Trend Micro

36 STATS3 REPORTS

All Statistics

In January 2025, a threat actor offered on-demand deepfake image creation services for defeating KYC checks, mentioning tools like DeepFaceLive, DeepFaceLab, and AI Voice Changer, having bypassed KYC checks from two different cryptocurrency exchanges.

Deepfakes

Higher audio quality deepfake synthesis services typically cost upwards of $1,000 a month, but many platforms offer decent output starting at just $5.

Deepfakes

Deep nudes services offer free trials or limited free plans, with paid versions being relatively affordable, with subscriptions ranging from just $9.99 to $22 per month.

Deepfakes

In early December 2024, a criminal on an underground forum was offering a tutorial and playbook for KYC bypass services, including: a licensed version of VcamPro aka Vcam virtual Android camera application, a fake iPhone Camera application for iOS versions 15 and 16, and private deepfake video tool that requires a GeForce RTX 2070 graphics card or more advanced technology.

Deepfakes

Many audio deepfake services offer one-shot voice generation, requiring just a few seconds of source material.

Deepfakes

The first deepfake audio-enabled CEO scam occurred in 2019.

Deepfakes

100% of IT and cybersecurity professionals say they are either currently using (86%) or evaluating their deployment (14%) private 5G networks.

50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.

On average, less than a fifth (18%) of organisations' security budget is currently allocated to private 5G networks.

Nearly all IT and cybersecurity professionals said they are either currently using (62%) or planning to use (35%) AI-powered security tools for private 5G networks.

More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks.

The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).

Just a fifth (20%) of global organisations have a dedicated team for securing their communications networks.

44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.

The AI-powered capabilities viewed as essential for private 5G networks are: Predictive threat intelligence (58%), Continuous, adaptive authentication (52%), Zero trust enforcement (47%), Self-healing networks featuring AI automation (41%).

54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.

51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.

The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).

54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.

50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.

44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.

Responsibility for CT security often lies with the CTO (43%) and CIO (32%).

51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.

39% believe that if you don’t manage asset-related risks properly, it will weaken your standing in the marketplace, making it harder to win new business or keep up with rivals.

Asset managementAttack surface

42% of respondents said that if you don’t manage asset-related risks properly, you’re likely to experience disruptions to day-to-day operations—e.g., outages, downtime, or process failures.

Asset managementAttack surface

75% of cybersecurity incidents occur due to unmanaged assets.

Asset managementAttack surface

55% of organizations surveyed said they have no processes in place to continuously manage attack surface risk.

Asset managementAttack surface

Just 43% of global organizations use dedicated tools to proactively manage risk across their attack surface.

Asset managementSecurity toolsAttack surface

On average, only 27% of responding organizations' budgets are dedicated to managing attack surface risk.

Asset managementBudgetAttack surface

77% of companies claimed that their current resources are adequate for addressing attack surface challenges

Asset managementAttack surfaceAttack surface

91% of respondents acknowledged that attack surface management is either directly or somewhat connected to their organization's business risk.

Asset managementAttack surface

73% of cybersecurity leaders surveyed have experienced security incidents due to unknown or unmanaged assets.

Asset managementAttack surface

39% believe that if you don’t manage asset-related risks properly, it will erode customer confidence and damage your brand image.

Asset managementAttack surface

39% believe that if you don’t manage asset-related risks properly, it will have impacts on your supply chain partnerships.

Asset managementAttack surface

38% of respondents believe that if you don’t manage asset-related risks properly, it can lead to link to drops in staff efficiency.

Asset managementAttack surface

38% believe that if you don’t manage asset-related risks properly, it can impact financial performance.

Asset managementAttack surface