G2 Logo

AI Breaches

The Beginning of a New Norm

Table of contents

  • Introduction
  • Where the Traditional Model Starts to Break?
  • The Compounding Effect of Context
  • The Financial Impact as a Second-Order Effect
  • The Control Plane Has Shifted
  • A More Practical Framing
  • Conclusion
AI Threats
Oliver Simonnet avatar

Oliver Simonnet

Lead Security Researcher

1 May 20268 min read
Share:

Recommended for you

[object Object]

5 Themes From a Candid Discussion

Eskenzi's IT Analyst & CISO Forum wasn’t a typical vendor event. No polished decks. No rehearsed narratives. Just operat...

[object Object]

The Rise of AI Abuse:A story of Criminal GPTs, DeepFakes, Data Breaches, AI Malware, and Agentic Sleeper Agents

This post explores how attackers have been adopting AI technologies, how it’s reshaped the cyber threat landscape, and w...

[object Object]

Introducing The Human Threat Map: Mapping and Defending the Human Perimeter

To help organisations understand and contextualise how human behaviours create risks and enable threats we have released...