{"id":55665,"date":"2024-03-22T11:06:00","date_gmt":"2024-03-22T11:06:00","guid":{"rendered":"http:\/\/c2da6efb-a7b9-4c10-89c9-9d3551370813"},"modified":"2024-03-22T11:06:00","modified_gmt":"2024-03-22T11:06:00","slug":"ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/","title":{"rendered":"AI is changing cybersecurity and businesses must wake up to the threat"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ae8879173bc75bfd9dda9b9b390090ed8dad4711\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=768\" alt=\"cybersecurity concept\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/96f4419de8df38a16b3ebe1a70599d53c25e9054\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1024\" alt=\"cybersecurity concept\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\" alt=\"cybersecurity concept\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\" alt=\"cybersecurity concept\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Yuichiro Chino\/Getty Images<\/span><\/figcaption><\/figure>\n<p>Corporate boardrooms must become better coordinated and urgent when they address cybersecurity issues, as threat actors turn to <a href=\"https:\/\/www.zdnet.com\/article\/what-is-ai-heres-everything-you-need-to-know-about-artificial-intelligence\/\" rel=\"follow\">artificial intelligence<\/a> (AI) to improve their game.&nbsp;<\/p>\n<p>A board&#8217;s primary role is to grow and safeguard the company&#8217;s interests alongside its management team. With digital so integral in many organizations today, cybersecurity must form part of a board&#8217;s growth strategy, Clifford Capital chairman Sanjiv Misra said during a panel discussion at Istari Global&#8217;s Charter Asia-Pacific Cyber Congress in Singapore.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-101-everything-on-how-to-protect-your-privacy-and-stay-safe-online\/\" rel=\"follow\">Cybersecurity 101: Everything on how to protect your privacy and stay safe online<\/a><\/strong><\/p>\n<p>Without cybersecurity, a board&#8217;s ability to grow the business will be severely compromised, Misra said. Fellow panelist Ensign InfoSecurity chairman Lee Fook Sun concurred, noting the connection between physical and cyber realms. The conflicts in Ukraine and Gaza, for example, have pushed up the number of online threat activities, driven by hacktivism and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/diverse-threat-intelligence-key-to-cyberdefense-against-nation-state-attacks\/\" rel=\"follow\">nation-state attacks<\/a>.<\/p>\n<p>Boardrooms need to figure out how such real-world developments impact online environments and, as such, translate into business risks for the company under their charge, Lee said. A successful approach requires awareness of what and where the threats are and who the attackers are. Lee said threat intel provided by security vendors such as Ensign, which recently published some of these indicators, can offer insights for boards.&nbsp; &nbsp;<\/p>\n<p>While awareness of cyber risks has increased among boardrooms, Lee said there still is a lack of cohesion between boards and the rest of the organization. Attention to cyber risks is often driven by regulatory concerns, with more urgency usually exhibited only after the organization has suffered its first breach.<\/p>\n<p><!----><\/p>\n<p>Lee urged boards to understand the work of their CIO and CISO and determine how effective these executives are in their roles. To have &#8220;well-oiled machinery&#8221; running, boards need to be able to have open discussions with the two people responsible for identifying and defending the company against online threats, he said. &nbsp;<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn\/\" rel=\"follow\"><strong>The best VPN services (and how to choose the right one for you)<\/strong><\/a><\/p>\n<p>And as most boards likely have other pressing issues, such as financials, he suggested they delegate cyber risk management to a sub-committee. He said this unit can then assess the effectiveness of the company&#8217;s cybersecurity strategy and cyber resilience, providing some supervision.<\/p>\n<p>Misra underscored the need for boards to recognize cyber risks and frame their impact on the business. They will then be able to prioritize these risks, so they can identify what elements should be addressed with more urgency and how these threats should be managed. And they should undertake this activity soon, as the&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/industrial-networks-need-better-security-as-attacks-gain-scale\/\" rel=\"follow\">volume of cyberattacks continues to climb<\/a>.<\/p>\n<h2>Organizations must adopt essential measures<\/h2>\n<p>Interpol, for one, has warned that the biggest security threat at the upcoming Paris Olympics will be cybercrime. The Tokyo Olympics in 2021 experienced 450 million cyberattacks, more than double the total during the 2012 London Olympics.&nbsp;<\/p>\n<p>Such attacks can disrupt activities that require the support of IT systems, including ticketing, transportation, and administration. The ever-growing cyber threat highlights the need for nations such as Singapore, where digital developments are relatively advanced, to prioritize cybersecurity and boost its cyber-defense capabilities, according to its Minister for Communications and Information, Josephine Teo.