The release of Brute Force AI, a free tool that utilises artificial intelligence to accelerate password-cracking attempts, underscores how AI is lowering the barrier for cyberattacks, according to Takanori Nishiyama, SVP, APAC and Japan country manager, Keeper Security.

"Techniques that once required significant time and expertise can now be automated and scaled, enabling adversaries to launch credential stuffing and password spraying attacks at unprecedented speed," he said.
The Keeper Security executive added that these risks are particularly acute in the Asia-Pacific (APAC) region. The majority of the region's economy is comprised of small and medium-sized businesses (SMBs), which are particularly vulnerable to the impact of AI-powered cyber threats. Many of these SMBs lack the enterprise-grade security resources necessary to defend against automated attacks. As AI accelerates the pace of credential-based attacks, traditional perimeter defences and outdated password practices are quickly outmatched.
Privileged Access Management
Nishiyama emphasises the growing need for Privileged Access Management (PAM), a cybersecurity solution based on zero-trust and zero-knowledge principles. PAM enforces 'least privilege access', a concept that centralises credential storage and monitors privileged accounts, ensuring that users have only the necessary permissions to perform their tasks. This adds safeguards against brute force tools.
He added that such controls can prevent unauthorised access and deliver real-time visibility to detect and respond to anomalies before they escalate.
The emergence of Brute-force AI highlights the need for many organisations to replace legacy approaches with modern cyber hygiene. Actionable steps include eliminating shared or hard-coded credentials, implementing multi-factor authentication, and adopting PAM to tightly control privileged access. Together, these measures strengthen resilience against AI-driven brute force campaigns, protecting sensitive data and preserving trust,"Nishiyama said.