Become a member of our daily and weekly newsletters for the latest updates and exclusive content about leading AI coverage. Leather
Opponents unleash new Tradecraft to use every weakness they can find in end points, and relies on Generative AI (Gen AI) to create new attack weapons of your choice.
What is disturbing is how fast their arsenals grow. That is clear in the speed and scale of phishing campaigns, deepfake videos and social engineering attacks. Over 67% of phishing -attacks relied on AI last year, and 61% From security leaders, phishing campaigns on a scale see with AI chatbots that attack their organizations. Deloitte predicts that deep fake-related losses will rise $ 40 billion by 2027grow with a 32% compound annual growth rate.
Cyber security teams who have successfully fought against end point attacks say Venturebeat says that it is common for opponents to carry out months before an attack to identify weak points in end points.
All that is needed is a quick phone call to the internal service desk for a password or MFA reset at the right time, and they are inside.
Endpoints that are confronted with an attack of new AI-based attacks
Opponents give priority and accelerating attacks at end points using every available source of automation to scale their efforts, whereby Gen AI and Machine Learning (ML) are the nuclear attack technologies par excellence.
Financial services, health care, production, distributors and core companies in complex supply chains are the primary goals. Creating chaos in a supply chain for financial services is a ransomware multiplier.
“Due to the nature of our company, we are confronted with some of the most advanced and persistent cyber threats there are,” Katherine Mowen, The tariff companies’ SVP from Information Security, Venturebeat said in a recent interview. “We saw others being violated in the mortgage industry, so we had to make sure it didn’t happen to us. I think what we are doing now is against AI with AI. “
The AI-based weapons of opponents are so advanced that a violation could take place for months without the security team of an organization. The average time required to identify and contain an infringement is 277 days, with 176 days to recognize it and 82 days to contain it, based on based The last costs of IBM of a report for data breach. Weapons AI makes it more difficult for companies to close that gap.
“If your opponents break out in two minutes, and it will take you a day to take data and another day to perform a search, how can you hope you keep such a opponent?” Elia Zaitsev, Chief Technology Officer CrowdstrikeVenturebeat recently told.
One in three organizations has no documented strategy to defend against AI and Gen AI threats. Ivanti’s 2024 State of CyberSecurity report Discovered that 89% of cisos and senior IT leaders believe that AI-driven threats have just begun.
The majority of the security leaders, 60%, Fear that their organizations are not willing to defend against AI-driven threats and attacks. Ivanti’s research showed that phishing, software vulnerabilities, ransomware attacks and API-related vulnerabilities are the four most common threats. It is no coincidence that these four methods see their greatest profit of Gen AI.
End point protection urgently needs more speed
“The opponent becomes faster and the use of AI technology is part of that. Delivery -automation is also part of this, but entering these new security domains is another important factor, and that has not only made modern attackers, but also modern attack campaigns much faster, ”says Saitsev.
Etay Maor, main security strategist at Cato -Networksnoted during a recent Venturebeat interview that Cato Networks already sees cases “in which attackers try to circumvent AI-based systems by giving them fast injections, or not necessarily promptly promptly[s]But inject information in the AI system and try to convince that it is not malignant, but rather benign. “
Maor continued: “We participate and follow in various underground forums and see hundreds of AI applications appear. I think organizations do not realize what is happening on their network, and the big headache will be if we slide the malignant through the cracks. “
“Every day we identify about one and a half million brand new attacks that have never been seen so far,” said Shailesh Rao, president of Palo Alto Networks’ Cortex division. “The attacks are so refined, the needle changes billions a day. Would you rather write rules or apply machine learning to all this information? “
Vasu Jakkal, vice -president of companies, security, compliance and identity Microsoft, A still grim photo painted in one interiorEW with Venturebeat. “Three years ago in 2021 we saw 567 identity -related attacks, which were password -related; Those are many attacks per second. Nowadays that number is 7,000 password attacks per second and more than 1500 threat actors. “
Four areas where every end point provider has to excel with AI in 2025
Endpoint, identity and multi-domain attacks today dominate the Enterprise Threatscape, partly fed by new Tradecraft invented using Gen AI.
