Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Vietnam Launches NDAChain, the National Blockchain Platform to Acceler...
Elitery a Pioneering MSSP Partner for Google Cloud’s “Indo...
Asia Pacific’s Mobile Sector Adds $950 Billion to GDP; On Track ...
PT Kereta Api Indonesia announces nationwide email and communication o...
Will governments assert stronger oversight over tech giants deemed as ...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      The rising threats and business risks of machine identities

      The rising threats and business risks of machine identities

      Tuesday, July 22, 2025, 12:19 PM Asia/Singapore | Features, IoT Security
    • Featured

      The future of AI-powered cybersecurity

      The future of AI-powered cybersecurity

      Monday, July 21, 2025, 4:04 PM Asia/Singapore | Features, Newsletter, Tips
    • Featured

      Transcending digital disruption: How financial institutions can integrate innovation, security, and agility

      Transcending digital disruption: How financial institutions can integrate innovation, security, and agility

      Thursday, July 10, 2025, 4:16 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      The rising threats and business risks of machine identities

      The rising threats and business risks of machine identities

      Tuesday, July 22, 2025, 12:19 PM Asia/Singapore | Features, IoT Security
    • Featured

      The future of AI-powered cybersecurity

      The future of AI-powered cybersecurity

      Monday, July 21, 2025, 4:04 PM Asia/Singapore | Features, Newsletter, Tips
    • Featured

      Transcending digital disruption: How financial institutions can integrate innovation, security, and agility

      Transcending digital disruption: How financial institutions can integrate innovation, security, and agility

      Thursday, July 10, 2025, 4:16 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
FeaturesTips

The future of AI-powered cybersecurity

By By Jayant Dave, CISO, Check Point Software Technologies, APAC | Monday, July 21, 2025, 4:04 PM Asia/Singapore

The future of AI-powered cybersecurity

Artificial intelligence, the unsung hero of modern cybersecurity, is working tirelessly to protect our digital world.

While AI’s creative capabilities are well-known, its most critical role is safeguarding data, privacy, and infrastructure from sophisticated cyberthreats.

As Albert Einstein wisely said, “We cannot solve our problems with the same thinking we used when we created them.” This wisdom is especially true in cybersecurity, where traditional defense methods struggle against rapidly evolving threats. AI emerges as the adaptive, intelligent solution needed to stay ahead of cybercriminals who are weaponizing AI.

Evolution of cyberthreats in the AI era

Cybersecurity faces unprecedented challenges as threat actors embrace AI to enhance their malicious capabilities. Whilst traditional controls and legacy security systems often fail against sophisticated attacks that exploit AI’s power. However, today we are seeing that the integration of AI by malicious actors has amplified the scale, speed, and sophistication of cyberattacks, creating a dynamic “AI arms race” in the digital realm.

The dark side of AI: new weapons for cybercriminals

Cybercriminals exploit mainstream AI platforms to develop specialized malicious variants, such as OnionGPT, WormGPT, GhostGPT, FraudGPT, and HackerGPT. These “dark LLMs” bypass ethical safeguards to generate convincing phishing emails, create malware, and craft sophisticated social engineering scripts.

AI-powered social engineering, including deepfake technology, enables attackers to create authentic textual materials, conduct automated chats, and impersonate others in real-time audio and video conferences.

Data poisoning: attacking AI at its source

An emerging threat involves LLM data poisoning, where attackers manipulate training datasets or real-time information to embed backdoors or malicious code. Once poisoned, AI models can replicate harmful content, posing serious security implications.

The Moscow-based disinformation network “Pravda” exemplifies this threat, producing millions of propaganda-laden articles designed to influence AI chatbot responses. This sophisticated attack successfully infected leading Western AI systems, causing them to echo false narratives approximately 33% of the time. 

AI as the ultimate cyber shield

To counter these sophisticated AI-powered attacks, AI itself emerges as the most valuable defensive tool. Through content analysis, AI systems identify behavioral patterns, anomalies, and language cues, enabling continuous learning and adaptation to new threats and yet provides more valuable security protection now than ever before.

AI’s effectiveness in threat blocking is transforming cyber security. Recent assessments demonstrate remarkable performance differences between AI-powered and traditional security solutions. In one recent assessment by Miercom, leading AI-driven platforms achieve impressive block rates:

  • 99.9% for malware detection
  • 99.74% for phishing attempts 
  • 98.0% for intrusion attempts

98.0% for intrusion attempts

These figures stand in stark contrast to competitors using traditional methods, with some achieving malware block rates as low as 67.1%, phishing at 55.87%, and intrusion attempts at 42.6%.

A great example is at Check Point, where our advanced AI systems ThreatCloud AI aggregate and analyze massive amounts of telemetry data daily, drawing intelligence from 150,000 connected networks, millions of endpoint devices, and dozens of external feeds. With over 50 engines packed with AI-based features, these systems detect and neutralize novel threats while continuously updating defenses with the latest Indicators of Compromise (IoCs).

AI as your security copilot

Beyond threat detection, AI significantly streamlines cyber security operations. Security administrators face increasing complexity from security policies, constant CVE alerts, and the need for unified security across hybrid IT environments spanning on-premises, cloud, remote, and mobile use cases.

AI copilots empower administrators to create, manage, and troubleshoot policies more efficiently. These intelligent assistants can quickly identify new vulnerabilities and recommend precise remediation steps across network, cloud, endpoint, browser, mobile device, and email security domains.

Recent assessments show that leading AI copilots demonstrate superior performance by providing clear, actionable guidance for remediation. This capability significantly reduces the time required for administrators to perform tasks while improving system usability.

In practical applications, AI excels at security policy analysis, automation, and active implementation. Top-performing solutions fully automate both analysis and implementation processes, contrasting sharply with competitors who struggle with identifying correct rule placement or lack direct policy modification capabilities.

For vulnerability assessment and remediation, advanced AI delivers complete and relevant responses, accurately verifying protection status and offering clear, actionable remediation guidance.

The shadow AI challenge

The widespread adoption of AI services within enterprise networks brings both opportunities and risks. Recent research data indicates that AI services are actively used in at least 51% of enterprise networks monthly, with ChatGPT leading adoption at 37%, followed by Microsoft Copilot at 27%, and writing assistants like Grammarly at 25%.

While AI adoption drives productivity gains, it introduces critical security concerns. Analysis reveals that 1 in every 80 prompts (1.25%) sent to Generative AI services from enterprise devices carries high risk of sensitive data leakage, with an additional 7.5% containing potentially sensitive information.

“Shadow AI applications”—unauthorized AI tools used by employees—create security vulnerabilities, compliance issues, and inconsistent data management. This phenomenon mirrors the “Shadow IT” challenge from previous technological shifts, where advancement outpaces organizational governance, creating new attack vectors.

Ethical considerations and societal impact

The rapid integration of AI into cyber security also raises significant ethical and societal concerns. These include:

  • Bias and fairness: AI algorithms trained on biased data can result in discriminatory outcomes, such as mistakenly flagging legitimate activity as malicious. This raises concerns about fairness and potential discrimination.
  • Transparency and explainability: Many AI algorithms, especially deep learning models, operate as “black boxes,” making their internal logic opaque and eroding trust in AI tools.
  • Privacy vs. security: AI’s data processing capabilities raise concerns about excessive surveillance and privacy infringement, balancing system safeguarding with preserving individual privacy rights.
  • Accountability and decision-making: Determining responsibility when AI systems autonomously make decisions can be complex, impacting cyber security professionals, developers, and organizations.
  • Job displacement: The automation of routine threat detection by AI may lead to job displacement in the cyber security industry, requiring retraining and reskilling.

Responsible AI development and deployment address ethical dilemmas. Strategies include clear ethical frameworks, diverse stakeholders, diverse training data, human oversight, and transparent decision-making.

The regulatory landscape for AI in cybersecurity

The fragmented and rapidly evolving global regulatory landscape for AI in cyber security necessitates governance frameworks to ensure its safe, secure, and ethical use. Risk-based frameworks are a prominent trend in AI regulation, classifying AI systems based on their potential impact and applying proportionate regulatory measures.

For example, the European Union’s AI Act, set to be fully implemented in 2025, is a comprehensive example of a risk-based regulatory model. Non-compliance can lead to significant fines.

AI regulation is growing due to its societal impact, necessitating adaptable governance frameworks.

The future of AI-powered cybersecurity

The parallel acceleration of AI adoption by both offensive and defensive forces creates an “AI arms race” in cyber security. This dynamic makes continuous investment in AI-powered defenses not merely an option but a strategic imperative to maintain security parity.

Advanced R&D: AI significantly advances cybersecurity research by enhancing detection mechanisms and making complex systems more accessible. It improves Advanced Persistent Threat (APT) hunting through pattern recognition at scale, efficient extraction of Tactics, Techniques, and Procedures (TTPs), and advanced correlation and attribution capabilities.

In vulnerability research, AI streamlines tasks, enables autonomous agent frameworks for exploit development, and aids in identifying logic flaws. For malware analysis, Large Language Models are being explored to automatically decompile code and assess its maliciousness.

Generative AI for security operations: Expert generative AI assistants reduce time needed for common security tasks and automate complex activities. These systems understand customer policies, access rules, objects, logs, and relevant product documentation to deliver contextualized, comprehensive answers.

Their capabilities include accelerating security administration through policy creation and implementation, increasing security effectiveness by applying new threat prevention controls, and improving incident mitigation and response through advanced threat hunting and analysis.

Building a secure AI-powered future

Artificial Intelligence is evident as a fundamental pillar of modern cyber security. From theoretical concept to practical tool, AI enhances defense, detection, and operational efficiency across the digital landscape.

AI’s strength lies in its continuous learning, adaptation, and innovation, creating a symbiotic relationship with human security experts. AI augments human capabilities, freeing experts for strategic thinking while efficiently handling everyday threats.

Organizations must evaluate AI capabilities in practical security operations beyond superficial claims. The varying degrees of AI compliance and functionality across vendors emphasize the importance of selecting intelligent, seamlessly integrated solutions that provide tangible value in complex security environments.

AI promises a future where digital interactions are more secure, resilient, and trustworthy. Its continuous evolution, combined with strategic deployment and proper governance, will create a safer digital world. AI truly serves as the unsung hero, ensuring our digital peace of mind in an increasingly connected world.



Share:

PreviousWhat is the strategic significance of Singapore publicly naming UNC3886?
NextDCA Opens Today to Strengthen Asia’s Data Centre Network

Related Posts

Found and fixed: vulnerability in remote-working gateway Apache Guacamole

Found and fixed: vulnerability in remote-working gateway Apache Guacamole

Tuesday, July 14, 2020

With DX well under way, the world is shooting for digital resilience

With DX well under way, the world is shooting for digital resilience

Monday, June 13, 2022

New FIDO updates and UX specifications set to encourage a passwordless future

New FIDO updates and UX specifications set to encourage a passwordless future

Monday, June 28, 2021

Is 2024 shaping up to global expectations of increased cyber warfare?

Is 2024 shaping up to global expectations of increased cyber warfare?

Friday, July 19, 2024

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more
  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.