The IT security company Check Point Software has launched its first edition of AI Security Report. The report includes an in-depth analysis of how cybercriminals use AI to carry out cyberattacks and also insights into how businesses can best counter these threats.
As AI continues to reshape industries and become an increasingly integrated part of businesses, the lines between what is true and false in the digital world are blurring. The report shows that a majority (51% of %) of companies use AI in their daily operations. Cybercriminals leverages generative AI and large language models to undermine trust in digital identity. What you see, hear, or read can no longer be taken for granted as truth in today’s cyber landscape. AI-powered impersonations have the ability to bypass even the most sophisticated verification systems – making us all potential targets.
– Cybercriminals have quickly learned how to use AI and it is already changing the threat landscape, says Mats Ekdahl, security expert at Check Point Software. Today, security teams must adopt the same pace as cybercriminals by integrating AI into their security systems. This report highlights not only risks, but also best practices for securing AI environments.
Key insights from the report:
- AI-enhanced imitations and manipulation
Cybercriminals uses AI to create realistic, digital identities, phishing emails in real time, and blurs the lines between what is real and what is not. - AI-generated malware
Cybercriminals use AI to create and optimize malware, automate DDOS campaigns and refine stolen login credentials. - AI use and risk of leaks
According to an analysis of data collected from Checkpoints GenAI Protect, shows that 1 in 80 prompts are at high risk of leaking sensitive information. Analysis shows that 7.5 percent of all prompts, (approximately 1 in 13) contain sensitive information, which poses challenges related to security and data integrity. Understanding these risks is more important than ever as the use of AI becomes increasingly common. - Detect threats through AI
Leverage AI to detect AI-generated threats – including phishing and deepfakes. - Improved identity verification
Go beyond traditional methods of verification and implement multi-level identity checks that take into account AI-powered imitations of text, voice, and video.
Download the full report here.
Learn more on Check Point's blog: https://blog.checkpoint.com/research/ai-security-report-2025-understanding-threats-and-building-smarter-defenses/