Trend Micro

36 STATS3 REPORTS

All Statistics

In January 2025, a threat actor offered on-demand deepfake image creation services for defeating KYC checks, mentioning tools like DeepFaceLive, DeepFaceLab, and AI Voice Changer, having bypassed KYC checks from two different cryptocurrency exchanges.

Trend MicroDeepfake It Till You Make It: A Comprehensive View of the New AI Criminal Toolset·Jul 9, 2025
Deepfakes

Higher audio quality deepfake synthesis services typically cost upwards of $1,000 a month, but many platforms offer decent output starting at just $5.

Trend MicroDeepfake It Till You Make It: A Comprehensive View of the New AI Criminal Toolset·Jul 9, 2025
Deepfakes

Deep nudes services offer free trials or limited free plans, with paid versions being relatively affordable, with subscriptions ranging from just $9.99 to $22 per month.

Trend MicroDeepfake It Till You Make It: A Comprehensive View of the New AI Criminal Toolset·Jul 9, 2025
Deepfakes

In early December 2024, a criminal on an underground forum was offering a tutorial and playbook for KYC bypass services, including: a licensed version of VcamPro aka Vcam virtual Android camera application, a fake iPhone Camera application for iOS versions 15 and 16, and private deepfake video tool that requires a GeForce RTX 2070 graphics card or more advanced technology.

Trend MicroDeepfake It Till You Make It: A Comprehensive View of the New AI Criminal Toolset·Jul 9, 2025
Deepfakes

Many audio deepfake services offer one-shot voice generation, requiring just a few seconds of source material.

Trend MicroDeepfake It Till You Make It: A Comprehensive View of the New AI Criminal Toolset·Jul 9, 2025
Deepfakes

The first deepfake audio-enabled CEO scam occurred in 2019.

Trend MicroDeepfake It Till You Make It: A Comprehensive View of the New AI Criminal Toolset·Jul 9, 2025
Deepfakes

100% of IT and cybersecurity professionals say they are either currently using (86%) or evaluating their deployment (14%) private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

On average, less than a fifth (18%) of organisations' security budget is currently allocated to private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

Nearly all IT and cybersecurity professionals said they are either currently using (62%) or planning to use (35%) AI-powered security tools for private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

More than nine in ten organizations currently using AI security admit to facing challenges in deploying the tech to private 5G networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

Just a fifth (20%) of global organisations have a dedicated team for securing their communications networks.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

The AI-powered capabilities viewed as essential for private 5G networks are: Predictive threat intelligence (58%), Continuous, adaptive authentication (52%), Zero trust enforcement (47%), Self-healing networks featuring AI automation (41%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

The most frequently cited challenges in deploying AI security to private 5G networks are: High costs (47%), Concerns over false positives/negatives (44%), A lack of internal expertise (37%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

54% say they Ensure compliance with data privacy regulations like GDPR to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

50% of IT and cybersecurity professionals say they Deploy strict access controls for AI models to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

44% of IT and cybersecurity professionals say they use data anonymisation techniques to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

Responsibility for CT security often lies with the CTO (43%) and CIO (32%).

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

51% of IT and cybersecurity professionals say they encrypt data at rest and in transit to safeguard AI use for traffic monitoring/analysis are.

Trend MicroTrend Micro joint research with CTOne on 5G networks security·May 3, 2025

39% believe that if you don’t manage asset-related risks properly, it will weaken your standing in the marketplace, making it harder to win new business or keep up with rivals.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

42% of respondents said that if you don’t manage asset-related risks properly, you’re likely to experience disruptions to day-to-day operations—e.g., outages, downtime, or process failures.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

75% of cybersecurity incidents occur due to unmanaged assets.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

55% of organizations surveyed said they have no processes in place to continuously manage attack surface risk.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

Just 43% of global organizations use dedicated tools to proactively manage risk across their attack surface.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementSecurity toolsAttack surface

On average, only 27% of responding organizations' budgets are dedicated to managing attack surface risk.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementBudgetAttack surface

77% of companies claimed that their current resources are adequate for addressing attack surface challenges

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surfaceAttack surface

91% of respondents acknowledged that attack surface management is either directly or somewhat connected to their organization's business risk.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

73% of cybersecurity leaders surveyed have experienced security incidents due to unknown or unmanaged assets.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

39% believe that if you don’t manage asset-related risks properly, it will erode customer confidence and damage your brand image.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

39% believe that if you don’t manage asset-related risks properly, it will have impacts on your supply chain partnerships.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

38% of respondents believe that if you don’t manage asset-related risks properly, it can lead to link to drops in staff efficiency.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface

38% believe that if you don’t manage asset-related risks properly, it can impact financial performance.

Trend MicroAI is Changing the Cyber Risk Game. Are You Keeping Up?·Apr 29, 2025
Asset managementAttack surface