Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

AI agents emerge as potential targets for cyberattackers

By CIO Dive by By CIO Dive
April 8, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

Dive Brief:

  • Digital entities such as bots and AI agents are fast emerging as prime targets for cyberattacks as organizations rapidly increase their reliance on them, cybersecurity firm Delinea said in a recent report.
  • For every human identity, there are about 46 so-called “non-human identities,” with the number of NHIs projected to exceed 45 billion by the end of 2025, “illustrating their pervasive presence in modern infrastructures,” according to the research.
  • “While human identities remain a primary attack target, non-human identities (NHI) have quietly become an equally critical — and often overlooked — security risk,” the report said.

Dive Insight:

The findings come as leading U.S. enterprise software providers including Microsoft and SAP have begun rolling out AI agents designed to perform tasks in corporate finance and other business functions. 

NHIs are digital identities for applications, services or devices, used by organizations to execute automatic machine-to-machine operations, according to a CrowdStrike article. They expand an organization’s cybersecurity risks because each machine identity presents a potential entry point for attackers, the article said.

“With seemingly countless NHIs deployed across modern organizations, it is easy for NHIs to be overlooked in security strategies, introducing a higher risk of unauthorized access,” it said.

The nonprofit Cloud Security Alliance in September published a study finding that nearly one in five organizations had experienced a security incident related to NHIs.

Despite their importance, NHIs are often neglected in security practices, according to Delinea.

Over 70% of NHIs are not “rotated” or replaced within recommended timeframes, leaving them vulnerable to exploitation, the Delinea report said, citing data from Entro Labs, a research arm of cybersecurity startup Entro Security. Additionally, 97% of organizations expose their NHIs to third-party vendors, increasing the risk of unauthorized access.

“As attackers refine their techniques to target identity systems, the combination of unrotated credentials and widespread third-party access creates a growing and dangerous vulnerability,” the report said.



Source link

By CIO Dive

By CIO Dive

Next Post
Genworth Financial taps Capital One veteran for CIO role

Genworth Financial taps Capital One veteran for CIO role

Recommended.

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

March 17, 2025
Casinos Risk Revenue Loss Without Modernizing Table Operations, Warns Info-Tech Research Group

Casinos Risk Revenue Loss Without Modernizing Table Operations, Warns Info-Tech Research Group

December 12, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio