{"id":22251,"date":"2024-12-09T16:05:53","date_gmt":"2024-12-09T16:05:53","guid":{"rendered":"https:\/\/interface.media\/?p=22251"},"modified":"2024-12-09T16:07:14","modified_gmt":"2024-12-09T16:07:14","slug":"ais-impact-on-the-cyber-threat-landscape-trends-and-challenges","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/","title":{"rendered":"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025"},"content":{"rendered":"\n<p>According to the European Union Agency for Cybersecurity\u2019s (ENISA) recently updated<a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-foresight-cybersecurity-threats-for-2030\"> Foresight Cybersecurity Threats<\/a> report, AI will continue redefining cybersecurity until 2030.<\/p>\n\n\n\n<p>Although AI has already significantly <a href=\"https:\/\/interface.media\/blog\/2024\/11\/26\/cybersecurity-in-the-age-of-ai-navigating-the-new-landscape\/\">reshaped the cyber threat landscape<\/a>, particularly with the widespread use of GenAI, it is likely to increase the volume and heighten the impact of cyber-attacks by 2025. This is a clear indication that the use cases we&#8217;ve seen so far are just the beginning. The true challenge lies in the untapped potential of AI, and the long-term risks it poses.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-direction-ai-leads-in-cyber-threat-landscape\"><strong><em>The direction AI leads in cyber threat landscape<\/em><\/strong><\/h3>\n\n\n\n<p>The increased use of AI has led to a surge in more sophisticated cyber-attacks, from data poisoning to deep fakes. Among these, phishing campaigns and deep fakes stand out as the two main avenues where AI tools are effectively employed to orchestrate highly targeted, <a href=\"https:\/\/interface.media\/blog\/2024\/12\/02\/gamifying-cybersecurity-in-a-rapidly-evolving-threat-landscape\/\">near-perfect cyber-attack campaigns<\/a>.<\/p>\n\n\n\n<p>Gen AI-driven deep fake technology in particular has become a standard tool for threat actors, enabling them to impersonate C-level executives and manipulate others into taking specific actions. While impersonation is not a new tactic, AI tools allow threat actors to craft sophisticated and targeted attacks at speed and scale.<\/p>\n\n\n\n<p>For example, large language models (LLMs) enable threat actors to generate human-like texts that appear genuine and coherent, eliminating grammar as a red flag for such attacks. Beyond this, LLMs take it a step further by hyper-personalising attacks to exploit specific characteristics and routines of particular targets or create individualised attacks for each recipient in larger groups.<\/p>\n\n\n\n<p>However, AI&#8217;s impact is not only on the sophistication of attacks but also on the alarming increase in the number of threat actors. The user-friendly nature of Gen AI technology, along with publicly available and easily accessible tools, is lowering the barrier of entry to novice cybercriminals. This means that even less skilled attackers can exploit AI to release sensitive information and run malicious code for financial gain.<\/p>\n\n\n\n<p>AI also plays an essential role in the increasing speed of cyber-attacks. Trained AI models and automated systems can analyse and exfiltrate data faster and more efficiently and perform intelligent actions. Creating ten million personalised emails takes a matter of seconds with these tools. They can quickly scan an organisational network, try several alternative paths in split seconds to find a network vulnerability to attack. Once this happens, they automatically attempt to get a foothold into systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-utilising-ai-in-blue-teams\"><strong><em>Utilising AI in blue teams<\/em><\/strong><\/h3>\n\n\n\n<p>Although threat actors will continue to use AI to evolve their tactics and increase the risks and threats, AI is also widely used to arm organisations against these cyber threats and prepare against dynamic attacks.<\/p>\n\n\n\n<p>Consider this in terms of red and blue teams for organisational defence. The red team, armed with AI tools, can launch more effective attacks. However, the same tools are equally available to the blue team. This raises the question of how blue teams can also effectively deploy AI to safeguard organisations and systems.<\/p>\n\n\n\n<p>There are many ways for organisations to utilise AI tools to strengthen their cyber defence. These tools can analyse vast amounts of data in real time, identify potential threats, and mitigate risks more efficiently than traditional methods. AI can also be used in model training, replicating the most advanced AI applications and simulating specific scenarios.<\/p>\n\n\n\n<p>Incorporation of AI into cyber exercises to create attack environments allows organisations to detect weak and vulnerable spots that the most advanced AI application could exploit, and also use AI tools to solve real-world cases.<\/p>\n\n\n\n<p>This means organisations can have a deeper, more comprehensive insight into cybersecurity preparedness and how to arm systems against potential AI powered attacks. It is critical to keep training and exercises up to date with the latest threats and technologies to prepare organisations for AI-powered threats.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-the-best-defense\">The best defense&#8230; <\/h4>\n\n\n\n<p>However, cybersecurity teams cannot adress the risks posed by AI solely from a defensive perspective. The biggest challenge here is speed and planning for the next big AI-powered attack potential. Organisations should work with the utmost dedication and stay ahead of cyber security trends to create proactive defence strategies.