By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds
News

Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds

News Room
Last updated: 2025/10/31 at 4:05 PM
News Room Published 31 October 2025
Share
Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds
SHARE

The Cloud Native Computing Foundation have published an analysis of modern cybersecurity practices, finding that attacks using Artificial Intelligence are now a significant threat. The report highlights the criticality for organisations to adopt multi-layered defence strategies as artificial intelligence transforms both the threat landscape and the protective measures available to businesses.

The report explains that AI-powered attacks have evolved past traditional phishing attempts into sophisticated and targeted campaigns that exploit human trust. In 2023, Darktrace reported a 135% increase in social engineering attacks, with hackers using cracking tools like wormGPT and FraudGPT to create highly personalised and deceptive attack campaigns against organisations that avoid conventional security filters.

Cybersecurity is no longer just an IT concern, but rather a boardroom priority. With AI-driven cyber threats no longer limited to generic phishing emails or outdated malware, today’s attacks are smarter, more precise, and alarmingly convincing.

The analysis emphasises that relying on a single security tool isn’t enough any more. Those organisations fighting these threats successfully need integrated systems which combine firewalls, encryption, and advanced threat detection. A post by Talion shows AI also being used to fight threats; finding that in the United States, 73% of companies have implemented AI to some extent, with 54% adopting generative AI, creating both opportunities and vulnerabilities that require constant monitoring.

Intrusion Detection Systems form a cornerstone of modern cybersecurity architecture, according to the CNCF report. Cloud-native solutions such as AWS GuardDuty, Microsoft Defender for Cloud, and Google Cloud IDS provide real-time monitoring capabilities for organisations operating in cloud environments. Organisations with fully remote or hybrid workforces are using Cloud Access Security Brokers (CASBs), which provide visibility into user activity and protect against OAuth application exploits.

The report warns companies not to rely too much on traditional signature-based detection methods. The 2017 BadRabbit ransomware attack showed how sophisticated threats can bypass systems that only recognise known attack patterns, with the report citing a case where what appeared to be a Flash Player update actually triggered some ransomware that encrypted files and demanded a Bitcoin ransom.

Security is about layering, not luck.

The report advocates for hybrid approaches combining signature-based and anomaly-based detection, by advocating for IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) use. It explains how signature-based systems are effective at identifying documented threats and work well for organisations with predictable traffic patterns. In contrast, anomaly-based systems help detect unusual behaviour patterns, and thus are particularly valuable for organisations in sectors that handle sensitive data. A report by IDS and IPS provider CyberMaxx agreed with this, finding that traditional security tools are effective when properly configured and integrated with other technologies.

Intrusion Prevention Systems complement detection capabilities by actively blocking threats rather than simply alerting security teams. According to the CNCF report, healthcare technology provider Omada Health uses Threat Stack’s Cloud Security Platform to combine real-time intrusion detection with proactive threat prevention. This integration saved their security team over two hours of analysis time per day, and helped them with regulatory compliance.

The report highlights that endpoint security has become a significant issue since the COVID-19 pandemic, with many more potential attack vectors emerging, particularly with the shift to remote work. Cloud-native solutions for this use machine learning to analyse files, network traffic, and user behaviour without requiring constant signature updates or on-premise infrastructure. During the 2017 WannaCry ransomware outbreak, which exploited a Windows vulnerability affecting businesses globally, CrowdStrike Falcon’s machine learning capabilities identified unusual behaviour patterns, isolated infected endpoints, and prevented further spread.

The financial costs of cyber incidents have escalated substantially. A Harvard report on cybersecurity and artificial intelligence found that ransomware breaches cost an average of $4.91 million to fix, with any ransom payments on top of that. Business email compromises, accounting for 10% of data breaches, cost nearly $4.9 million to remediate, with annual aggregate costs potentially reaching tens of billions of dollars. Stolen credentials, responsible for 16% of data breaches, cost an average of just over $4.8 million.

User Behaviour Analytics addresses insider threats by establishing baselines of regular employee activity and then detecting deviations from these, such as unusual access times or locations. The CNCF report quotes successful detection from tools such as Splunk UBA and DarkTrace in identifying behavioural anomalies that potentially pose threats.

The Talion report acknowledges concerns about AI in cybersecurity, including vulnerability to AI-powered attacks and ethical considerations around data handling and surveillance. It advocates for balance, advising that organisations combine AI-driven automation with human expertise to avoid complacency and the false sense of security that can result from fully automated systems.

The Harvard report suggests that AI deployment across operational workflows focused on attack prevention can substantially reduce breach costs. Organisations using AI extensively averaged $2.2 million less in breach costs compared with those not deploying such technologies, representing a 46% cost saving.

The CNCF report concludes by stating that effective cybersecurity requires thoughtful investment in technology, training, and infrastructure to address emerging and increasingly AI-powered threats.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article College Football Playoff 2025 projections: The most likely bracket with Week 10 underway
Next Article Christian Influencers Are Throwing Their Hatch Clocks in the Trash Christian Influencers Are Throwing Their Hatch Clocks in the Trash
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Today's NYT Mini Crossword Answers for Nov. 1 – CNET
Today's NYT Mini Crossword Answers for Nov. 1 – CNET
News
Tesla Model Y L gains V2L capabilities with software update
Tesla Model Y L gains V2L capabilities with software update
News
I Love LA, A-Rod, Selfies: What’s New to Watch on HBO Max the Week of October 31, 2025
I Love LA, A-Rod, Selfies: What’s New to Watch on HBO Max the Week of October 31, 2025
News
Grammarly rebrands as Superhuman as it doubles down on AI
Grammarly rebrands as Superhuman as it doubles down on AI
News

You Might also Like

Today's NYT Mini Crossword Answers for Nov. 1 – CNET
News

Today's NYT Mini Crossword Answers for Nov. 1 – CNET

2 Min Read
Tesla Model Y L gains V2L capabilities with software update
News

Tesla Model Y L gains V2L capabilities with software update

2 Min Read
I Love LA, A-Rod, Selfies: What’s New to Watch on HBO Max the Week of October 31, 2025
News

I Love LA, A-Rod, Selfies: What’s New to Watch on HBO Max the Week of October 31, 2025

6 Min Read
Grammarly rebrands as Superhuman as it doubles down on AI
News

Grammarly rebrands as Superhuman as it doubles down on AI

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?