Cybersecurity Companies Utilize AI to increase Digital Security

Cybersecurity Companies
Picture of George Manson
George Manson

It has indeed become difficult for organizations to protect IT infrastructure against various cyber threats, and within this context, a new report released by Netwrix stated how organizations use AI to counter cyber threats.

According to the annual 2025 Cybersecurity Trends Report by Netwrix, which included a survey with 2150 respondents from 121 countries, more than one-third of organizations adjusted their cybersecurity strategies due to threats powered by AI.

Meanwhile, one-third stated that it introduced a whole new attack surface within their organization as a result of the use of AI in the office, whereas they are battling compliance because auditors need proof of data security and privacy in AI-enabled systems. All of this had resulted in almost two out of three organizations beginning to deploy AI in their IT infrastructure and the remaining considering doing so.

Additional New Cyber Threats Using AI

The revelations that have surfaced from the Netwrix Chief Product Officer Jeff Warren said of the company so that organizations can get prepared for a hoard of new emerging threats along with AI.

According to Warren, the data indicates an increase in security incidents, which are identity-driven and infrastructure-focused.

“In fact, identity-driven attacks with increasingly clever methods to bypass MFA, abuse of machine-to-machine identities, such as service accounts and tokens, AI-enhanced deepfake voice and video phishing, and even the creation of synthetic identities at a large scale, will most definitely have a larger share in the future.”

Dirk Schrader, VP of security research at Netwrix, pointed to yet another often unnoticed fact: an AI trained on company data creates as such intellectual property and, thus makes it enticing to cybercriminals: “It is indeed necessary to safeguard the data all through the lifecycle of the AI, starting from ingestion to model training till monitoring API endpoints for any signs of a prompt injection, abuse, or leakage of the model,” stressed Schrader.

Picture of George Manson

George Manson

George has mastered SOC analysis and is trained in countering cyber attacks. As our Cybersecurity specialist, George monitors the platforms and ensures that no vulnerabilities remain in our online portal. As an experienced cybersecurity engineer, George has taken up the mission to inform the great American audience about their digital rights and is a strong advocate for digital security.

All Posts

latest Tech

Section Title

Google Faces Legal Setback as Judge Rules Against its Ad-Tech Monopolies

In what could be the biggest upset ruling for the digital advertising industry, a U.S. judge has found that Google...

Amazon joins list of possible bidders of the app TikTok as the US ban on TikTok looms near.

President Donald Trump says he is “very close” to making a deal for the sale of TikTok, which has to...

Major Tech Giants in the US advise their employees on H1B permits to not leave US

Several US tech companies are advising employees on visas to avoid leaving the country amid concerns they may not be...

latest Ai

Section Title

Understanding the Future of AI in Business Growth

AI is a technology that gets much hype and attribution. AI is the intelligence attributed to a machine or very...

How Elon Musk AI Trading Works for Investors

Elon Musk, the tech entrepreneur and CEO of companies like Tesla and SpaceX, has been one of the most famous...

AI Without Limits? The Business Impact of Trump’s Deregulation

Industries around the world have been reshaped by the dramatic upturn in artificial intelligence (AI), triggering techno metamorphosis. In contrast...
Scroll to Top