Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Posted on October 1, 2025October 1, 2025 By CWS

Oct 01, 2025The Hacker NewsAttack Floor / Synthetic Intelligence
Bitdefender’s 2025 Cybersecurity Evaluation Report paints a sobering image of as we speak’s cyber protection panorama: mounting stress to stay silent after breaches, a spot between management and frontline groups, and a rising urgency to shrink the enterprise assault floor.
The annual analysis combines insights from over 1,200 IT and safety professionals throughout six nations, together with an evaluation of 700,000 cyber incidents by Bitdefender Labs. The outcomes reveal exhausting truths about how organizations are grappling with threats in an more and more complicated surroundings.
Breaches Swept Below the Rug
This yr’s findings highlight a disturbing pattern: 58% of safety professionals had been advised to maintain a breach confidential, even once they believed disclosure was crucial. That is a 38% soar since 2023, suggesting extra organizations could also be prioritizing optics over transparency.
The stress is particularly acute for CISOs and CIOs, who report larger ranges of expectation to stay quiet in comparison with frontline employees. Such secrecy dangers undermining stakeholder belief, compliance obligations, and long-term resilience.
Residing-Off-the-Land Assaults Drive Assault Floor Focus
Bitdefender analyzed 700,000 high-severity assaults and located that 84% of high-severity assaults now now leverage professional instruments already current inside environments — so-called Residing Off the Land (LOTL) methods. These ways bypass conventional defenses, function invisibly, and are more and more utilized in focused intrusions.
In response, 68% of surveyed organizations listing assault floor discount as a high precedence, with the U.S. (75%) and Singapore (71%) main adoption. Proactive hardening steps — disabling pointless companies, eliminating unused functions, and decreasing lateral motion paths — are shortly shifting from greatest practices to enterprise imperatives.
AI: Notion vs. Actuality
AI looms massive within the minds of defenders, however perceptions do not at all times align with on-the-ground actuality.

67% consider AI-driven assaults are rising
58% cite AI-powered malware as their high concern

But, the report exhibits that whereas AI-enhanced assaults are rising, fears could also be outpacing precise prevalence. This hole underscores the necessity for a balanced method: put together for AI threats with out dropping sight of as we speak’s highlights the necessity for a balanced method: put together for AI threats with out dropping sight of prevalent adversary ways.
Management Disconnect Dangers Slowdowns
Maybe most regarding is the misalignment between executives and operational groups:

45% of C-level executives report being “very assured” in managing cyber danger
Solely 19% of mid-level managers agree

Strategic focus areas additionally diverge: executives prioritize AI adoption, whereas frontline managers place extra urgency on cloud safety and identification administration. These disconnects can sluggish progress, dilute sources, and create blind spots that attackers exploit.

The Highway Forward
The findings converge on one message: cyber resilience calls for preemptive methods. Which means:

Actively decreasing assault surfaces
Streamlining safety instruments and complexity
Addressing crew burnout and the abilities hole
Closing the notion variations between management and the front-line

To discover extra findings, learn the Bitdefender 2025 Cybersecurity Evaluation report.

Discovered this text attention-grabbing? This text is a contributed piece from one in all our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attack, Breaches, Growing, Hidden, Misperceptions, Rising, Surfaces

Post navigation

Previous Post: Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
Next Post: NIST Publishes Guide for Protecting ICS Against USB-Borne Threats

Related Posts

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code The Hacker News
U.S. DoJ Seizes Fraud Domain Behind .6 Million Bank Account Takeover Scheme U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme The Hacker News
U.S. Sanctions Funnull for 0M Romance Baiting Scams Tied to Crypto Fraud U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud The Hacker News
SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats The Hacker News
Scattered Spider Hacker Gets 10 Years, M Restitution for SIM Swapping Crypto Theft Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News