<\/p>\n<p>This prioritization means bolstering <a href=\"https:\/\/www.zdnet.com\/article\/singapore-reviews-ways-to-boost-digital-infrastructures-after-big-outage\/\" rel=\"follow\">digital infrastructures<\/a>&nbsp;and the resilience of companies operating in the country, Teo said during her speech at the congress. &#8220;They provide the services that people use and define our online experiences,&#8221; she said, urging organizations to do more to safeguard their cyber operations.<\/p>\n<p>Pointing to a study conducted by Singapore&#8217;s Cyber Security Agency (CSA), Teo noted that the research revealed the need for more companies to adopt essential security measures.&nbsp; &nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-ai-firewalls-will-secure-your-new-business-applications\/\" rel=\"follow\">How AI firewalls will secure your new business applications<\/a><\/strong><\/p>\n<p>On average, organizations surveyed had adopted about 70% of security measures across five categories, including using secure configuration settings for hardware and software, controlling access to data and services, and updating software on devices and systems. Partial adoption of these essential measures is &#8220;inadequate&#8221;, Teo said.<\/p>\n<p>The study polled over 2,000 organizations in 23 industries and seven charity sectors. Most respondents had experienced at least one cyber incident, such as ransomware or phishing attempts, over the past year. &nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/how-ai-can-improve-cybersecurity-by-harnessing-diversity-according-to-microsoft-securitys-vasu-jakkal\/\" rel=\"follow\">How AI can improve cybersecurity by harnessing diversity<\/a><\/strong><\/p>\n<p>&#8220;We are only as strong as the weakest link. Unless all these essential measures are adopted, the organizations are still exposed to unnecessary cyber risks,&#8221; the Singapore minister said. &#8220;In CSA&#8217;s view, the &#8216;passing mark&#8217; should be set high enough to give assurance &#8212; to your C-suite, to employees, to suppliers, and to customers. That means adopting the full package of essential measures in all of the five categories.&#8221;<\/p>\n<p>Just one-third of organizations had adopted all measures in at least three categories, she added. Almost 60% acknowledged a lack of expertise or experience in implementing cybersecurity effectively.&nbsp;<\/p>\n<p>&#8220;Cyber risks have increased and continue to evolve quickly. This has contributed to the shortfall in cyber professionals, [where] even the most sophisticated organizations struggle to keep up,&#8221; Teo said. She noted that Singapore has been working to boost its <a href=\"https:\/\/www.zdnet.com\/article\/cyberdefense-will-need-ai-capabilities-to-safeguard-digital-borders\/\" rel=\"follow\">cybersecurity talent<\/a> pool through programs such as the CyberSG Talent, Innovation, and Growth Plan (TIG Plan).<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/want-to-work-in-ai-how-to-pivot-your-career-in-5-steps\/\" rel=\"follow\">Want to work in AI? How to pivot your career in 5 steps<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/what-is-generative-ai-and-why-is-it-so-popular-heres-everything-you-need-to-know\/\" rel=\"follow\">Generative AI<\/a>&nbsp;can also be a great equalizer amid the global <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-teams-need-new-skills-even-as-they-struggle-to-manage-legacy-systems\/\" rel=\"follow\">skills shortage<\/a> in <a href=\"https:\/\/www.zdnet.com\/article\/apac-faces-2-1m-shortage-in-cybersecurity-professionals\/\" rel=\"follow\">cybersecurity<\/a>, according to Standard Chartered&#8217;s Group CISO Alvaro Garrido. People who previously have not configured a system can now do so through prompts, said Garrido during a panel discussion at the congress.<\/p>\n<p>He said generative AI enhances productivity and has also provided a way to translate complex threat intel into information that can be universally understood. The emerging technology has made it easier for professionals to join the cybersecurity sector, even if they couldn&#8217;t before, and plug the skills gap.<\/p>\n<p>His team is experimenting with generative AI and applying it to some tasks where they see an average 30% increase in productivity.&nbsp;<\/p>\n<p>Daryl Pereira, Google Cloud&#8217;s Asia-Pacific CISO, referred to similar gains from his team&#8217;s use of generative AI, including a 70% improvement in finding malicious scripts.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/employees-input-sensitive-data-into-generative-ai-tools-despite-the-risks\/\" rel=\"follow\">Employees input sensitive data into generative AI tools despite the risks<\/a><\/strong><\/p>\n<p>The US vendor is working on threat detection and triage for security incidents. Pereira said AI, powered by the cloud, can crunch data <a href=\"https:\/\/www.zdnet.com\/article\/apac-firms-will-need-ai-as-speed-increasingly-critical-in-cyberdefence\/\" rel=\"follow\">quicker than humans<\/a> and address potential threats.<\/p>\n<p>He also noted the possibility of arming non-security professionals to take on some SecOps (security operations) tasks, using generative AI as a guide with natural language prompts. For instance, they can manage daily operations at the SOC (security operations center), such as reviewing logs, freeing up the core cybersecurity team to focus on more advanced defense functions.