Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google’s still not giving us the full picture on AI energy use

    August 29, 2025

    Cybercrime increasingly moving beyond financial gains

    August 29, 2025

    Vocal Image is using AI to help people communicate better

    August 29, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Google’s still not giving us the full picture on AI energy use
    • Cybercrime increasingly moving beyond financial gains
    • Vocal Image is using AI to help people communicate better
    • Do you really need smart home display hub? I tried one, and it made a big difference
    • Why Most Entrepreneurs Are Approaching YouTube the Wrong Way
    • Why the wireless mic I recommend to content creators is made by a drone company
    • The government just made it harder for you to weigh in on federal rules
    • Rune Elmqvist: Inkjet Printers, Implantable Pacemakers
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»News»What SOC tools miss at 2:13 AM: Gen AI attack chains exploit telemetry lag-Part 1
    News

    What SOC tools miss at 2:13 AM: Gen AI attack chains exploit telemetry lag-Part 1

    TechurzBy TechurzMay 9, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    What SOC tools miss at 2:13 AM: Gen AI attack chains exploit telemetry lag-Part 1
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More

    It’s 2:13 a.m. on a Sunday and the SOC teams’ worst nightmares are about to come true.

    Attackers on the other side of the planet are launching a full-scale attack on the company’s infrastructure. Thanks to multiple unpatched endpoints that haven’t seen an update since 2022, they blew through its perimeter in less than a minute. 

    Attackers with the skills of a nation-state team are after Active Directory to lock down the entire network while creating new admin-level privileges that will lock out any attempt to shut them down. Meanwhile, other members of the attack team are unleashing legions of bots designed to harvest gigabytes of customer, employee and financial data through an API that was never disabled after the last major product release.

    In the SOC, alerts start lighting up consoles like the latest Grand Theft Auto on a Nintendo Switch. SOC Analysts are getting pinged on their cell phones, trying to sleep off another six-day week during which many clocked nearly 70 hours.

    The CISO gets a call around 2:35 a.m. from the company’s MDR provider saying there’s a large-scale breach going down. “It’s not our disgruntled accounting team, is it? The guy who tried an “Office Space” isn’t at it again, is he?” the CISO asks half awake. The MDR team lead says no, this is inbound from Asia, and it’s big.        

    Cybersecurity’s coming storm: gen AI, insider threats, and rising CISO burnout

    Generative AI is creating a digital diaspora of techniques, technologies and tradecraft that everyone, from rogue attackers to nation-state cyber armies trained in the art of cyberwar, is adopting. Insider threats are growing, too, accelerated by job insecurity and growing inflation. All these challenges and more fall on the shoulders of the CISO, and it’s no wonder more are dealing with burnout.

    AI’s meteoric rise for adversarial and legitimate use is at the center of it all. Getting the most significant benefit from AI to improve cybersecurity while reducing risk is what boards of directors are pushing CISOs to achieve.

    That’s not an easy task, as AI security is evolving very quickly. In Gartner’s latest Dataview on security and risk management, the analyst firm addressed how leaders are responding to gen AI. They found that 56% of organizations are already deploying gen AI solutions, yet 40% of security leaders admit significant gaps in their ability to effectively manage AI risks.

    Gen AI is being deployed most in infrastructure security, where 18% of enterprises are fully operational and 27% are actively implementing gen AI-based systems today. Second is security operations, where 17% of enterprises have gen AI-based systems fully in use. Data security is the third most popular use case, with 15% of enterprises using gen AI-based systems to protect cloud, hybrid and on-premise data storage systems and data lakes.

    Gartner’s latest survey shows CISOs prioritizing gen AI adoption in infrastructure security, security operations, and data security, with application security and GRC lagging. Source: Gartner, Data Security in the Age of AI Advancements

    Insider threats demand a gen AI-first response

    Gen AI has completely reordered the internal threatscape of every business today, making insider threats more autonomous, insidious and challenging to identify. Shadow AI is the threat vector no CISO imagined would exist five years ago, and now it’s one of the most porous threat surfaces.

    “I see this every week,”  Vineet Arora, CTO at WinWire, recently told VentureBeat. “Departments jump on unsanctioned AI solutions because the immediate benefits are too tempting to ignore.”  Arora is quick to point out that employees aren’t intentionally malicious. “It’s crucial for organizations to define strategies with robust security while enabling employees to use AI technologies effectively,” Arora explains. “Total bans often drive AI use underground, which only magnifies the risks.”

    “We see 50 new AI apps a day, and we’ve already cataloged over 12,000,” said Itamar Golan, CEO and co-founder of Prompt Security, during a recent interview with VentureBeat. “Around 40% of these default to training on any data you feed them, meaning your intellectual property can become part of their models.”

    Traditional rule-based detection models are no longer sufficient. Leading security teams are shifting toward gen AI-driven behavioral analytics that establish dynamic baselines of employee activities that can identify anomalies in real-time and contain risks and potential threats.

    Vendors, including Prompt Security, Proofpoint Insider Threat Management, and Varonis, are rapidly innovating with next-generation AI-powered detection engines that correlate file, cloud, endpoint and identity telemetry in real time. Microsoft Purview Insider Risk Management is also embedding next-generation AI models to autonomously identify high-risk behaviors across hybrid workforces.

    Conclusion – Part 1

    SOC teams are in a race against time, especially if their systems aren’t integrated with each other and the more than 10,000 alerts a day they generate aren’t syncing up. An attack from the other side of the planet at 2:13 a.m. is going to be a challenge to contain with legacy systems. With adversaries being relentless in their fine-tuning of tradecraft with gen AI, more businesses need to step up and be smarter about getting more value out of their existing systems.

    Push cybersecurity vendors to deliver the maximum value of the systems already installed in the SOC. Get integration right and avoid having to swivel chairs across the SOC floor to check alert integrity from one system to the next. Know that an intrusion isn’t a false alarm. Attackers are showing a remarkable ability to reinvent themselves on the fly. It’s time more SOCs and the companies relying on them did the same.

    Daily insights on business use cases with VB Daily

    If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.

    Read our Privacy Policy

    Thanks for subscribing. Check out more VB newsletters here.

    An error occured.

    Attack chains exploit Gen lagPart SOC telemetry tools
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCMF Phone 2 Pro review: a bargain phone that doesn’t act like a cheap version
    Next Article Bluetooth 6.1 is here, before Bluetooth 6 devices hit the shelves
    Techurz
    • Website

    Related Posts

    Security

    CrowdStrike buys Onum in agentic SOC push

    August 28, 2025
    Security

    Storm-0501 debuts a brutal hybrid ransomware attack chain

    August 27, 2025
    Security

    Need help with AI safety? Stay ahead of risks with these tools and frameworks

    August 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Our Picks

    Google’s still not giving us the full picture on AI energy use

    August 29, 2025

    Cybercrime increasingly moving beyond financial gains

    August 29, 2025

    Vocal Image is using AI to help people communicate better

    August 29, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.