Generative Artificial Intelligence (Generative AI) is redefining the cybersecurity landscape in ways that go far beyond the purely technical. Its impact extends to the strategic level, affecting the digital and geopolitical sovereignty of companies and governments worldwide. What until recently seemed like science fiction machines capable of creating, adapting, and executing attacks autonomously is now an operational reality.
Malicious actors are already leveraging these technologies to launch sophisticated cyberattacks, manipulate information at scale, and generate harmful code tailored to specific targets. This evolving landscape presents unprecedented challenges, particularly in the protection of critical infrastructure and telecommunications networks, where reliability, control, and resilience are not optional, but strategic imperatives.

Generative AI as an attack actor
From tool to autonomous actor: the evolution of the threat
For years, cybersecurity has dealt with tools created and operated by humans. Attackers would design Ā malware, deploy it, and wait for results. Generative AI fundamentally changes this model: systems can now analyze their environment, adapt their behavior, and carry out continuous, autonomous attacks without direct human intervention. We are facing a qualitative shift, not just a quantitative one.
In the telecommunications sector, this is driving new types of threats: real-time data traffic manipulation, adaptive attacks that evolve to evade existing detection systems, and disinformation campaigns generated and distributed automatically. Large-scale language models can also be used to impersonate identities with a level of sophistication that renders traditional signature-based controls and predefined patterns ineffective. AIās ability to learn and adapt turns each attack into a dynamic threat, capable of evolving faster than defensive systems can respond.
This evolution calls for a fundamental rethinking of security architecture. Traditional reactive approaches: detect, contain, and remediate, are no longer sufficient when attackers can execute, analyze, and adapt their strategies in milliseconds. The industry must shift toward a proactive model, where anticipation and continuous adaptation are at the core of defense.
Key threats in telecommunications and supply chains
Telecommunications networks are a high-value target because they form the backbone of the digital economy. A successful attack on these networks not only puts data at risk, but it can also disrupt critical services, impact supply chains, and erode trust in systems that underpin modern life. Generative AI further amplifies these risks.
One of the most concerning attack vectors is the digital supply chain. Generative models can be used to infiltrate the software development processes of trusted providers, introducing subtle vulnerabilities that remain undetected until they are triggered under specific conditions. At the same time, automatically generated, highly personalized phishing built from the analysis of prior communications, public profiles, and organizational behavior, significantly increases the success rate of social engineering attacks.
From a geopolitical perspective, the ability to manipulate data traffic and generate synthetic content at scale introduces risks that go far beyond technical concerns. Digital sovereignty whether for nations or organizations increasingly depends on the ability to control, verify, and protect information flows. Amid intensifying strategic competition, telecommunications infrastructure has become a critical domain in the Ā global geopolitical landscape.
Defending against AI-driven threats: advanced monitoring, segmentation, and anomaly detection
Facing an AI-driven adversary requires a defense that is equally intelligent and adaptive. Traditional approaches based on static rules and known signatures remain Ā necessary, but are no longer sufficient. To keep pace with the speed and sophistication of modern attacks, organizations must combine advanced network monitoring, secure segmentation, and real-time anomaly detection systems capable of identifying unusual behavior before it escalates into an incident. It is also essential that these systems are seamlessly integrated with generative AI models, enabling higher levels of automation and faster, more effective responses to emerging threats.
Continuous network traffic monitoring, enhanced by AI-driven defense, enables the detection of anomalous patterns that would remain invisible to analysts using traditional methods. Network segmentation, dividing infrastructure into isolated zones with strict access controls, reduces the blast radius of a successful attack, preventing a single breach from escalating into a systemic failure. These technical measures must be supported by adaptable cybersecurity policies, including regulatory frameworks and response protocols that evolve at the same pace as emerging threats.
Training and awareness among human teams remain a key pillar. While AI can automate many defensive tasks, human oversight, contextual judgement, and the ability to make strategic decisions under uncertainty remain irreplaceable. Ultimately, Ā the synergy between human intelligence and artificial intelligence is the true differentiator in building resilient organizations in this evolving threat landscape.
Conclusion: Generative AI as an attack vector
Generative AI is not only a driver of innovation. It is also an attack vector that is reshaping the scope and nature of cyber threats. For organizations managing telecommunications infrastructure, ignoring this reality is no longer an option.
Adapting to this new landscape requires investment in advanced defense technologies, the development of agile cybersecurity policies, and the cultivation of teams capable of operating in an environment where conditions are constantly evolving. The resilience of communications networks will be a decisive factor. Not only for ensuring operational security, but also for safeguarding digital sovereignty in an increasingly complex geopolitical landscape.
At Teldat, we are adapting and integrating our software and hardware portfolio with advanced monitoring, management, and security systems, fully aligned with generative AI capabilities. This approach enables us to deliver a new layer of protection and visibility across our solutions, while incorporating next-generation technologies to lead innovation in cybersecurity throughout 2026 and beyond.











