{"id":61056,"date":"2025-08-05T21:05:08","date_gmt":"2025-08-05T21:05:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/61056\/"},"modified":"2025-08-05T21:05:08","modified_gmt":"2025-08-05T21:05:08","slug":"lack-of-ai-oversight-increases-data-breach-risks","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/61056\/","title":{"rendered":"Lack Of AI Oversight Increases Data Breach Risks"},"content":{"rendered":"<p>The Wiretap is your weekly digest of cybersecurity, internet privacy and surveillance news. To get it in your inbox, <a href=\"https:\/\/www.forbes.com\/newsletter\/thewiretap\/#194e252376cf\" target=\"_self\" class=\"color-link\" title=\"https:\/\/www.forbes.com\/newsletter\/thewiretap\/#194e252376cf\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/newsletter\/thewiretap\/#194e252376cf\" aria-label=\"subscribe here\" rel=\"nofollow noopener\">subscribe here<\/a>.<\/p>\n<p>As more companies adopt AI without oversight, the more they risk their own security. That\u2019s one of the implications of IBM\u2019s <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.ibm.com\/reports\/data-breach\" data-ga-track=\"ExternalLink:https:\/\/www.ibm.com\/reports\/data-breach\" aria-label=\"annual report\">annual report<\/a> on data breaches, which looks at the impact of AI for the first time this year. The tech giant found that 16% of breaches in the past year involved the use of AI tools. Additionally, 20% of organizations reported that they\u2019d experienced a breach due to an employee using unsanctioned AI tools on company computers.Of the organizations that saw AI-related breaches, 97% didn\u2019t have any access controls in place and 63% didn\u2019t have an AI governance policy.<\/p>\n<p>&#8220;The data shows that a gap between AI adoption and oversight already exists, and threat actors are starting to exploit it,&#8221; Suja Viswesan, IBM\u2019s vice president of security <a href=\"https:\/\/newsroom.ibm.com\/2025-07-30-ibm-report-13-of-organizations-reported-breaches-of-ai-models-or-applications,-97-of-which-reported-lacking-proper-ai-access-controls\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/newsroom.ibm.com\/2025-07-30-ibm-report-13-of-organizations-reported-breaches-of-ai-models-or-applications,-97-of-which-reported-lacking-proper-ai-access-controls\" data-ga-track=\"ExternalLink:https:\/\/newsroom.ibm.com\/2025-07-30-ibm-report-13-of-organizations-reported-breaches-of-ai-models-or-applications,-97-of-which-reported-lacking-proper-ai-access-controls\" aria-label=\"said in a statement\">said in a statement<\/a>.<\/p>\n<p>The stakes are high: In the United States, the average cost per data breach has reached a record $10.22 million\u2013even as the average cost globally has declined to $4.44 million. Healthcare is the most expensive sector when it comes to a data breach: the average incident costs about $7.42 million, though that is a big decline from 2024\u2019s $9.77 million figure.<\/p>\n<p>Companies are also getting better at managing data breaches: the average lifecycle of a data breach incident\u2013from discovery to recovery\u2013dropped to 241 days, compared to last year\u2019s 258 and the 280 days IBM identified in 2020. This is in part because more companies are discovering breaches on their own rather than hearing it first from their attackers\u2013in part, because more companies are using AI to monitor their networks and keep them secure.<\/p>\n<p>Got a tip on surveillance or cybercrime? Get me on Signal at <a href=\"https:\/\/tel:+19295127964\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link invalid-url\" title=\"https:\/\/tel:+19295127964\" data-ga-track=\"ExternalLink:https:\/\/tel:+19295127964\" aria-label=\"+1 929-512-7964\">+1 929-512-7964<\/a>.<\/p>\n<p>THE BIG STORY:<br \/>\nHow Scrubbing Your Social Media Could Backfire\u2013And Even Hurt Your Job Prospects<\/p>\n<p>Illustration by Samantha Lee for Forbes; Photos by EasyBuy4u\/Getty Images; Mark Mawson\/Getty Images<\/p>\n<p>For college students looking for jobs or internships, the standard advice about social media has been this: Build up your professional profile on LinkedIn, but scrub other social media accounts (the ones displaying your political opinions or party antics) or just make them private.<\/p>\n<p>Yet recent developments could make that playbook obsolete as students face a potential Catch-22: What they&#8217;ve said on social media can hurt them when they are job hunting. But students erasing or cloaking their public online presence could also backfire in less predictable ways.