Connect with us

Hi, what are you looking for?

AI Cybersecurity

AI-Driven Cyberattacks Surge as Organizations Face Growing Security Challenges

Palo Alto Networks reveals AI-driven cyberattacks can exfiltrate data in just 25 minutes, urging organizations to unify defenses amid escalating threats.

As the global cybersecurity landscape evolves at an unprecedented pace, Simon Green, president of Japan and Asia-Pacific region at global cybersecurity firm Palo Alto Networks, underscores the urgency for organizations to adapt. In a recent demonstration with Malaysian business leaders, Green showcased how artificial intelligence (AI) can facilitate a cyberattack, exfiltrate data, and exit a system within just 25 minutes. “In the span of a 30-minute conversation, an organization could be compromised based on the speed at which these attacks are occurring,” he noted, highlighting the alarming transformation in the speed of threats that once took months to develop.

This swift evolution presents a critical challenge for organizations aiming to safeguard their systems. With attackers increasingly relying on AI to streamline their operations, traditional defensive solutions built around legacy tools are struggling to keep pace. As Malaysia gears up to become an AI-driven economy by 2030 under its National AI Action Plan 2026–2030, experts like Green emphasize that cybersecurity must remain a central focus. Despite growing interest in AI, discussions surrounding AI in cybersecurity remain limited, not only in Malaysia but globally.

“Attitudes towards AI in cybersecurity vary,” Green said. “People who are tuned to the security risks of AI are already leaning in on cybersecurity and have realized the complicated challenges they face.” Although governments are working to establish policies to enhance cybersecurity compliance, the lengthy policy-making process means businesses cannot afford to wait. They must act now to secure their systems, even as they grapple with the challenges of implementing new solutions.

One of the most pressing challenges identified by Green is the issue of technical debt. Organizations have invested heavily in technology over the years, often accumulating more than 80 security tools from various vendors. A January report from the IBM Institute for Business Value revealed that many enterprise-level organizations averaged 83 security tools across 29 vendors. “This has created a barrier,” Green explained, advocating for a shift towards a unified platform approach that integrates various tools into a single architecture, thereby enhancing the efficiency of AI utilization in cybersecurity.

The transition from legacy systems to integrated platforms raises questions about the agility of companies in moving forward. “Historically, cybersecurity was seen as a competitive edge that organizations did not want to share,” Green stated. “Today, there’s a lot more collaboration happening between technology organizations to improve defenses.” This collaboration is essential as threats become more sophisticated, particularly with the emergence of rogue cybersecurity professionals. Darren Guccione, CEO of Keeper Security, highlighted the alarming trend of trusted cybersecurity experts turning to the dark side, leveraging their knowledge to aid attackers.

According to research from Gartner Inc., 25% of security leaders faced attrition risks due to the mounting pressures of rising threats. Guccione emphasized that the rapid pace of incidents is overwhelming, pushing defenders to their limits. “The same knowledge required to secure modern infrastructure is highly valuable to criminals,” he remarked. As the demand for skilled cybersecurity professionals exceeds supply, a “hack-for-hire” culture is emerging, driven by the accessibility of offensive tools and the lucrative nature of cybercrime.

To combat these evolving threats, Guccione echoed Green’s call for unified security platforms, emphasizing the importance of privileged access management (PAM). He advocated for zero-trust models, which require close monitoring and limited privileges for users accessing the system. By integrating AI into privileged access frameworks, organizations can enhance their ability to detect suspicious behaviors and mitigate security risks.

The potential of AI extends beyond facilitating attacks; it also plays a pivotal role in enhancing defenses. Dan La Russo, senior partner at Penta, discussed a recent report from the AI research firm Anthropic detailing the use of agentic AI in cyberattacks. This advanced form of AI can automate large-scale attacks independently, as evidenced by an incident involving 30 global organizations, including tech companies and government agencies. While AI has the capacity for harm, La Russo stressed its dual potential, highlighting its application in automating defensive measures and threat detection.

Organizations are now recognizing that proactive measures can mitigate reputational damage before incidents occur. Agentic AI can help identify security gaps and rehearse crisis communication strategies, allowing companies to demonstrate transparency and preparedness. La Russo pointed out, “Cybersecurity needs to be core to an organization’s communications platform, be it a hospital, coffee shop, or automaker,” reinforcing the idea that a strong cybersecurity framework should be woven into the fabric of organizational communication.

As businesses navigate this rapidly changing landscape, the integration of AI in both offensive and defensive capacities will likely intensify. Stakeholders are expected to see an increase in discussions around AI’s role in cybersecurity as organizations work to bolster their defenses against the evolving threat landscape.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Tools

Over 60% of U.S. consumers now rely on AI platforms for primary digital interactions, signaling a major shift in online commerce and user engagement.

AI Government

India's AI workforce is set to double to over 1.25 million by 2027, but questions linger about workers' readiness and job security in this...

AI Education

EDCAPIT secures $5M in Seed funding, achieving 120K page views and expanding its educational platform to over 30 countries in just one year.

Top Stories

Health care braces for a payment overhaul as only 3 out of 1,357 AI medical devices secure CPT codes amid rising pressure for reimbursement...

Top Stories

DeepSeek introduces the groundbreaking mHC method to enhance the scalability and stability of language models, positioning itself as a major AI contender.

AI Regulation

2026 will see AI adoption shift towards compliance-driven frameworks as the EU enforces new regulations, demanding accountability and measurable ROI from enterprises.

Top Stories

AI stocks surge 81% since 2020, with TSMC's 41% sales growth and Amazon investing $125B in AI by 2026, signaling robust long-term potential.

Top Stories

New studies reveal AI-generated art ranks lower in beauty than human creations, while chatbots risk emotional dependency, highlighting cultural impacts on tech engagement.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.