AI Accelerates Hacking: New Research Reveals Faster Breaches and Shifting Cybercrime Tactics

Curated by THEOUTPOST

On Thu, 27 Feb, 12:05 AM UTC

2 Sources

Share

Recent research by ReliaQuest highlights how AI is transforming cybercrime, enabling hackers to breach systems faster and shift tactics from ransomware to data theft. The study also reveals emerging threats like voice phishing and emphasizes the need for enhanced cybersecurity measures.

AI Accelerates Hacking Speed and Efficiency

Recent research by ReliaQuest has revealed a significant shift in the cybercrime landscape, largely driven by the adoption of artificial intelligence (AI) by hackers. The study found that cybercriminals are now able to breach systems faster than ever before, with the average time between initial access and lateral movement reduced to just 48 minutes 1.

Shift from Ransomware to Data Theft

The research indicates a notable change in hacker tactics, moving away from ransomware attacks towards direct data theft. According to the report, 80% of all breaches now involve data exfiltration, while only 20% include encryption 1. This shift suggests that hackers are finding it more profitable to sell stolen data rather than demand ransoms, as fewer than half of ransomware incidents result in payment, and only about 7% of those who pay ever fully recover their information 2.

Emerging Threats and Attack Vectors

The study highlights several evolving attack methods:

  1. Phishing remains the top initial access technique, with 30% of these attacks including credential harvesting 1.
  2. Voice phishing, or "vishing," now accounts for 14% of breaches, particularly targeting the manufacturing sector due to frequent IT interactions and lenient help-desk policies 12.
  3. AI-powered attacks enable hackers to steal data in as little as four hours and encrypt it within six hours 2.

Implications for Cybersecurity Strategies

The findings underscore the need for businesses to reassess their cybersecurity priorities:

  1. Focus on protecting data privacy and managing reputational risks, rather than solely on restoring encrypted systems 1.
  2. Implement defenses to detect and prevent exfiltration attempts 1.
  3. Develop playbooks that prioritize business continuity and resilience against evolving ransomware tactics 1.
  4. Incorporate AI and automation into security operations to improve threat detection and response 2.
  5. Strengthen defenses around common entry points and eliminate blind spots in security infrastructure 2.

Positive Developments in Cybersecurity

Despite the challenges, the report also notes progress in defensive capabilities. ReliaQuest claims that by leveraging AI and automation, they have enabled customers to achieve threat containment in as little as three minutes 2. This highlights the potential for AI to enhance cybersecurity measures as well as pose threats.

As the cybercrime landscape continues to evolve, organizations must remain vigilant and adaptive in their approach to security. The integration of AI in both offensive and defensive cybersecurity operations marks a new era in the ongoing battle against digital threats.

Continue Reading
AI-Powered Cybersecurity: The Double-Edged Sword in the

AI-Powered Cybersecurity: The Double-Edged Sword in the Digital Arms Race

As AI transforms the cybersecurity landscape, businesses are increasingly adopting AI-powered defenses to combat sophisticated AI-driven threats, highlighting both the risks and opportunities in this technological arms race.

CXOToday.com logoInc.com logoPYMNTS.com logo

3 Sources

CXOToday.com logoInc.com logoPYMNTS.com logo

3 Sources

AI-Powered Cybersecurity: The Double-Edged Sword of

AI-Powered Cybersecurity: The Double-Edged Sword of Innovation

As AI revolutionizes cybersecurity, it presents both unprecedented threats and powerful defensive tools. This story explores the evolving landscape of AI-based attacks and the strategies businesses and cybersecurity professionals are adopting to counter them.

World Economic Forum logoTechRadar logo

2 Sources

World Economic Forum logoTechRadar logo

2 Sources

AI-Powered Social Engineering: The Evolution of Cyber

AI-Powered Social Engineering: The Evolution of Cyber Threats in 2025

As AI technology advances, cybercriminals are leveraging it to create more sophisticated and personalized social engineering attacks, posing significant challenges for organizations, especially SMEs and supply chains.

The Hacker News logoTechRadar logo

3 Sources

The Hacker News logoTechRadar logo

3 Sources

AI-Powered Cybersecurity: Combating Advanced Threats in

AI-Powered Cybersecurity: Combating Advanced Threats in 2025 and Beyond

As AI enhances cyber threats, organizations must adopt AI-driven security measures to stay ahead. Experts recommend implementing zero-trust architecture, leveraging AI for defense, and addressing human factors to combat sophisticated AI-powered attacks.

ZDNet logoVentureBeat logo

4 Sources

ZDNet logoVentureBeat logo

4 Sources

AI-Powered Cybercrime Escalates: Mac Users Face

AI-Powered Cybercrime Escalates: Mac Users Face Unprecedented Threats in 2025

As AI technology advances, cybercriminals are leveraging it to launch more sophisticated attacks on macOS, posing significant challenges for cybersecurity professionals and individual users alike.

AppleInsider logoMacworld logo

2 Sources

AppleInsider logoMacworld logo

2 Sources

TheOutpost.ai

Your one-stop AI hub

The Outpost is a comprehensive collection of curated artificial intelligence software tools that cater to the needs of small business owners, bloggers, artists, musicians, entrepreneurs, marketers, writers, and researchers.

© 2025 TheOutpost.AI All rights reserved