Connect with us

Hi, what are you looking for?

AI Cybersecurity

Latin America Faces 9% of Global Cyberattacks, IBM Reveals Alarming Trends

Latin America now accounts for 9% of global cyberattacks, with IBM reporting a concerning rise in automated exploits and vulnerabilities in key sectors like finance and energy.

Latin America is increasingly becoming a focal point for cybercriminal activities, now accounting for 9% of all global cyberattacks, according to IBM. This uptick reveals a concerning trend of automated exploitation, credential theft, and the emerging risks associated with shadow AI. Mexico, in particular, faces heightened vulnerabilities across pivotal sectors including financial services, energy, and manufacturing, where outdated systems and the convergence of Information Technology (IT) and Operational Technology (OT) pose significant challenges to regulatory compliance and digital resilience.

The region remains the fifth most targeted globally, with a rise from 8% of total cyberattacks in 2024 to 9% in 2025. The IBM X-Force Threat Intelligence 2026 report outlines four primary vectors driving this increase: exploitation of public applications, use of valid accounts, compromise of remote services like VPNs, and supply chain intrusions—each demonstrating a 25% effectiveness rate. The report highlights a notable shift in methodologies, with attackers increasingly leveraging legitimate administrative tools for malicious purposes. Approximately 33% of incidents involved the use of software already present within corporate environments, such as Microsoft Teams and various scripting tools, complicating detection efforts for cybersecurity teams.

The financial and insurance sectors have historically been prime targets, yet the energy and manufacturing industries are now experiencing a significant spike in cyber incidents. These sectors accounted for 47% and 27% of major incidents, respectively. As IT and OT converge, the attack surface expands, especially in manufacturing, making legacy systems particularly vulnerable. According to IBM, there has been a 44% increase in the exploitation of software vulnerabilities. While “zero-day” vulnerabilities often capture the most attention, threat actors are increasingly focused on “n-day” vulnerabilities—known flaws with existing patches that remain unaddressed for years. The difficulty in updating legacy systems amplifies this risk, creating an opportunity for attackers.

Between 2024 and 2025, the number of identified vulnerabilities surged by 13,000, reaching a total of 40,000 within a single year. Attackers rationalize their efforts by determining that scanning for unpatched vulnerabilities—some dating back a decade—yields a better return on investment than discovering new exploits. Compounding this issue is the rising complexity of supply chains, which has made supply chain attacks a favored method of intrusion, increasing nearly fourfold over the past five years. Organizations often prioritize internal security but neglect to monitor third, fourth, or even fifth-party risks, leaving them susceptible to exploitation through weaker links in their supply chains.

Rodolfo Manzi, Security Services Leader at IBM Mexico, emphasizes this vulnerability, stating, “Even if a primary corporation is mature and well-protected, its vendors or service providers may lack equivalent controls.” The trend of targeting open-source libraries has also emerged, as attackers embed malicious code into libraries available through platforms like NPM or Maven. When corporate developers integrate these libraries, they inadvertently introduce threats into their internal environments.

AI technology presents additional risks, particularly in terms of identity theft and data exposure. Research indicates that over 300,000 credentials for AI platforms, including ChatGPT, have surfaced on the dark web. As employees increasingly turn to unapproved AI tools to boost productivity, a phenomenon dubbed “Shadow AI,” the potential for credential theft escalates. Such compromises grant attackers access to sensitive corporate data and proprietary code, with one in six security incidents now linked to AI misuse or compromise. Furthermore, attackers are adapting their tactics in real-time using AI, modifying their attack patterns immediately if a specific intrusion attempt is thwarted.

The democratization of cybercrime tools has fragmented the ransomware market, with the number of major groups escalating from 10 in 2024 to 109 by 2025. This 49% increase is attributed to “ransomware-as-a-service” models and affiliate programs, lowering the barrier to entry for less experienced hackers. As such, smaller groups can now acquire sophisticated tools and share profits with original developers, intensifying the potential for high-impact cybercrime.

To combat these evolving threats, Manzi suggests that corporate leadership focus on four critical areas. First, organizations should treat digital identity as critical infrastructure, applying governance to user identities and AI agents similar to physical servers and networks. Second, reliance on monthly patch cycles is no longer adequate; continuous vulnerability management using AI-driven tools is essential to identify and remediate vulnerabilities across the attack surface. Third, companies should govern their AI platforms by providing sanctioned, secure tools for employees, coupled with strict data classification policies. Lastly, fostering a culture of cyber awareness and education is crucial; regular training can help employees grasp the risks of sharing sensitive information with unmonitored AI tools and the importance of multi-factor authentication.

The rapid integration of AI in corporate workflows presents both opportunities and challenges. Without appropriate governance and oversight, organizations risk extending their attack surfaces beyond the security department’s control. As Manzi concludes, “The goal for attackers is to maximize results with minimal effort.” To counter this, organizations must automate their defenses and secure every digital identity within their networks.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

Top Stories

Codelco partners with Microsoft for an 18-month AI initiative to optimize copper mining operations, enhance cybersecurity, and drive sustainability.

AI Regulation

Mexico's government rapidly adopts AI across 14 federal agencies for tax enforcement and citizen services, but lacks binding regulations, risking data privacy and public...

AI Business

Nu Holdings secures conditional approval for a US bank charter, positioning itself for a transformative entry into the American banking market while launching AI-driven...

AI Research

AI-driven scientific discovery market to surge from $4.80B in 2025 to $34.78B by 2035, fueled by 21.90% CAGR and advancements from NVIDIA and IBM.

AI Business

Block lays off 40% of its workforce, cutting 4,000 jobs, as CEO Jack Dorsey ties the move to AI integration, boosting shares by 16%

AI Cybersecurity

IBM reports a staggering 44% rise in AI-accelerated cyberattacks, jeopardizing Canadian enterprises as they confront evolving security challenges.

AI Cybersecurity

IBM reports a staggering 44% rise in cyberattacks targeting internet-facing systems, driven by AI that exploits security vulnerabilities, costing UK businesses £14.7 billion annually

AI Cybersecurity

IBM's 2026 X-Force report reveals a 44% surge in AI-driven cyberattacks on Canadian organizations, highlighting the urgent need for enhanced security measures.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.