the field of AI in cognitive warfare, its use has spread rapidly.<\/span><\/p>\n<h3><b>More credible and personalized attacks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Thanks to language models and data analysis systems, attackers can create fake emails, messages, or documents that are almost indistinguishable from the real thing. This has increased the levels of phishing and spear phishing. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"alignnone size-full wp-image-4534\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/ia-guerra-cognitiva.jpg\" alt=\"AI cognitive warfare\" width=\"650\" height=\"319\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/ia-guerra-cognitiva.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/ia-guerra-cognitiva-300x147.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/ia-guerra-cognitiva-350x172.jpg 350w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Large-scale disinformation<\/b><\/h3>\n<p><b>AI also facilitates the creation and mass dissemination of fake content,<\/b> <span style=\"font-weight: 400;\">including<\/span> manipulated news, fake social network profiles, and coordinated campaigns to damage the reputations of companies and individuals.<\/p>\n<p><span style=\"font-weight: 400;\">At this point, AI in cognitive warfare ceases to be a theoretical concept and begins to directly affect business, brand image, and the internal stability of organizations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Why do traditional cybersecurity models fall short?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Many security strategies still rely on a reactive approach: protecting the perimeter, installing patches, and responding only after an incident occurs. The problem is that in cognitive warfare, damage often occurs before any technical alerts are triggered. <\/span><\/p>\n<h3><b>The limit of reactive safety<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">When an employee falls for a well-designed deception or a false narrative is spread internally, the impact can be immediate:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Erroneous business decisions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Loss of trust from customers and partners<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unnecessary exposure to new threats<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This is where a more advanced approach comes into play, focused on the<\/span> <b>Continuous Threat Exposure Management (CTEM)<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>CTEM: anticipate instead of reacting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The CTEM approach starts with a simple idea:<\/span> <b>Protection is not enough; we must continuously understand the threats we face.<\/b><span style=\"font-weight: 400;\">. This includes both technical assets and human and contextual factors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In an environment shaped by AI in cognitive warfare, this type of management becomes especially relevant. The  <\/span><span style=\"font-weight: 400;\">CTEM model<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Cyber \u200b\u200bsurveillance: a fundamental element in cognitive warfare<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cyber surveillance has become a fundamental tool for detecting early signs of attacks, especially those aimed at influencing or manipulating.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where<\/span> Enthec adds value with its specialized solutions.<\/p>\n<h3><b>Kartos: cyber surveillance for companies<\/b><\/h3>\n<p><a href=\"https:\/\/enthec.com\/en\/kartos\/\"><span style=\"font-weight: 400;\">Kartos<\/span><\/a><span style=\"font-weight: 400;\"> is geared toward organizations that need a clear, continuous view of their threat exposure. It goes beyond simply detecting technical vulnerabilities; it helps understand how and where an attack could originate, including those related to AI and cognitive warfare. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Among its capabilities are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuous monitoring of the attack surface<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identification of emerging risks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Support for CTEM strategies adapted to the business<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This approach allows for informed decisions to be made before the problem escalates.<\/span><\/p>\n<h3><b>Qondar: protection for individuals in a hostile environment<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cognitive warfare doesn&#8217;t just affect large companies. <\/span><b>Managers, professionals, and individual users are also common targets.<\/b><\/p>\n<p><a href=\"https:\/\/enthec.com\/en\/qondar\/\"><span style=\"font-weight: 400;\">Qondar<\/span><\/a> <span style=\"font-weight: 400;\">Enthec&#8217;s solution for individuals offers tools for<\/span> <a href=\"https:\/\/enthec.com\/en\/why-cyber-surveillance-is-key-to-any-cisos-strategy\/\"><span style=\"font-weight: 400;\">cyber surveillance<\/span><\/a> <span style=\"font-weight: 400;\">designed to protect digital identity and reduce personal exposure to increasingly sophisticated threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a context where AI in cognitive warfare is infiltrating emails, social networks, and work platforms, having this type of support is no longer optional.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The human factor remains decisive<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">No matter how much technology is implemented, the<\/span> <a href=\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\"><span style=\"font-weight: 400;\">human factor<\/span><\/a><span style=\"font-weight: 400;\"> remains at the heart of the problem. The difference is that now the attacks are designed to exploit it systematically and rely on AI. <\/span><\/p>\n<h3><b>Awareness and context<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It&#8217;s not just about training users, but about giving them context:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding how threats evolve<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Knowing how to identify subtle signs of manipulation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Having systems in place to support their decisions<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The combination of awareness, clear processes, and CTEM tools is the best defense against AI in cognitive warfare.