Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Posted on October 1, 2025October 1, 2025 By CWS

Oct 01, 2025The Hacker NewsAttack Floor / Synthetic Intelligence
Bitdefender’s 2025 Cybersecurity Evaluation Report paints a sobering image of as we speak’s cyber protection panorama: mounting stress to stay silent after breaches, a spot between management and frontline groups, and a rising urgency to shrink the enterprise assault floor.
The annual analysis combines insights from over 1,200 IT and safety professionals throughout six nations, together with an evaluation of 700,000 cyber incidents by Bitdefender Labs. The outcomes reveal exhausting truths about how organizations are grappling with threats in an more and more complicated surroundings.
Breaches Swept Below the Rug
This yr’s findings highlight a disturbing pattern: 58% of safety professionals had been advised to maintain a breach confidential, even once they believed disclosure was crucial. That is a 38% soar since 2023, suggesting extra organizations could also be prioritizing optics over transparency.
The stress is particularly acute for CISOs and CIOs, who report larger ranges of expectation to stay quiet in comparison with frontline employees. Such secrecy dangers undermining stakeholder belief, compliance obligations, and long-term resilience.
Residing-Off-the-Land Assaults Drive Assault Floor Focus
Bitdefender analyzed 700,000 high-severity assaults and located that 84% of high-severity assaults now now leverage professional instruments already current inside environments — so-called Residing Off the Land (LOTL) methods. These ways bypass conventional defenses, function invisibly, and are more and more utilized in focused intrusions.
In response, 68% of surveyed organizations listing assault floor discount as a high precedence, with the U.S. (75%) and Singapore (71%) main adoption. Proactive hardening steps — disabling pointless companies, eliminating unused functions, and decreasing lateral motion paths — are shortly shifting from greatest practices to enterprise imperatives.
AI: Notion vs. Actuality
AI looms massive within the minds of defenders, however perceptions do not at all times align with on-the-ground actuality.

67% consider AI-driven assaults are rising
58% cite AI-powered malware as their high concern

But, the report exhibits that whereas AI-enhanced assaults are rising, fears could also be outpacing precise prevalence. This hole underscores the necessity for a balanced method: put together for AI threats with out dropping sight of as we speak’s highlights the necessity for a balanced method: put together for AI threats with out dropping sight of prevalent adversary ways.
Management Disconnect Dangers Slowdowns
Maybe most regarding is the misalignment between executives and operational groups:

45% of C-level executives report being “very assured” in managing cyber danger
Solely 19% of mid-level managers agree

Strategic focus areas additionally diverge: executives prioritize AI adoption, whereas frontline managers place extra urgency on cloud safety and identification administration. These disconnects can sluggish progress, dilute sources, and create blind spots that attackers exploit.

The Highway Forward
The findings converge on one message: cyber resilience calls for preemptive methods. Which means:

Actively decreasing assault surfaces
Streamlining safety instruments and complexity
Addressing crew burnout and the abilities hole
Closing the notion variations between management and the front-line

To discover extra findings, learn the Bitdefender 2025 Cybersecurity Evaluation report.

Discovered this text attention-grabbing? This text is a contributed piece from one in all our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attack, Breaches, Growing, Hidden, Misperceptions, Rising, Surfaces

Post navigation

Previous Post: Descope Raises $35 Million in Seed Round Extension
Next Post: NIST Publishes Guide for Protecting ICS Against USB-Borne Threats

Related Posts

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
5 Ways Identity-based Attacks Are Breaching Retail The Hacker News
Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover The Hacker News
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately The Hacker News
Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News