Breaking
February 22, 2025

Sounding the alarm on AI-powered cybersecurity threats in 2025 | usagoldmines.com

The cost of data breaches is at an all-time high. According to IBM, the global average cost of a security breach currently sits at a staggering $4.9 million, spiking by 10% in 2024. These numbers are only expected to worsen, with USAID forecasting that cybercrime will cost the global economy $24 trillion by 2027.

This upward trajectory is driven in part by the emergence of a new threat: AI-powered malware. While AI has become an integral tool for business workflows and innovation, this technology has also proven particularly beneficial for malicious actors, allowing them to develop more stealthy and sophisticated tactics than ever before. In a world where everything is increasingly connected, it’s critical for businesses to anticipate the incoming wave of new threats and develop surefire strategies to not only mitigate incidents but stop them in their tracks.

AI’s double-edged sword: today’s threat landscape

In recent years, the world witnessed incredible advancements in the power of AI. While AI has helped strengthen cyber resilience, with technologies like automated phishing detection and predictive analysis, it has also become a severe threat to business networks. Stepping up from traditional malware that relies on static attack patterns, AI-powered malware is capable of adapting, evading, and learning, constantly evaluating ways to overcome obstacles and successfully inject itself into protected systems. Building on the knowledge from failed attempts to develop new attack strategies, the ever-changing nature of these threats makes detection increasingly difficult, and in turn, weakens defense mechanisms.

BlackMatter ransomware is an infamous yet prime example of how AI has dramatically changed the cyber threat landscape. As an evolution of DarkSide, BlackMatter has quickly become one of the most formidable ransomware threats, bringing a new level of sophistication to the space. Its AI algorithms are built to refine encryption strategies and analyze victims’ defenses in real time, allowing it to circumvent endpoint detection and response (EDR) tools that would typically neutralize ransomware threats. This evasion tactic ultimately renders conventional defences ineffective.

This dangerous shift in gear poses significant challenges to cybersecurity defenses. To effectively protect against these threats, businesses must first assess the biggest threats that lie ahead.

Autonomous attacks

With self-directed learning for real-time evasion, AI-powered malware can essentially ‘think for itself’, independently altering its behavior to bypass existing cybersecurity measures. In other words, no human input necessary. This leads to more frequent attempts in a shortened time frame, making it harder for defenders to counter new attack vectors, and increasing the likelihood of a successful breach.

Furthermore, AI-enhanced malware can spread across networks or systems without instruction. Once it’s infiltrated one machine, the malware self-propagates and infects other connected systems and devices within minutes.

Intelligent attack methods

AI-powered malware can also carry out more destructive ransomware attacks by identifying the most valuable files and systems to target. Instead of simply encrypting, AI algorithms can identify critical databases, financial records, or intellectual property to maximize disruption and increase the likelihood of a ransom payment.

Moreover, AI-powered malware can apply machine learning to mimic the behaviors of manual systems, making it more difficult for traditional intrusion detection systems to identify. It can even avoid detection by only executing malicious actions during off-peak periods.

Sophisticated targeting

AI can also be used to conduct highly targeted attacks by analyzing large amounts of data, such as social media profiles or network behaviors. This facilitates the weaponization of social engineering tactics, generating personalized phishing emails, which are harder to detect. For instance, an AI-powered phishing email might reference a known contact, a recent purchase, or even mimic the writing style of a trusted colleague. This level of personalization makes it much easier coerce individuals into clicking on malicious links, downloading infected attachments, or revealing sensitive information.

Combatting suspicious activity

Attackers aren’t the only ones that can apply AI to their cyber strategy. In fact, it’s important that defenders follow suit and employ AI-based threat intelligence solutions for effective mitigation. According to IBM, organizations that used AI and automation extensively in attack prevention averaged $2.2 million in cost savings than those that didn’t.

How can AI be implemented? This could manifest in AI-powered anomaly detection software, with continuous monitoring and behavior analysis to flag real-time threats, such as unusually high levels of entropy in software code.

