How AI Is Becoming Weak Link in Cybersecurity

Contact Your Elected Officials

‘It is very much similar to pinning your confidential files on a public noticeboard and hoping no one takes a copy,’ a data protection expert said.

The world’s most powerful artificial intelligence (AI) models aren’t just changing how businesses crunch numbers or predict trends; they’re escalating concerns over data security.

As AI capabilities accelerate, cybersecurity and privacy experts warn that the same models capable of detecting fraud, securing networks, or anonymizing records can also infer identities, reassemble stripped-out details, and expose sensitive information, according to a report by McKinsey & Company released in May.

Ninety percent of companies lack the modernization to defend against AI-driven threats, a 2025 Accenture cybersecurity resilience report stated. The report included insights from 2,286 security and technology executives across 24 industries in 17 countries regarding the state of AI-cyber attack readiness.

So far this year, the Identity Theft Resource Center has confirmed 1,732 data breaches. The center also noted that the “continued rise of AI-powered phishing attacks” is becoming more sophisticated and challenging to detect. Some of the main industries plagued by these data breaches include financial services, health care, and professional services.

“It is the predictable consequence of a technology that has been deployed with breathtaking speed, often outpacing organizational discipline, regulatory provisions, and user vigilance. The fundamental design of most generative AI systems makes this outcome almost inevitable,” Danie Strachan, senior privacy counsel at VeraSafe, told The Epoch Times.

Because AI systems are designed to absorb an immense volume of information for training, this creates vulnerabilities.

“When employees, often with their best intentions, provide AI systems with sensitive business data—be it strategy documents, confidential client information, or internal financial records— that information is absorbed into a system over which the company has little to no control,” Strachan said.

This is especially true if consumer versions of these AI tools are used and protective measures are not enabled.

“It is very much similar to pinning your confidential files on a public noticeboard and hoping no one takes a copy,” Strachan said.

Multifaceted Threat

There are different ways someone’s personal data can end up in the wrong hands or be exposed by AI tools. Hacker-directed attacks and theft are well known, but another way this occurs is through what researchers call “privacy leakage.”

Publicly accessible Large Language Models (LLMs) are a common way for information to end up in a data breach or “leak.”

By Autumn Spredemann

Read Full Article on TheEpochTimes.com

The Epoch Times
The Epoch Timeshttps://www.theepochtimes.com/
Tired of biased news? The Epoch Times is truthful, factual news that other media outlets don't report. No spin. No agenda. Just honest journalism like it used to be.

Truth & Treason

World War II has long served as a compelling...

Is an American confusing England for Britain a problem?

The difficulty is when Americans try to engage with British politics, where they keep saying "England" rather than "Britain."

Charlie Kirk Assassination Links Back to Israel

Those who really know how to use the tools...

Lessons from the Cleavers: “Leave it to Beaver” Can Teach Us A Lot

A Gen-Zer reflects on growing up watching Leave It to Beaver, grateful for the shows timeless lessons and and the values it taught.

Why Democracy, not Caesar, is the answer to our problems

Caesar-style leadership wins quick public support but inevitably sparks passionate resistance, conflict, bloodshed, and lasting social destabilization.

Judge Widens Block on Shutdown-Related Layoffs to Cover More Federal Workers

Judge expanded her order blocking Trump admin mass layoffs during the govt shutdown, extending job protections to more workers.

When Government Could Reopen–Key Dates to Watch

Federal govt shutdown enters third week with Congress deadlocked and no negotiations in sight as key deadlines loom to test lawmakers’ resolve.

Reader Poll: Hold Financers, Organizers Accountable for Political Violence

Respondents to our reader poll think authorities should examine the funding and coordination behind political protests that turn violent.

‘No Kings’ Protests Kick Off Across US as GOP Denounces Rallies as ’Hate America’

Large-scale events, as part of the “No Kings” protests, are taking place in cities including Washington, New York, Boston, New Orleans, and Atlanta.

Army Corps of Engineers to Pause $11 Billion in Projects During Shutdown: Vought

Russ Vought, director of the White House’s OMB, has added to the growing pile of federal projects paused during the government shutdown.

Trump Signs Executive Order Putting New Restrictions on Federal Hiring

Trump signed an executive order directing federal agencies to restrict hiring, with exceptions for immigration, security, and political appointees.

Trump Says He Has Authorized Covert CIA Operations in Venezuela

President Trump authorized covert CIA operations in Venezuela, expanding U.S. assets there to increase pressure on President Nicolás Maduro’s regime.

Trump Posthumously Awards Charlie Kirk the Presidential Medal of Freedom

President Trump posthumously awarded Charlie Kirk the Presidential Medal of Freedom in the White House Rose Garden on Oct 14, Charlie's birthday.
spot_img

Related Articles

Popular Categories

MAGA Business Central