{"id":59871,"date":"2025-12-18T00:00:00","date_gmt":"2025-12-18T00:00:00","guid":{"rendered":"urn:uuid:a3f21819-3e60-6587-e548-c3a7ed7ac4f4"},"modified":"2025-12-18T00:00:00","modified_gmt":"2025-12-18T00:00:00","slug":"what-cyber-defenders-really-think-about-ai-risk","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/","title":{"rendered":"What Cyber Defenders Really Think About AI Risk"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/cyber-defenders-and-ai-risks-blog-thmb.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>There\u2019s an old saying that technologies are neither good nor bad, it\u2019s how they\u2019re used that matters. If there was ever a tool to prove the point, AI is it. On the one hand, AI enables malicious actors to whip up fresh threats and launch attacks of unprecedented scale. On the other, it gives security teams whole new capabilities to strengthen their cyber defenses.<\/p>\n<p>Our <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/l\/trend-micros-2025-defenders-survey-report.html\">2025 Trend Micro Defenders Survey Report<\/a> digs into these dual aspects of AI. Analyzing more than 3,000 responses from 88 countries, it highlights the AI risks keeping cyber defenders up at night\u2014and where cybersecurity teams see opportunities to enhance their security posture with AI tools.<\/p>\n<p>Here are some of the highlights:<\/p>\n<p><span class=\"body-subhead-title\">Fakes and fraud seen as top AI risks<\/span><\/p>\n<p>More than a quarter (26%) of survey respondents told us defending against fraud and AI-driven impersonation were their biggest priorities when it comes to AI risk. Other big areas of focus are preventing AI application attacks, avoiding data and intellectual property leaks via AI tools, and gaining greater insight into employee use of AI solutions, whether sanctioned apps or \u2018shadow AI.\u2019<\/p>\n<p>It\u2019s fair to say all these priorities reflect a general anxiety about organizations\u2019 understanding of\u2014and ability to respond to\u2014AI-based attacks.<\/p>\n<p>The good news is something can be done. Fifteen percent (15%) of respondents have said they\u2019re already pursuing training and education to raise AI risk awareness. More than 10% have made it a priority to block unsanctioned app use. And 7% are focused on preventing overprivileged access to information.<\/p>\n<p>Many are looking at other tactics and actions to manage AI responsibly and minimize potential risks.<\/p>\n<p><span class=\"body-subhead-title\">Defenders are striking back<\/span><\/p>\n<p>Zero-trust architectures, data security posture management (DPSM), and encryption were all reported as ways organizations are defending themselves against AI-related threats. Proactive testing is unfortunately less common, with just 6% of respondents saying they conduct regular AI audits or engage red teams to ensure their cyber protections are as effective as possible.<\/p>\n<p>That said, it\u2019s a positive sign that growing numbers of organizations seem to be involving their cybersecurity teams earlier in the AI adoption process, with 23% engaging security at the discovery stage and 25% at the pilot stage.<\/p>\n<p>This \u2018shift left\u2019 is encouraging, even if there\u2019s more work to be done\u2014which there clearly is, given that 17% involve security only on implementation, when it may be too late, 10% don\u2019t know when security gets involved, and 6% say they\u2019re not involved at all.<\/p>\n<p>The other obvious area where security teams can make gains against AI threats is by adopting AI tools. While that\u2019s starting to happen, a few obstacles need to be cleared away.<\/p>\n<p><span class=\"body-subhead-title\">Confidence in AI for cybersecurity<\/span><\/p>\n<p>Just under 20% of survey respondents said their organization hasn\u2019t started using AI-based cybersecurity tools yet. About the same proportion said they have some nagging concerns about AI\u2019s accuracy and reliability, and slightly fewer cited privacy risks as a reason they might be holding back.<\/p>\n<p>Certainly, any team hoping to deploy AI defenses and then go for an extended coffee break should have misgivings. AI tools need to be monitored and trained. But the gold is in the training, and the sooner they\u2019re put to use and start learning, the more effective they\u2019ll become.<\/p>\n<p>Another key to success is ensuring that the use of AI cybersecurity tools and strategies aligns with the needs of the business. Nineteen percent (19%) of survey respondents said their biggest challenge is identifying relevant and valuable use cases. Doing so requires at least two things: one, having technical and cybersecurity leaders engage in business-focused conversations with executives to uncover where security and business goals overlap; and two, developing a strategic, organization-wide practice of cyber risk management that can inform where and how AI tools are needed.<\/p>\n<p><span class=\"body-subhead-title\">AI risk is central to cyber risk management<\/span><\/p>\n<p>In case you missed it, our previous blog on the <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/l\/trend-micros-2025-defenders-survey-report.html\">2025 Trend Micro Defenders Survey Report<\/a> puts these issues of AI risk into the broader context of overall cyber risk and how organizations are dealing with it. We invite you to check that out and, of course, to download the <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/core\/docs\/ebook\/eb-defender-survery.pdf\"><span class=\"bs-modal\">full report<\/span><\/a>.<\/p>\n<p>This year\u2019s results make it clear that AI is, and will continue to be, a key part of cyber risk management going forward. The question is not, \u201cIs AI our friend or foe?\u201d It\u2019s: \u201cWhere are the greatest AI risks we face, how can we respond to them\u2014and how can we use AI to turn the tables on bad actors?\u201d<\/p>\n<p>The answer, as indicated in the quick summary of survey findings here, includes greater awareness and more training, more mature company policies, involving security teams as early as possible in AI adoption, and taking advantage of the new, advanced cybersecurity capabilities AI has to offer.<\/p>\n<p>In our next blog, we\u2019ll shift perspective and take a look at the ways organizations are maturing their approach to cloud risk management. Stay tuned.<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>Learn more about ways to manage cloud risk from these additional resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/l\/cyber-defenders-and-ai-risks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Trend Micro&#8217;s 2025 Trend Micro Defenders Survey Report highlights current AI-related cybersecurity priorities and where security professionals use AI to their advantage. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9765,9510,10938,9538,9511],"class_list":["post-59871","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-annual-predictions","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-compliancerisks","tag-trend-micro-research-cyber-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Cyber Defenders Really Think About AI Risk 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Cyber Defenders Really Think About AI Risk 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"What Cyber Defenders Really Think About AI Risk\",\"datePublished\":\"2025-12-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/\"},\"wordCount\":847,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Annual Predictions\",\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Compliance&amp;Risks\",\"Trend Micro Research : Cyber Threats\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/\",\"name\":\"What Cyber Defenders Really Think About AI Risk 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80\",\"datePublished\":\"2025-12-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80\",\"contentUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/what-cyber-defenders-really-think-about-ai-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Annual Predictions\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-annual-predictions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Cyber Defenders Really Think About AI Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Cyber Defenders Really Think About AI Risk 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/","og_locale":"en_US","og_type":"article","og_title":"What Cyber Defenders Really Think About AI Risk 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-12-18T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"What Cyber Defenders Really Think About AI Risk","datePublished":"2025-12-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/"},"wordCount":847,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80","keywords":["Trend Micro Research : Annual Predictions","Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Compliance&amp;Risks","Trend Micro Research : Cyber Threats"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/","url":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/","name":"What Cyber Defenders Really Think About AI Risk 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80","datePublished":"2025-12-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-defenders-and-ai-risks-blog-thmb:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/what-cyber-defenders-really-think-about-ai-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Annual Predictions","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-annual-predictions\/"},{"@type":"ListItem","position":3,"name":"What Cyber Defenders Really Think About AI Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59871"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59871\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}