How AI Is Becoming Weak Link in Cybersecurity

5Mind. The Meme Platform

โ€˜It is very much similar to pinning your confidential files on a public noticeboard and hoping no one takes a copy,โ€™ a data protection expert said.

The worldโ€™s most powerful artificial intelligence (AI) models arenโ€™t just changing how businesses crunch numbers or predict trends; theyโ€™re escalating concerns over data security.

As AI capabilities accelerate, cybersecurity and privacy experts warn that the same models capable of detecting fraud, securing networks, or anonymizing records can also infer identities, reassemble stripped-out details, and expose sensitive information, according to a report by McKinsey & Company released in May.

Ninety percent of companies lack the modernization to defend against AI-driven threats, a 2025 Accenture cybersecurity resilience report stated. The report included insights from 2,286 security and technology executives across 24 industries in 17 countries regarding the state of AI-cyber attack readiness.

So far this year, the Identity Theft Resource Center has confirmed 1,732 data breaches. The center also noted that the โ€œcontinued rise of AI-powered phishing attacksโ€ is becoming more sophisticated and challenging to detect. Some of the main industries plagued by these data breaches include financial services, health care, and professional services.

โ€œIt is the predictable consequence of a technology that has been deployed with breathtaking speed, often outpacing organizational discipline, regulatory provisions, and user vigilance. The fundamental design of most generative AI systems makes this outcome almost inevitable,โ€ Danie Strachan, senior privacy counsel at VeraSafe, told The Epoch Times.

Because AI systems are designed to absorb an immense volume of information for training, this creates vulnerabilities.

โ€œWhen employees, often with their best intentions, provide AI systems with sensitive business dataโ€”be it strategy documents, confidential client information, or internal financial recordsโ€” that information is absorbed into a system over which the company has little to no control,โ€ Strachan said.

This is especially true if consumer versions of these AI tools are used and protective measures are not enabled.

โ€œIt is very much similar to pinning your confidential files on a public noticeboard and hoping no one takes a copy,โ€ Strachan said.

Multifaceted Threat

There are different ways someoneโ€™s personal data can end up in the wrong hands or be exposed by AI tools. Hacker-directed attacks and theft are well known, but another way this occurs is through what researchers call โ€œprivacy leakage.โ€

Publicly accessible Large Language Models (LLMs) are a common way for information to end up in a data breach or โ€œleak.โ€

Byย Autumn Spredemann

Read Full Article on TheEpochTimes.com

Contact Your Elected Officials
The Epoch Times
The Epoch Timeshttps://www.theepochtimes.com/
Tired of biased news? The Epoch Times is truthful, factual news that other media outlets don't report. No spin. No agenda. Just honest journalism like it used to be.

Never and somehow again

When dealing with an all-volunteer force, retention will always be an issue especially when civilian society is competing for the same talent.

In Memoriam: Democrat Capos Lick Dick Cheneyโ€™s Boots

The unindicted, unrepentant war criminal Dick Cheney, you may have heard, kicked the bucket earlier this week.

The Business of Hating America

Many Americans mistake discomfort for oppression and inconvenience for crisis, confusing the safety of abundance with the struggle of true hardship.

A Defining Moment: Will Populist Promises Collapse New York City?

New York City elected a candidate promising rent freezes, free transit, universal childcare, and higher corporate taxesโ€”pledges that may clash with fiscal reality.

Another Motive to Kill Charlie Kirk

Since the last article about Kirk's assassination, we have found a third and more powerful motive for the murder of Charlie Kirk.

US to Boycott G20 Over South Africaโ€™s โ€˜Rights Abusesโ€™ of Afrikaners

Trump bars U.S. officials from attending G20 summit in South Africa, citing human rights abuses against white Afrikaners and illegal land seizures.

The Warning Signs of a โ€˜K-shapedโ€™ Split in the US Economy

Concerns of a K-shaped economy in the United States, with its characteristic split, have increased in recent months.

USDA Must Update Genetically Modified Food Labeling Requirements: Court

A U.S. appeals court ruled the Agriculture Dept. wrongly exempted undetectable genetically modified foods from mandatory labeling requirements.

Trump Considers Sanctions Exemption for Hungary as He Hosts Orban

Trump said he may exempt Hungary from sanctions, noting itโ€™s hard for Orban to secure oil and gas from elsewhere. โ€œWeโ€™re looking at it,โ€ he told reporters.

US Government Revokes 80,000 Visas

The Trump administration wonโ€™t hesitate to revoke visas of foreigners who โ€˜undermine our laws', the US State Dept. said after 80,000 visas were revoked.

Trump to Host Central Asian Leaders as US Shores Up Critical Mineral Supply

President Trump is hosting Central Asian leaders at the White House on Nov. 6, amid fast-tracked efforts to de-risk supply chains from China.

Trump Drafting Executive Order on Election Integrity After Alleging Ballot Fraud in California

White House press secretary Karoline Leavitt said an executive order is being drafted to strengthen U.S. elections and curb mail-in ballot fraud.
spot_img

Related Articles