Endpoint providers must make progress when taking data, incident prioritization, automating triage and repose and improvising attack analysis. Leading endpoint providers who deliver AI-based end point protection platforms, are Cato networks, Cisco, Crowdstrike, Microsoft, Palo Alto Networks, Sentinelone, Trend Micro and Zscaler, with Crowdstrike with the help of AI and ML as core components of his strategy of his strategy.
Here are four important areas that every supplier has to do this year:
Speeding up data intake and standardization: AI helps end point sellers quickly dissect logs from end points, Saas apps and online servers, assigns data to a universal schedule. This has the potential to shorten the analysis time from days to minutes.
Improvement of incidentification and follow -up actions: AI-driven correlation engines search millions of warnings, so that they limit a few high-quality leads with the help of time series, IOAs and adapted models to give priority to the most critical incidents.
Speed up how the end point platform uses the burglary attempts and responds to burglary attempts: AI-driven tools help with advanced searches, generate remediation scripts and shorten the manual forensic time of hours to minutes. Primary Playbooks make fast actions possible, such as insulating endpoints or blocking malignant IPs.
Enable a more proactive attitude and improve the analysis of the attack path: AI identifies likely burglary routes by combining threat information, vulnerabilities, user rights and network data and then recommends targeted fixes to block multiple attack paths.
A playbook for 2025: 12 MUST-DOS to close the AI holes in end point protection
Fighting AI attacks with AI must start at a more strategic level than currently doing in many organizations. It goes beyond the overloading of endpoints with another agent, or demand that users verify themselves in multiple identity management systems. AI must be the core of the cyber security pile.
The next 12 must-dos are a pragmatic playbook for 2025, with regard to the most important technologies, processes and cultural shifts that are needed to close the growing gaps in end point protection.
- Sase of SSE Adoption: Take a converged Sase or SSE approach that combines zero confidence with your network, end point and identity data. Let AI check everything in real time, so that you do not miss any threats that Siled Tools cannot see.
- Semantic data modeling for uniform visibility: Standardizing logs about the cloud, end points and identity systems in one model. Let AI pars and normalize the data so that your team gets the full picture quickly.
- AI-based triage and playbooks: Use an XDR or similar system that is aligned with zero confidence to reduce the stay times. AI-driven Playbooks help the reactions to orchestrate within a few minutes, not days.
- Signal -like engines for prioritization of threats: Correler data about your zero-trust architecture to catch secret threats. AI can help to get suspicious patterns to the surface, so that you can first concentrate on real problems.
- Identity threat Prevention: Lean on zero-trust principles for real-time posture controls and privilege analyzes. AI blocks attackers who try to run with stolen references or tokens.
- Proactive paving via attack analysis: Maintain zero confidence from the beginning to limit the lateral movement. AI indicates the least fixes that block several paths in one pass.
- Explanable AI and Governance: Trace every AI-driven decision so that your board and supervisors trust. Zero Trust does not mean black boxes. Maintain visibility in the logic of AI.
- Use specialized AI over generic models: Train models about real attacker tactics within a Zero-Trust Framework. You will see fewer false positives and more accurate detection.
- Continu -model tuning and dataset renew: Work AI models regularly to keep track of evolving threats. Zero Trust is dynamic, so your data pipelines must be.
- Human-in-the-lus Validation: Even with Zero-Trust Automatisering, human insight is important. Analysts refine AI findings to catch nuanced threats and reduce false alarms.
- Automated incidentresponsorkestration: Integrate AI-Playbooks with zero-troubles checks in end points, firewalls and identity. Once investigated, the answers propagate immediately.
- End-to-end Zero-Trust Integration: Check with every step of the kill chain. Combining AI detection with strict access controls forces attackers to overcome new barriers with every turn.
Bottom Line
While attackers run beyond traditional endpoints, organizations must unite threat data and accelerate their defense between hybrid infrastructures. This is why many leading suppliers should speed up their efforts by concentrating on AI-driven solutions that handle data intake, correlation and automated response in real-time.
The above playbook points to the road to achieve these goals and successfully defend it against the AI-based opponents who not only keep coming, but also continue to grow in refinement.
Source link
Leave a Reply