Close Menu
Breaking News in Technology & Business – Tech Geekwire

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Hackers Increasingly Using AI in Attacks, Defenders Urged to Follow Suit

    May 8, 2025

    Defence-tech Startup Zebu Raises $1M in Pre-Series A Funding Round

    May 8, 2025

    Microsoft Launches New ‘Open’ AI Models Competitive with OpenAI’s o3-mini

    May 8, 2025
    Facebook X (Twitter) Instagram
    Breaking News in Technology & Business – Tech GeekwireBreaking News in Technology & Business – Tech Geekwire
    • New
      • Amazon
      • Digital Health Technology
      • Microsoft
      • Startup
    • AI
    • Corporation
    • Crypto
    • Event
    Facebook X (Twitter) Instagram
    Breaking News in Technology & Business – Tech Geekwire
    Home » Hackers Increasingly Using AI in Attacks, Defenders Urged to Follow Suit
    AI

    Hackers Increasingly Using AI in Attacks, Defenders Urged to Follow Suit

    techgeekwireBy techgeekwireMay 8, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    Cybersecurity Experts Warn of Growing AI Threat in Cyber Attacks

    A recent report from Check Point Software Technologies highlights the increasing use of artificial intelligence (AI) in cyber attacks and urges defenders to adopt similar technologies to counter these threats. The company’s AI security report, presented at the 2025 RSAC Conference in San Francisco, reveals concerning trends in AI usage that businesses need to address.

    The report found that one in 13 generative AI prompts contained potentially sensitive information, while one in every 80 prompts posed a ‘high risk of sensitive data leakage.’ These statistics underscore the growing risks associated with AI adoption in enterprises. Topping the list of AI risks are unauthorized AI tools, data loss, and AI platform vulnerabilities.

    Check Point’s research serves as both a roadmap for businesses looking to develop AI tools and a warning for companies that are hesitant to adopt AI. The report emphasizes that whether AI tools are authorized or unauthorized, they can expose corporate secrets, user data, and other sensitive information. Unauthorized AI software can lead to security vulnerabilities, compliance issues, and inconsistent data management, potentially resulting in operational risk or data breaches.

    Regarding data loss, the report advises businesses to ‘assess AI applications for data protection and industry best practices’ before implementation. Some AI applications store data, share it with third parties, or fail to protect it from hackers, making this assessment crucial.

    The report also provides insights into hackers’ use of AI. Currently, ChatGPT and OpenAI’s API are the most popular models among cybercriminals, although other models like Google Gemini, Microsoft Copilot, and Anthropic Claude are gaining traction. The rise of open-source models and bespoke hacking-focused AI programs represents a significant development in the cybercrime ecosystem.

    Check Point’s researchers conclude that defenders must begin incorporating AI into their defensive strategies to counter the growing threat of offensive AI. ‘The use of AI in cyber crime is no longer theoretical,’ they wrote. ‘It’s evolving in parallel with mainstream AI adoption, and in many cases, it’s moving faster than traditional security controls can adapt.’

    As the cybersecurity landscape continues to evolve, businesses must be aware of the risks and benefits associated with AI adoption. By understanding these factors and implementing appropriate security measures, companies can better protect themselves against the growing threat of AI-powered cyber attacks.

    AI in cyber attacks Check Point Software Technologies cybersecurity RSAC Conference
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techgeekwire
    • Website

    Related Posts

    Defence-tech Startup Zebu Raises $1M in Pre-Series A Funding Round

    May 8, 2025

    Microsoft Launches New ‘Open’ AI Models Competitive with OpenAI’s o3-mini

    May 8, 2025

    Reichman University Students to Represent Israel in L’Oréal’s International Innovation Competition

    May 8, 2025

    Gödel’s Theorem and AI Limits: Exploring the Boundaries of Machine Logic

    May 8, 2025

    Navigating Health Technology: Finding Balance in a Data-Driven World

    May 8, 2025

    Amazon Summer Sale 2025: Grab Up to 65% Off on Samsung TVs Before It Ends Tonight

    May 8, 2025
    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Hackers Increasingly Using AI in Attacks, Defenders Urged to Follow Suit

    May 8, 2025

    Defence-tech Startup Zebu Raises $1M in Pre-Series A Funding Round

    May 8, 2025

    Microsoft Launches New ‘Open’ AI Models Competitive with OpenAI’s o3-mini

    May 8, 2025

    Reichman University Students to Represent Israel in L’Oréal’s International Innovation Competition

    May 8, 2025
    Advertisement
    Demo
    About Us
    About Us

    A rich source of news about the latest technologies in the world. Compiled in the most detailed and accurate manner in the fastest way globally. Please follow us to receive the earliest notification

    We're accepting new partnerships right now.

    Email Us: info@example.com
    Contact: +1-320-0123-451

    Our Picks

    Hackers Increasingly Using AI in Attacks, Defenders Urged to Follow Suit

    May 8, 2025

    Defence-tech Startup Zebu Raises $1M in Pre-Series A Funding Round

    May 8, 2025

    Microsoft Launches New ‘Open’ AI Models Competitive with OpenAI’s o3-mini

    May 8, 2025
    Categories
    • AI (1,933)
    • Amazon (786)
    • Corporation (729)
    • Crypto (863)
    • Digital Health Technology (772)
    • Event (408)
    • Microsoft (935)
    • New (6,938)
    • Startup (812)
    © 2025 TechGeekWire. Designed by TechGeekWire.
    • Home

    Type above and press Enter to search. Press Esc to cancel.