<\/p>\n<p>Some prospective employers are adopting AI tools to screen social media to determine if applicants are real, because AI has led to an explosion of fake (or stolen) identities by scammers. Those tools screen for things like age of social accounts, posting and liking activity as well as LinkedIn connections, which makes scrubbing your profile a riskier proposition.<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/mariagraciasantillanalinares\/2025\/08\/02\/how-scrubbing-your-social-media-could-backfire-and-even-hurt-your-job-prospects\/\" target=\"_self\" class=\"color-link\" title=\"https:\/\/www.forbes.com\/sites\/mariagraciasantillanalinares\/2025\/08\/02\/how-scrubbing-your-social-media-could-backfire-and-even-hurt-your-job-prospects\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/mariagraciasantillanalinares\/2025\/08\/02\/how-scrubbing-your-social-media-could-backfire-and-even-hurt-your-job-prospects\/\" aria-label=\"Read the whole story at\" rel=\"nofollow noopener\">Read the whole story at <\/a><a href=\"https:\/\/www.forbes.com\/sites\/mariagraciasantillanalinares\/2025\/08\/02\/how-scrubbing-your-social-media-could-backfire-and-even-hurt-your-job-prospects\/\" target=\"_self\" class=\"color-link\" title=\"https:\/\/www.forbes.com\/sites\/mariagraciasantillanalinares\/2025\/08\/02\/how-scrubbing-your-social-media-could-backfire-and-even-hurt-your-job-prospects\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/mariagraciasantillanalinares\/2025\/08\/02\/how-scrubbing-your-social-media-could-backfire-and-even-hurt-your-job-prospects\/\" aria-label=\"Forbes\" rel=\"nofollow noopener\">Forbes <\/a><\/p>\n<p>Stories You Have To Read Today<\/p>\n<p>Over 300 companies have been infiltrated by online scammers from North Korea pretending to be working remotely from elsewhere, <a href=\"https:\/\/www.pcmag.com\/news\/is-your-coworker-a-north-korean-remote-scammers-infiltrate-300-plus-companies\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.pcmag.com\/news\/is-your-coworker-a-north-korean-remote-scammers-infiltrate-300-plus-companies\" data-ga-track=\"ExternalLink:https:\/\/www.pcmag.com\/news\/is-your-coworker-a-north-korean-remote-scammers-infiltrate-300-plus-companies\" aria-label=\"according to a new report\">according to a new report<\/a> from Crowdstrike.<\/p>\n<p>AI search engine Perplexity is obscuring the identity of its crawlers to sidestep websites that block them, per <a href=\"https:\/\/blog.cloudflare.com\/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/blog.cloudflare.com\/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives\/\" data-ga-track=\"ExternalLink:https:\/\/blog.cloudflare.com\/perplexity-is-using-stealth-undeclared-crawlers-to-evade-website-no-crawl-directives\/\" aria-label=\"a new Cloudflare report\"> a new Cloudflare report<\/a>.<\/p>\n<p>The Senate confirmed Sean Cairncross, a Republican political operative with no professional cybersecurity experience, <a href=\"https:\/\/www.cybersecuritydive.com\/news\/sean-cairncross-national-cyber-director-senate-confirmation\/756649\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.cybersecuritydive.com\/news\/sean-cairncross-national-cyber-director-senate-confirmation\/756649\/\" data-ga-track=\"ExternalLink:https:\/\/www.cybersecuritydive.com\/news\/sean-cairncross-national-cyber-director-senate-confirmation\/756649\/\" aria-label=\"as the new head\">as the new head<\/a> of the Office of the National Cyber Director, which advises the President on cyber defense issues.<\/p>\n<p>Hackers backed by the Russian government are <a href=\"https:\/\/arstechnica.com\/information-technology\/2025\/07\/microsoft-catches-russian-hackers-targeting-foreign-embassies\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/arstechnica.com\/information-technology\/2025\/07\/microsoft-catches-russian-hackers-targeting-foreign-embassies\/\" data-ga-track=\"ExternalLink:https:\/\/arstechnica.com\/information-technology\/2025\/07\/microsoft-catches-russian-hackers-targeting-foreign-embassies\/\" aria-label=\"attempting to break into systems\">attempting to break into systems<\/a> at foreign embassies in Moscow, Microsoft has warned.<\/p>\n<p>Senators Marsha Blackburn (R-Tenn.) and Gary Peters (D-Mich.) have <a href=\"https:\/\/www.peters.senate.gov\/newsroom\/press-releases\/peters-and-blackburn-introduce-bipartisan-bill-to-create-a-national-quantum-computing-cybersecurity-strategy\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/www.peters.senate.gov\/newsroom\/press-releases\/peters-and-blackburn-introduce-bipartisan-bill-to-create-a-national-quantum-computing-cybersecurity-strategy\" data-ga-track=\"ExternalLink:https:\/\/www.peters.senate.gov\/newsroom\/press-releases\/peters-and-blackburn-introduce-bipartisan-bill-to-create-a-national-quantum-computing-cybersecurity-strategy\" aria-label=\"introduced legislation\">introduced legislation<\/a> to develop a national cybersecurity strategy for protecting federal systems from quantum computers.