What are the signs of an automated A.I cybersecurity attack?