Physical network segmentation

While software-based security measures are a key element of any cybersecurity strategy, data and systems remain vulnerable to AI-powered attacks that exploit vulnerabilities. The constantly self-developing nature of these threats calls for a different approach, which has led to a renewed focus on physical segmentation and isolation as a means of protecting networks.

Moving away from the ‘always on’, interconnected model of today’s systems, physical network segmentation is the practice of isolating different parts of a network using physical hardware, such as routers and switches, enabling organizations to establish secure zones with restricted access to critical systems and data.

In prevention, physically disconnecting digital assets from the internet when they’re not in use will significantly reduce the attack surface and provide a much higher level of protection for sensitive data and systems. This is particularly crucial for critical infrastructure, operational technology, and sensitive research data, which may not require constant internet connectivity.

In crisis, if one segment is compromised, the damage is contained within its isolated network, preventing the rapid spread of malware and cutting off connection before the problem worsens. This segmentation technique acts as a powerful defense-in-depth strategy that makes it notably harder for cyber threats to traverse the entire network and target sensitive areas.

Cyber resilience is in your hands

AI-powered malware presents a myriad of dynamic and unpredictable cyber threats. With its enhanced ability to learn, adapt, and autonomously exploit weaknesses, attackers can use AI to execute more sophisticated, evasive, and damaging attacks. Traditional cybersecurity measures are often ill-equipped to handle these advanced threats.

To truly combat cyber threats, there’s a need for a more tangible solution. By isolating different data sets and physically disconnecting from networks, businesses can rest assured they are optimizing their cyber resilience and mitigating the impact of successful attacks.

We’ve featured the best firewall software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

I used NoteBookLM to help with productivity - here’s 5 top tips to get the most from Google’s AI aud...

Best wireless keyboards 2025: Top Bluetooth and USB models | usagoldmines.com

OpenAI confirms 400 million weekly ChatGPT users - here's 5 great ways to use the world’s most popul...

California Nominates Steve Jobs for $1 American Innovation Coin Juli Clover | usagoldmines.com

German startup to attempt the first orbital launch from Western Europe Stephen Clark | usagoldmines....

Android 16’s Live Update Notifications Look Awesome Tim | usagoldmines.com

Here's a Look at Apple's Secret Modem Testing Lab Where C1 Was Developed Juli Clover | usagoldmines....

DEAL: Galaxy S25 Ultra for $399, Get Galaxy Buds 3 Pro for $10 ($1260 Off) Tim | usagoldmines.com

How Apple Watch, Fitbit, Garmin, Oura, and Whoop Compare on Measuring HRV Beth Skwarecki | usagoldmi...

Here's How Four Major Newsrooms Are Using AI Michelle Ehrhardt | usagoldmines.com

Researchers figure out how to get fresh lithium into batteries John Timmer | usagoldmines.com

Leaked chat logs expose inner workings of secretive ransomware group Dan Goodin | usagoldmines.com

Under new bill, Bigfoot could become California’s “official cryptid” Nate Anderson | usagoldmines.co...

Texas measles outbreak may have spread to New Mexico; total cases near 100 Beth Mole | usagoldmines....

Windows tests long-awaited changes to Start, Share, and Search | usagoldmines.com

I Make This Easy and Elegant 'King Cake' to Impress My Guests Allie Chanthorn Reinmann | usagoldmine...

Everything New in iOS 18.4 Beta 1 Juli Clover | usagoldmines.com

Lenovo is going all out with yet another funky laptop design: this time, it's a business notebook wi...

“Bouncing” winds damaged Houston skyscrapers in 2024 Jennifer Ouellette | usagoldmines.com

Asus’ new “Fragrance Mouse” is a wireless mouse that also smells Andrew Cunningham | usagoldmines.co...

Dangling, twitching human robot with synthetic muscles makes its debut Benj Edwards | usagoldmines.c...

