AI-powered cybersecurity tools are reshaping how security teams find and fix vulnerabilities — but the same capabilities are being weaponized by attackers to automate phishing, clone voices, and generate working exploits in under two hours. Here's what's actually happening, what the evidence shows,