Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cyber attackers damage Jaguar Land Rover production

    Meet the IT leader In Lebanon who became an IT entrepreneur

    Will AI wipe out entry-level jobs?

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Cloudflare hit by data breach in Salesloft Drift supply chain attack

      September 2, 2025

      Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps

      September 2, 2025

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025
    • Crypto

      Trump Death Rumors Fueled $1.6 Million In Prediction Market Bets This Weekend

      September 3, 2025

      3 US Crypto Stocks to Watch This Week

      September 3, 2025

      The Shocking Cost Of Bitcoin Payments: One Transaction Can Power a UK Home For 3 Weeks

      September 3, 2025

      Analysts Increase IREN Price Target: Will The Stock Keep Rallying?

      September 3, 2025

      ​​Pi Network Gears Up for Version 23 Upgrade, But Market Demand Stays Flat

      September 3, 2025
    • Technology

      Cyber attackers damage Jaguar Land Rover production

      September 3, 2025

      Meet the IT leader In Lebanon who became an IT entrepreneur

      September 3, 2025

      Will AI wipe out entry-level jobs?

      September 3, 2025

      Interview: Holland & Barrett CDO preparing a Michelin star-worthy data strategy

      September 3, 2025

      Scottish Widows completes migration of millions of accounts to TCS platform

      September 3, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports
    Technology

    Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports

    TechAiVerseBy TechAiVerseJuly 31, 2025No Comments9 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Shadow AI adds $670K to breach costs while 97% of enterprises skip basic access controls, IBM reports

    Shadow AI is the $670,000 problem most organizations don’t even know they have.

     IBM’s 2025 Cost of a Data Breach Report, released today in partnership with the Ponemon Institute, reveals that breaches involving employees’ unauthorized use of AI tools cost organizations an average of $4.63 million. That’s nearly 16% more than the global average of $4.44 million.

    The research, based on 3,470 interviews across 600 breached organizations, reflects how quickly AI adoption is outpacing security oversight. While only 13% of organizations reported AI-related security incidents, 97% of those breached lacked proper AI access controls. Another 8% weren’t even sure if they’d been compromised through AI systems.

    “The data shows that a gap between AI adoption and oversight already exists, and threat actors are starting to exploit it,” said Suja Viswesan, Vice President of Security and Runtime Products at IBM. “The report revealed a lack of basic access controls for AI systems, leaving highly sensitive data exposed and models vulnerable to manipulation.”


    The AI Impact Series Returns to San Francisco – August 5

    The next phase of AI is here – are you ready? Join leaders from Block, GSK, and SAP for an exclusive look at how autonomous agents are reshaping enterprise workflows – from real-time decision-making to end-to-end automation.

    Secure your spot now – space is limited: https://bit.ly/3GuuPLF


    Shadow AI, supply chains are the favorite attack vectors

    The report finds that 60% of AI-related security incidents resulted in compromised data, while 31% caused disruptions to an organization’s daily operations. Customers’ personally identifiable information (PII) was compromised in 65% of shadow AI incidents. That’s significantly higher than the 53% global average. One of AI security’s greatest weaknesses is governance, with 63% of breached organizations either lacking AI governance policies or are still developing them.

    “Shadow AI is like doping in the Tour de France; people want an edge without realizing the long-term consequences,” Itamar Golan, CEO of Prompt Security, told VentureBeat. His company has cataloged over 12,000 AI apps and detects 50 new ones daily.

    VentureBeat continues to see adversaries’ tradecraft outpace current defenses against software and model supply chain attacks. It’s not surprising that the report found that supply chains are the primary attack vector for AI security incidents, with 30% involving compromised apps, APIs, or plug-ins. As the report states: “Supply chain compromise was the most common cause of AI security incidents. Security incidents involving AI models and applications were varied, but one type clearly claimed the top ranking: supply chain compromise (30%), which includes compromised apps, APIs and plug-ins.”