Unblockable ads now litter Microsoft’s Windows Surface app | usagoldmines.com

Best gaming laptops 2025: What to look for and highest-rated models | usagoldmines.com

'Fix Me a Plate' Is the Cookbook You Need for Hearty Meals Allie Chanthorn Reinmann | usagoldmines.c...

Download Your Kindle Books While You Still Can Emily Long | usagoldmines.com

I installed iOS 18.4 dev beta and the big Siri intelligence update is nowhere to be found lance.ulan...

F1 may ditch hybrids for V10s and sustainable fuels Jonathan M. Gitlin | usagoldmines.com

Elon Musk to “fix” Community Notes after they contradict Trump Ashley Belanger | usagoldmines.com

Microsoft’s new Majorana 1 chip is a quantum computing breakthrough | usagoldmines.com

4 things to expect at Amazon’s AI Alexa event | usagoldmines.com

Nine Tricks That Make Painting Any Room a Lot Easier Jeff Somers | usagoldmines.com

The Echo Show 15 Is $100 Off Right Now Daniel Oropeza | usagoldmines.com

Apple News+ Gains Recipes, Restaurant Reviews, and More in iOS 18.4 Juli Clover | usagoldmines.com

iOS 18.4 Adds New Ambient Music Feature Juli Clover | usagoldmines.com

Revamped Mail App With Built-In Categorization Comes to Mac and iPad Juli Clover | usagoldmines.com

iOS 18.4 Adds Apple Intelligence Priority Notifications Feature Juli Clover | usagoldmines.com

This is the weirdest laptop I've ever seen and it reminds me of an often-mocked, thoroughly misunder...

Amazon just overtook Walmart in revenue for the first time | usagoldmines.com

As the Kernel Turns: Rust in Linux saga reaches the “Linus in all-caps” phase Kevin Purdy | usagoldm...

RFK Jr. promptly cancels vaccine advisory meeting, pulls flu shot campaign Beth Mole | usagoldmines....

New Dockcase 7-in-1 Hub is Latest Favorite Accessory, Available on Kickstarter Tim | usagoldmines.co...

I Tested Grok 3, and It's Not Worth the Price Hike Khamosh Pathak | usagoldmines.com

The Six Best Methods for Paying Off Credit Card Debt Meredith Dietz | usagoldmines.com

Best Apple Deals of the Week: Big Apple Watch Series 10 Discounts Hit Alongside AirPods and More Mit...

Apple Seeds First Betas of tvOS 18.4 and watchOS 11.4 Juli Clover | usagoldmines.com

Apple Seeds First Beta of macOS Sequoia 15.4 Juli Clover | usagoldmines.com

Apple Releases First visionOS 2.4 Beta With Apple Intelligence, Spatial Gallery and More Juli Clover...

Apple Releases First Beta of iOS 18.4 With New Vision Pro App Juli Clover | usagoldmines.com

Meze Audio's beautiful new wired headphones have a new kind of planar magnetic driver, hand-finished...

Top US mineral firm hit by cyberattack that saw thieves steal $500,000 | usagoldmines.com

"We will never build a backdoor" – Apple kills its iCloud's end-to-end encryption feature in the UK ...

Google has stopped selling the Chromecast with Google TV – but there's no way I'm replacing mine | ...

Security flaw in popular stalkerware apps is exposing phone data of millions | usagoldmines.com

The Oppo Find N5 has made me even more excited for the Samsung Galaxy S25 Edge – here’s why jamie.ri...

Apple Intelligence finally arrives on Vision Pro, but it's the new iOS app that might turn heads lan...

Google’s cheaper YouTube Premium Lite subscription will drop Music Ryan Whitwam | usagoldmines.com

Notorious crooks broke into a company network in 48 minutes. Here’s how. Dan Goodin | usagoldmines.c...