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Looking to the future: a silent but constant conflict<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">All indications are that these types of attacks will continue to grow. Artificial intelligence will continue to evolve, and with it, manipulation and deception techniques will evolve as well. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The question is no longer whether an organization or a person will be targeted by<\/span> <b>AI in cognitive warfare, but when and with what level of preparedness<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adopting a Continuous Threat Exposure Management approach, supported by cyber-surveillance solutions such as Kartos and Qondar, enables a shift from a defensive posture to a conscious, proactive strategy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Understanding to better protect<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cognitive warfare has changed the rules of the game. Cyberattacks no longer just seek to exploit technical flaws, but also  <\/span><b>to influence how we think and act.<\/b><span style=\"font-weight: 400;\">. AI in cognitive warfare is a reality that affects both companies and individuals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given this scenario, the key lies in<\/span> <b>understanding the actual exposure to threats<\/b>, <span style=\"font-weight: 400;\">anticipating them, and having tools that offer continuous visibility.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to know<\/span> <b>how to reduce your exposure and prepare for this new type of attack, <\/b><span style=\"font-weight: 400;\">discover the<\/span> <a href=\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\"><span style=\"font-weight: 400;\">cybersecurity solutions<\/span> <\/a><span style=\"font-weight: 400;\">from Enthec and take the first step towards a more conscious and present-adapted security.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we talk about cyberattacks, we used to think almost exclusively of viruses, data theft, or system outages, but today [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[33,34],"class_list":["post-4540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-risks","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 AI and cognitive warfare: Evolution of digital attacks | Enthec<\/title>\n<meta name=\"description\" content=\"Cognitive warfare no longer attacks systems, but decisions and trust \u2b50 Discover how AI is changing the cybersecurity landscape\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 AI and cognitive warfare: Evolution of digital attacks | Enthec\" \/>\n<meta property=\"og:description\" content=\"Cognitive warfare no longer attacks systems, but decisions and trust \u2b50 Discover how AI is changing the cybersecurity landscape\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-06T06:36:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"AI in cognitive warfare: how are cyberattacks evolving?\",\"datePublished\":\"2026-02-06T06:36:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\"},\"wordCount\":1045,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg\",\"keywords\":[\"Risks\",\"AI\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\",\"url\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\",\"name\":\"\u25b7 AI and cognitive warfare: Evolution of digital attacks | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg\",\"datePublished\":\"2026-02-06T06:36:57+00:00\",\"description\":\"Cognitive warfare no longer attacks systems, but decisions and trust \u2b50 Discover how AI is changing the cybersecurity landscape\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg\",\"width\":2560,\"height\":1435,\"caption\":\"Guerra cognitiva e IA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI in cognitive warfare: how are cyberattacks evolving?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 AI and cognitive warfare: Evolution of digital attacks | Enthec","description":"Cognitive warfare no longer attacks systems, but decisions and trust \u2b50 Discover how AI is changing the cybersecurity landscape","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 AI and cognitive warfare: Evolution of digital attacks | Enthec","og_description":"Cognitive warfare no longer attacks systems, but decisions and trust \u2b50 Discover how AI is changing the cybersecurity landscape","og_url":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2026-02-06T06:36:57+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"AI in cognitive warfare: how are cyberattacks evolving?","datePublished":"2026-02-06T06:36:57+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/"},"wordCount":1045,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg","keywords":["Risks","AI"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/","url":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/","name":"\u25b7 AI and cognitive warfare: Evolution of digital attacks | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg","datePublished":"2026-02-06T06:36:57+00:00","description":"Cognitive warfare no longer attacks systems, but decisions and trust \u2b50 Discover how AI is changing the cybersecurity landscape","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/02\/guerra-cognitiva-ia-scaled.jpg","width":2560,"height":1435,"caption":"Guerra cognitiva e IA"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/ai-in-cognitive-warfare-how-are-cyberattacks-evolving\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"AI in cognitive warfare: how are cyberattacks evolving?"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=4540"}],"version-history":[{"count":1,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4540\/revisions"}],"predecessor-version":[{"id":4544,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4540\/revisions\/4544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/4537"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=4540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=4540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=4540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}