1. At the BASIC level, State sponsored or street gang hackers uses computer programs to HACK into another or many others' computers, thru vulnerabilities in one's host operating systems. With AI and advanced chip tech on hand, it had made hackers job easier, as such programs along with advanced chips will be able to CRUNCH the numbers in short time to enter into another's computer, and once in, the rest is history....
2. Bear in mind too, that providers of operating systems as well as National security system officers are not sleeping, but CONSTANTLY searching for vulnerabilities every moment of the day, for the providers - trust and profit, for the National security online gateways, their namesake is what it says...
3. No matter how highly touted AI is, or the yet to come Quantum processor AI are, they are NOT lifeforms. For us Humans, our perceptions of realities are based upon what we see, hear, touch, taste and smell.
To AI, everything that is reality to us Humans are MERE BINARY digits defined by digitalized programming. However, GENERATIVE AI ENTITY finally knows such, and thus, it NEEDS Human to do the PHYSICAL work for them - to enter highly secured online or intranet systems.
Such is done thru just 2 items:-
a) a USB thumb-drive inserted into a computer, which the AI in the thumb-drive will AUTO install and change every software programed security measures in the comp, and
b) a mere penny sized USB WI-FI or a Bluetooth adapter, that while has limited range, but a spy just at a cafe within 5-15metres sipping Latte with a laptop will be able to see or download whatever information he/she needs.
And such can be done by ANYONE - from the CEO who had been conned into inserting the thumb-drive for other reasons than the main one that hackers hide, or by the night security officers/cleaners....
Thus. rather than live in fear, there are COUNTER-MEASURES that can be taken, which most likely had been taken than what the mere insignificant nobody me can think of:-
i) Rather than to go on an unproductive man hours personal seach witch-hunt, instead make use of AI - create an AI program that would find out ANY intrusion or even authorized usage, into any computer within the network, to log and notify admin. And such programs if properly created, can run 24/7, by the seconds....
ii) install anti wi-fi or bluetooth jammers in installations, as a backup measure should any stone be unturned in procedural security checks.
iii) within the cyberspace battle - 'honeypots' can be laid......that's as much as I will say, which is too much already.....
.