    Weaponized AI is proliferating  

    Every form of weaponized AI, including LLMs designed to improve tradecraft, continues to accelerate. Sixteen percent of breaches now involve attackers using AI, primarily for AI-generated phishing (37%) and deepfake attacks (35%). Models, including FraudGPT, GhostGPT and DarkGPT, retail for as little as $75 a month and are purpose-built for attack strategies such as phishing, exploit generation, code obfuscation, vulnerability scanning and credit card validation.

    The more fine-tuned a given LLM is, the greater the probability it can be directed to produce harmful outputs. Cisco’s The State of AI Security Report reports that fine-tuned LLMs are 22 times more likely to produce harmful outputs than base models. 

    “Adversaries are not just using AI to automate attacks, they’re using it to blend into normal network traffic, making them harder to detect,” Etay Maor, Chief Security Strategist at Cato Networks, recently told VentureBeat. “The real challenge is that AI-powered attacks are not a single event; they’re a continuous process of reconnaissance, evasion, and adaptation.”

    As Shlomo Kramer, CEO of Cato Networks, warned in a recent VentureBeat interview: “There is a short window where companies can avoid being caught with fragmented architectures. The attackers are moving faster than integration teams.”

    Governance one of the weaknesses adversaries exploit

    Among the 37% of organizations claiming to have AI governance policies, only 34% perform regular audits for unsanctioned AI. Just 22% conduct adversarial testing on their AI models. DevSecOps emerged as the top factor reducing breach costs, saving organizations $227,192 on average.

    The report’s findings reflect how relegating governance as a lower priority impacts long-term security. “A majority of breached organizations (63%) either don’t have an AI governance policy or are still developing one. Even when they have a policy, less than half have an approval process for AI deployments, and 62% lack proper access controls on AI systems.”

    Most organizations lack essential governance to reduce AI-related risks, with 87% acknowledging the absence of policies or processes. Nearly two-thirds of breached companies fail to audit their AI models regularly, and over three-quarters do not conduct adversarial testing, leaving critical vulnerabilities exposed.

    This pattern of delayed response to known vulnerabilities extends beyond AI governance to fundamental security practices. Chris Goettl, VP Product Management for Endpoint Security at Ivanti, emphasizes the shift in perspective: “What we currently call ‘patch management’ should more aptly be named exposure management—or how long is your organization willing to be exposed to a specific vulnerability?”

    The $1.9M AI dividend: Why smart security pays off

    Despite the proliferating nature of weaponized AI, the report offers hope for battling adversaries’ growing tradecraft. Organizations that go all-in using AI and automation are saving $1.9 million per breach and resolving incidents 80 days faster. According to the report: “Security teams using AI and automation extensively shortened their breach times by 80 days and lowered their average breach costs by USD 1.9 million compared to organizations that didn’t use these solutions.”

    It’s striking how broad the contrast is. AI-powered organizations spend $3.62 million on breaches, compared to $5.52 million for those without AI, resulting in a 52% cost differential. These teams identify breaches in 153 days, compared to 212 days for traditional approaches, and then contain them in 51 days, versus 72 days.

    “AI tools excel at rapidly analyzing massive data across logs, endpoints and network traffic, spotting subtle patterns early,” noted Vineet Arora, CTO at WinWire. This capability transforms security economics: while the global average breach cost sits at $4.44 million, extensive AI users operate 18% below that benchmark.

    Yet adoption continues to struggle. Only 32% use AI security extensively, 40% deploy it in a limited manner, and 28% use it in no capacity. Mature organizations distribute AI evenly across the security lifecycle, most often following the following distribution: 30% prevention, 29% detection, 26% investigation and 27% response.

    Daren Goeson, SVP Product Management at Ivanti, reinforces this: “AI-powered endpoint security tools can analyze vast amounts of data to detect anomalies and predict potential threats faster and more accurately than any human analyst.”

    Security teams aren’t lagging; however, 77% match or exceed their company’s overall AI adoption. Among those investing post-breach, 45% choose AI-driven solutions, with a focus on threat detection (36%), incident response planning (35%) and data security tools (31%).

    The DevSecOps factor amplifies benefits further, saving an additional $227,192, making it the top cost-reducing practice. Combined with AI’s impact, organizations can cut breach costs by over $2 million, transforming security from a cost center to a competitive differentiator.