<\/p>\n\n\n\n<p>External security operations center (SOC) services and working with specialised consultants is essential for organisations to be able to move as fast as threat actors and aim to be a step ahead &#8211; this is the only way to provide a sense of security in the face of ever-evolving AI threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ai-as-a-threat-to-the-whole-organisation\"><strong><em>AI as a threat to the whole organisation<\/em><\/strong><\/h3>\n\n\n\n<p>AI integration in organisations\u2019 systems is also not without risks. While AI is reshaping the cyber landscape in the hands of threat actors, enterprises are also facing accidental insider threats. AI systems integrations are leading companies to new vulnerabilities, which are well-known internal AI threats in cybersecurity.<\/p>\n\n\n\n<p>Employees using Gen AI tools are accessing more organisational data than ever before. Even in the hands of the most well-intended employees, if they are not cyber-trained, AI tools could lead to unintentional leaks or misplaced access to restricted, sensitive data.<\/p>\n\n\n\n<p>As in every cyber-attack scenario, tackling AI-powered threats is not possible without creating an organisation-wide cyber awareness and resilience culture. Training all employees on using AI tools and the potential risks they pose to an organisation\u2019s systems and integrating AI into daily security operations are the first steps for creating a culture of cyber resilience against AI-powered attacks.<\/p>\n\n\n\n<p>Developing organisational cyber awareness from every responsibility level is critical to avoiding emerging vulnerabilities and evolving AI threats. It not only helps mitigate the risks of employees accidentally misusing AI tools, but also helps build strong organisational cyber awareness and the proactive development of robust security measures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cybersecurity.<\/p>\n","protected":false},"author":480,"featured_media":22252,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-12-09T16:05:59Z","apple_news_api_id":"89a79ab0-f24d-4a72-919c-90334eadce0f","apple_news_api_modified_at":"2024-12-09T16:07:13Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAQ==","apple_news_api_share_url":"https:\/\/apple.news\/AiaeasPJNSnKRnJAzTq3ODw","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613],"class_list":["post-22251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025 - Interface<\/title>\n<meta name=\"description\" content=\"Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cyber security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025\" \/>\n<meta property=\"og:description\" content=\"Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cyber security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-09T16:05:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T16:07:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1432\" \/>\n\t<meta property=\"og:image:height\" content=\"732\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/\",\"name\":\"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025 - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg\",\"datePublished\":\"2024-12-09T16:05:53+00:00\",\"dateModified\":\"2024-12-09T16:07:14+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cyber security\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg\",\"width\":1432,\"height\":732,\"caption\":\"4K Beautiful color gradient background with noise. Abstract pastel holographic blurred grainy gradient banner background texture Colorful digital grain soft noise effect Nostalgia, vintage, retro\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025 - Interface","description":"Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cyber security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025","og_description":"Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cyber security","og_url":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/","og_site_name":"Interface","article_published_time":"2024-12-09T16:05:53+00:00","article_modified_time":"2024-12-09T16:07:14+00:00","og_image":[{"width":1432,"height":732,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/","url":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/","name":"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025 - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg","datePublished":"2024-12-09T16:05:53+00:00","dateModified":"2024-12-09T16:07:14+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"Sten Feldman, Head of Software Development at CybExer Technologies, explores the evolving impact of the AI boom on cyber security","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/12\/iStock-2055023866.jpg","width":1432,"height":732,"caption":"4K Beautiful color gradient background with noise. Abstract pastel holographic blurred grainy gradient banner background texture Colorful digital grain soft noise effect Nostalgia, vintage, retro"},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/12\/09\/ais-impact-on-the-cyber-threat-landscape-trends-and-challenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"AI\u2019s impact on the cyber threat landscape: Trends and challenges in 2025"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/22251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=22251"}],"version-history":[{"count":4,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/22251\/revisions"}],"predecessor-version":[{"id":22256,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/22251\/revisions\/22256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/22252"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=22251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=22251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=22251"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=22251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}