<\/p>\n<p>Winner of the Week<\/p>\n<p>Cybersecurity researchers stand to win tens of thousands of dollars if they can find security issues in popular software at the Pwn2Own contest being held this October in Ireland. The biggest prize? Meta announced last week that it is <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/08\/01\/whatsapp-hackers-offered-1-million-for-new-0-click-exploit\/\" target=\"_self\" class=\"color-link\" title=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/08\/01\/whatsapp-hackers-offered-1-million-for-new-0-click-exploit\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/08\/01\/whatsapp-hackers-offered-1-million-for-new-0-click-exploit\/\" aria-label=\"offering $1 million\" rel=\"nofollow noopener\">offering $1 million<\/a> to any team that can find a 0-day exploit in WhatsApp.<\/p>\n<p>Loser of the Week<\/p>\n<p>Security researchers found <a href=\"https:\/\/thehackernews.com\/2025\/08\/cursor-ai-code-editor-vulnerability.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"color-link\" title=\"https:\/\/thehackernews.com\/2025\/08\/cursor-ai-code-editor-vulnerability.html\" data-ga-track=\"ExternalLink:https:\/\/thehackernews.com\/2025\/08\/cursor-ai-code-editor-vulnerability.html\" aria-label=\"major security vulnerabilities\">major security vulnerabilities<\/a> in AI-coding tool Cursor which would allow hackers to remotely execute malicious code and bypass other protections. The vulnerabilities were patched in the latest release.<\/p>\n<p>More On Forbes<a class=\"embed-base color-body color-body-border link-embed embed-870\" href=\"https:\/\/www.forbes.com\/sites\/johnhyatt\/2025\/08\/05\/meet-the-other-billionaire-behind-skydances-paramount-deal\/\" target=\"_blank\" aria-label=\"Meet The Other Billionaire Behind Skydance\u2019s Paramount Deal\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/johnhyatt\/2025\/08\/05\/meet-the-other-billionaire-behind-skydances-paramount-deal\/\" rel=\"nofollow noopener\">ForbesMeet The Other Billionaire Behind Skydance\u2019s Paramount DealBy John Hyatt<\/a><a class=\"embed-base color-body color-body-border link-embed embed-873\" href=\"https:\/\/www.forbes.com\/sites\/brandonkochkodin\/2025\/07\/31\/small-business-survive-google-search-traffic-crash\/\" target=\"_blank\" aria-label=\"How Small Business Can Survive Google\u2019s AI Overview\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/brandonkochkodin\/2025\/07\/31\/small-business-survive-google-search-traffic-crash\/\" rel=\"nofollow noopener\">ForbesHow Small Business Can Survive Google\u2019s AI OverviewBy Brandon Kochkodin<\/a><a class=\"embed-base color-body color-body-border link-embed embed-876\" href=\"https:\/\/www.forbes.com\/sites\/baldwin\/2025\/08\/01\/timberland-real-estate-inflation-hedge-investment-trust\/\" target=\"_blank\" aria-label=\"Want To Hedge Against Inflation? Buy A Forest\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/baldwin\/2025\/08\/01\/timberland-real-estate-inflation-hedge-investment-trust\/\" rel=\"nofollow noopener\">ForbesWant To Hedge Against Inflation? Buy A ForestBy William Baldwin<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"The Wiretap is your weekly digest of cybersecurity, internet privacy and surveillance news. To get it in your&hellip;\n","protected":false},"author":2,"featured_media":61057,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[45529,182,181,507,34477,5401,168,4002,558,1281,7270,108,74,24644],"class_list":{"0":"post-61056","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-0-day","9":"tag-ai","10":"tag-artificial-intelligence","11":"tag-artificialintelligence","12":"tag-cyber","13":"tag-data-breach","14":"tag-google","15":"tag-hacking","16":"tag-ibm","17":"tag-microsoft","18":"tag-security","19":"tag-social-media","20":"tag-technology","21":"tag-vulnerability"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/61056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=61056"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/61056\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/61057"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=61056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=61056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=61056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}