Join daily and weekly newsletters to obtain the latest updates and exclusive content to cover the leading artificial intelligence in the industry. Learn more
2:13 a.m.
The attackers on the other side of the planet launched a large -scale attack on the company’s infrastructure. Thanks to many uniforms that have not seen an update since 2022, they blew their surroundings in less than a minute.
The attackers who enjoy the skills of the nation -state team are after Active Directory to close the entire network while creating new privileges at the supervisor level, which will stop any attempt to close. Meanwhile, other members of the attack team firing hordes of robots designed for GB of Gigabytes from the customer, employee and financial data through the application programming interface that has not been disabled at all after the last version of the main products.
In SOC, alerts begin to light keyboards like the latest Grand Theft Auto on the Nintendo key. SOC analysts get their mobile phones, and they try to sleep from another week for six days, as many of them have registered approximately 70 hours.
Ciso receives a call at about 2:35 am from the company’s MDR provider, saying that there is a large -scale breach. “It is not our indignant accounting team, right? The man who tried” office space “is not in that again, right?” Ciso asks half a awake. The MDR Lead team says no, this is from Asia, which is large.
The next storm of cybersecurity: GEN AI, threats from the inside, and the height of exhaustion in Ciso
The Introduction I intelligence creates a digital diaspora of technologies, technologies and trade that everyone adopts, from rogue attackers to the electronic armies of the nation -state trained in the art of Cyberwar. Internal threats are also increasing due to functional insecurity and increasing inflation. All of these challenges and more on the shoulders of CISO, and it is no wonder in dealing with fatigue.
The height of the meteorite from artificial intelligence for hostile and legal use is in the midst of everything. Obtaining the most important benefit from artificial intelligence to improve cybersecurity while reducing risk is what management councils that drive CISO to achieve.
This is not an easy task, as artificial intelligence safety develops very quickly. in Gartner Delay Datavief on safety and risk managementThe analysts company treated how leaders respond to Gen Ai. They found it 56 % From the organizations, Gen Ai has already published, so far 40 % Among the security leaders recognize great gaps in their ability to manage the risks of artificial intelligence effectively.
Gen AI is more deployed InfrasThe security of the channel, where 18 % From companies operate completely and 27 % It actively carried out the GEN AI systems today. The second is the security operations, where 17 % One of the institutions has artificial intelligence systems in full use. Data safety is the third most popular use condition, with 15 % One of the institutions that use GEN AI to protect cloud, hybrid, reserve data and data lakes.

Internal threats require a response from artificial intelligence
Gen Ai re -arranged the internal threat of each company today, which makes the interior More independent threats, treacherous and cHallenGing to select. Artificial intelligence shade It is a threat that CISO did not imagine five years ago, and now it is one of the most porous threat surfaces.
“I see this every week,” Vinite Aura, CTO in WinwireI recently told Venturebeat. “The departments jump on the unbeatable artificial intelligence solutions because the immediate benefits are very attractive to ignore them.” Arra is rushing to point out that the employees are not intentionally lost. “It is very important for organizations to determine strong security strategies while enabling employees to use artificial intelligence techniques effectively,” explains Arra. “The total ban is often pushed to the use of Ai Underground, which only inflates the risks.”
Etamar Golan, CEO and co -founder of Immediate securityDuring a recent interview with Venturebeat. “About 40 % of this failure to train on any data you feed, which means that your intellectual property can become part of its models.”
Traditional detection models based on rules are no longer enough. The leading security teams turn to the AI-GEN behavioral analysis that creates dynamic lines for employee activities that can determine abnormal cases in actual time and contain potential risks and threats.
SellersIncluding immediate security, Insider threat management, and Varonis, It quickly creates the engines of detecting the next generation of artificial intelligence that connects the cloud and cloud file, the end point and the identity in the actual time. Microsoft PurView Insider Management It also includes artificial intelligence models from the next generation to identify high -risk behaviors independently across the mixed workforce.
Conclusion – Part 1
SOC teams are in a race against time, especially if their systems are not combined with each other and more than 10,000 alerts on the day you generate are not synchronized. The attack on the other side of the planet will be at 2:13 am, a challenge to contain ancient systems. Since the opponents are unavoidable in their refinement in Tradecraft with Gen AI, more companies need an escalation and more intelligent about getting more value from their current systems.
Cyber security sellers prompted the maximum value of the systems already installed in SOC. Get the integration properly and avoid turning to the SOC bottom to check the integrity of the alert from one system to another. Know that infiltration is not a wrong stimulant. The attackers show a great ability to reinvent themselves while flying. It is time for more SOCS and the companies you rely on doing the same.
https://venturebeat.com/wp-content/uploads/2025/05/What-your-tools-miss-at-213-AM-How-gen-AI-attack-chains-exploit-telemetry-lag.jpg?w=950?w=1200&strip=all
Source link