    Why U.S. cybersecurity costs hit record highs while the rest of the world saves millions

    The cybersecurity landscape revealed a striking paradox in 2024: as global breach costs dropped to $4.44 million, their first decline in five years. U.S. organizations watched their exposure skyrocket to an unprecedented $10.22 million per incident. This divergence signals a fundamental shift in how cyber risks are materializing across geographic boundaries. Healthcare organizations continue to bear the heaviest burden, with an average cost of $7.42 million per breach, and resolution timelines stretching to 279 days —a full five weeks longer than what their peers in other industries experience.

    The operational toll proves equally severe: 86% of breached organizations report significant business disruption, with three-quarters requiring more than 100 days to restore normal operations. Perhaps most concerning for security leaders is the emergence of investment fatigue. Post-breach security spending commitments have plummeted from 63% to just 49% year-over-year, suggesting organizations are questioning the ROI of reactive security investments. Among those achieving full recovery, only 2% managed to restore their operational status within 50 days, while 26% required more than 150 days to regain operational footing. These metrics underscore a harsh reality: while global organizations are improving their ability to contain breach costs, U.S. enterprises face an escalating crisis that traditional security spending alone cannot resolve. The widening gap demands a fundamental rethinking of cyber resilience strategies, particularly for healthcare providers operating at the intersection of maximum risk and extended recovery timelines.

    IBM’s report underscores why governance is so critical

    “Gen AI has lowered the barrier to entry for cybercriminals. … Even low‑sophistication attackers can leverage GenAI to write phishing scripts, analyze vulnerabilities, and launch attacks with minimal effort,” notes CrowdStrike CEO and founder George Kurtz.

    Mike Riemer, Field CISO at Ivanti, offers hope: “For years, attackers have been utilizing AI to their advantage. However, 2025 will mark a turning point as defenders begin to harness the full potential of AI for cybersecurity purposes.”

    IBM’s report provides insights organizations can use to act immediately:

    1. Implement AI governance now – With only 45% having approval processes for AI deployments
    2. Gain visibility into shadow AI – Regular audits are essential when 20% suffer breaches from unauthorized AI
    3. Accelerate security AI adoption – The $1.9 million savings justify aggressive deployment

    As the report concludes: “Organizations must ensure chief information security officers (CISOs), chief revenue officers (CROs) and chief compliances officers (CCOs) and their teams collaborate regularly. Investing in integrated security and governance software and processes to bring these cross-functional stakeholders together can help organizations automatically discover and govern shadow AI.”

    As attackers weaponize AI and employees create shadow tools for productivity, the organizations that survive will embrace AI’s benefits while rigorously managing its risks. In this new landscape, where machines battle machines at speeds humans can’t match, governance isn’t just about compliance; it’s about survival.

    Daily insights on business use cases with VB Daily

    If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.

    Read our Privacy Policy

    Thanks for subscribing. Check out more VB newsletters here.

    An error occured.

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMark Zuckerberg says ‘developing superintelligence is now in sight,’ shades OpenAI and other firms focused on automating work
    Next Article ‘Subliminal learning’: Anthropic uncovers how AI fine-tuning secretly teaches bad habits
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Cyber attackers damage Jaguar Land Rover production

    September 3, 2025

    Meet the IT leader In Lebanon who became an IT entrepreneur

    September 3, 2025

    Will AI wipe out entry-level jobs?

    September 3, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025174 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202529 Views
    Don't Miss
    Technology September 3, 2025

    Cyber attackers damage Jaguar Land Rover production

    Cyber attackers damage Jaguar Land Rover production Jaguar Land Rover reports a cyber attack has…

    Meet the IT leader In Lebanon who became an IT entrepreneur

    Will AI wipe out entry-level jobs?

    Interview: Holland & Barrett CDO preparing a Michelin star-worthy data strategy

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Cyber attackers damage Jaguar Land Rover production

    September 3, 20252 Views

    Meet the IT leader In Lebanon who became an IT entrepreneur

    September 3, 20252 Views

    Will AI wipe out entry-level jobs?

    September 3, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.