<\/p>\n<h2>Threat actors are using generative AI<\/h2>\n<p>Companies that have yet to use generative AI to beef up their cybersecurity capabilities will have to contend with online adversaries that already are.<\/p>\n<p>In particular, threat actors use generative AI to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/most-lauded-chatgpt-capability-also-brings-big-risk-to-businesses\/\" rel=\"follow\">craft more convincing phishing email<\/a> messages, noted Simon Green, Palo Alto Networks&#8217; APAC Japan president, during the security vendor&#8217;s Ignite on Tour event in Singapore this week.<\/p>\n<p>Citing the results of an internal test, Green said the company&#8217;s SOC team obtained a 25% clickthrough rate for a phishing email created using generative AI. The email was sent to every employee who has been with Palo Alto for at least three years, containing a request for them to update their employee record after reviewing the company&#8217;s recently updated staff handbook.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-iphone-vpn\/\" rel=\"follow\"><strong>The best VPN services for iPhone and iPad (yes, you need to use one)<\/strong><\/a><\/p>\n<p>Noting that the clickthrough rate for the test will likely be higher for non-security companies, he said generative AI has rectified a problem that previously made it easy to identify phishing email messages. The emerging technology has enabled hackers to produce these messages without grammatical errors quickly and at scale.<\/p>\n<p>Access to such tools and information on the cloud has also allowed threat actors to simulate attacks quickly, change and finetune ineffective attacks, and establish new attack vectors with higher success rates.<\/p>\n<p>In addition, the growing adoption of AI brings a <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-teams-need-new-skills-even-as-they-struggle-to-manage-legacy-systems\/\" rel=\"follow\">new category of vulnerabilities<\/a>, such as large language model poisoning and deepfakes.&nbsp;<\/p>\n<p>This shift calls for a change in how cybersecurity is developed and deployed, according to Green, who said Palo Alto is looking to apply AI capabilities across its product portfolio and integrate an AI &#8220;copilot&#8221;.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors are starting to use artificial intelligence, but too many executives aren&#8217;t prepared for the risks.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-55665","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI is changing cybersecurity and businesses must wake up to the threat 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI is changing cybersecurity and businesses must wake up to the threat 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-22T11:06:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AI is changing cybersecurity and businesses must wake up to the threat\",\"datePublished\":\"2024-03-22T11:06:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/\"},\"wordCount\":1429,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/416b5100042e95f9bfdde156ca20698b47fd3b62\\\/2024\\\/03\\\/21\\\/81d3dd6f-19e1-424d-b470-6db36be27fc5\\\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/\",\"name\":\"AI is changing cybersecurity and businesses must wake up to the threat 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/416b5100042e95f9bfdde156ca20698b47fd3b62\\\/2024\\\/03\\\/21\\\/81d3dd6f-19e1-424d-b470-6db36be27fc5\\\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-03-22T11:06:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/416b5100042e95f9bfdde156ca20698b47fd3b62\\\/2024\\\/03\\\/21\\\/81d3dd6f-19e1-424d-b470-6db36be27fc5\\\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/416b5100042e95f9bfdde156ca20698b47fd3b62\\\/2024\\\/03\\\/21\\\/81d3dd6f-19e1-424d-b470-6db36be27fc5\\\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI is changing cybersecurity and businesses must wake up to the threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI is changing cybersecurity and businesses must wake up to the threat 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/","og_locale":"en_US","og_type":"article","og_title":"AI is changing cybersecurity and businesses must wake up to the threat 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-22T11:06:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AI is changing cybersecurity and businesses must wake up to the threat","datePublished":"2024-03-22T11:06:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/"},"wordCount":1429,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/","url":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/","name":"AI is changing cybersecurity and businesses must wake up to the threat 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280","datePublished":"2024-03-22T11:06:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/416b5100042e95f9bfdde156ca20698b47fd3b62\/2024\/03\/21\/81d3dd6f-19e1-424d-b470-6db36be27fc5\/gettyimages-1483076236-1.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ai-is-changing-cybersecurity-and-businesses-must-wake-up-to-the-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AI is changing cybersecurity and businesses must wake up to the threat"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55665"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55665\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}