Samsung’s tiny 128GB flash drive is a steal at this deal price: $14 | usagoldmines.com

This 34-inch Gigabyte ultrawide OLED gaming monitor is 39% off | usagoldmines.com

Here’s the Nothing Phone 3a and 3a Pro Tim | usagoldmines.com

This Blink Video Doorbell Is at Its Lowest Price Ever Pradershika Sharma | usagoldmines.com

My Favorite Amazon Deal of the Day: The Samsung Galaxy Watch Ultra Daniel Oropeza | usagoldmines.com

The MacRumors Show: iPhone 16e Announced! Hartley Charlton | usagoldmines.com

An Apple Store is on the Move in the UK Joe Rossignol | usagoldmines.com

iPhone 16e Continues Apple's Transition to Manufacturing in India Hartley Charlton | usagoldmines.co...

Apple pulls end-to-end encryption in UK, spurning backdoors for gov’t spying Ashley Belanger | usago...

DeepSeek goes beyond “open weights” AI with plans for source code release Kyle Orland | usagoldmines...

LG UltraGear 27GX790A-B review: A monitor for competitive gamers | usagoldmines.com

A cheaper YouTube Premium plan is coming ‘soon’ for users in the US | usagoldmines.com

Lenovo laptops get an F rating for repairability | usagoldmines.com

GTA V for PC will get ray tracing and more with big visual update in March | usagoldmines.com

Make sure you update your AM5 motherboard for the Ryzen 9 9950X3D | usagoldmines.com

Turn Off Uber's Preferred Currency Feature to Avoid a Fee Emily Long | usagoldmines.com

Google's 'Career Dreamer' Claims It Can Help You Find a Job to Match Your Skills David Nield | usago...

Apple Denies Speculation Surrounding iPhone 16e's Lack of MagSafe Joe Rossignol | usagoldmines.com

Is the Apple Watch SE next for the chop? The surprise iPhone 16e reveal could hint at more changes t...

Salt Typhoon hackers used this clever technique to attack US networks | usagoldmines.com

An episode of The Simpsons? Fake speakers found in Chinese Volvos. Jonathan M. Gitlin | usagoldmines...

HP realizes that mandatory 15-minute support call wait times isn’t good support Scharon Harding | us...

SEC’s “scorched-earth” lawsuit against Coinbase to be dropped, company says Ashley Belanger | usagol...

Nissan’s latest desperate gamble—see if Tesla will buy the company Jonathan M. Gitlin | usagoldmines...

The truth about PC gaming on SSDs vs. HDDs, tested with real data | usagoldmines.com

Your gaming monitor specs could be deceiving you | usagoldmines.com

This Ryzen 7 mini PC with 32GB RAM is only $299 right now | usagoldmines.com

ExpressVPN: The first 5 settings you need to change | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

Grab this fast-charging 25K power bank for 25% off while you can | usagoldmines.com

Shopping for Google’s cheapest TV streamers? Good luck with that | usagoldmines.com

Windows 11 Remote Desktop issues? You aren’t alone. Here’s what you can do | usagoldmines.com

The First Seven Things to Cut From Your Budget When You Lose Your Job Meredith Dietz | usagoldmines....

13 Body Horror Movies With Substance Ross Johnson | usagoldmines.com

Here Are The Best Carrier Deals You Can Get When Pre-Ordering iPhone 16e Today Mitchel Broussard | u...

Report: Apple's C1 Is Just the Beginning of Modem Changes Hartley Charlton | usagoldmines.com

All Four iPhone 17 Models Said to Feature Apple-Designed Wi-Fi 7 Chip Joe Rossignol | usagoldmines.c...

Apple Pulls Encrypted iCloud Security Feature in UK Amid Government Backdoor Demands Tim Hardwick | ...

US government reveals new cybercrime unit targeting AI fraud, crypto and other scams | usagoldmines...

Leaked Nothing Phone 3a and 3a Pro renders tease a mid-range phone that should have Samsung worried ...

A cheaper YouTube Premium Lite tier could roll out soon – and as a Spotify fan I'm ready to sign up ...

Microsoft fixes Power Pages security flaw, tells users to be on their guard | usagoldmines.com

Building a resilient workforce security strategy | usagoldmines.com

Leave a Reply