April 30, 2024 By Jonathan Reed 2 min read

Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.

Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.

Criminals have been using AI for some time now — for example, to assist with phishing email content creation. Also, groups have been using LLMs to help with basic scripting tasks, including file manipulation, data selection, regular expressions and multiprocessing, to potentially automate or optimize technical operations.

Like a chess match, organizations must think several moves ahead of their adversaries. One of these anticipatory moves can include cloud-based AI cybersecurity to help identify anomalies that might indicate the start of a cyberattack.

Recently, AI cybersecurity solutions have emerged that can detect anomalies like ransomware in less than 60 seconds. To help clients counter threats with earlier and more accurate detection, IBM has announced new AI-enhanced versions of the IBM FlashCore Module technology available inside the IBM Storage FlashSystem products and a new version of IBM Storage Defender software. These solutions will help security teams better detect and respond to attacks in the age of artificial intelligence.

Learn about AI cybersecurity

Traditional storage vs. AI threat detection

Immutable copies of data are used to protect data from corruption, such as ransomware attacks, accidental deletion, natural disasters and outages. These backups are also useful for helping organizations comply with data regulations.

Storage protection based on immutable copies of data is typically separated from production environments. These safeguarded copies cannot be modified or deleted by anyone and are only accessible by authorized administrators. This type of solution offers the cyber resiliency necessary to ensure immediate access to data recovery in response to ransomware attacks.

However, given the growing need for AI-ready ransomware security, new solutions are in demand. Unlike traditional storage arrays, systems like IBM FlashSystem leverage machine learning to monitor data patterns, looking for anomalous behaviors indicative of a cyber threat.

This new technology is designed to continuously monitor statistics gathered from every single I/O using machine learning models to detect anomalies like ransomware in less than a minute.

Advanced systems can use machine learning models to distinguish ransomware and malware from normal behavior. This dramatically accelerates threat detection and response, enabling organizations to take action and keep operating during an attack. For example, autonomous responses can trigger alerts or IT playbook activation that will minimize the impact of an attack against data.

AI-security threats

Cyber criminals are continuously developing AI-enhanced attack capabilities. AI-driven cyberattacks are quickly evolving that can pinpoint vulnerabilities, detect patterns and exploit weaknesses. Plus, AI’s efficiency and rapid data analysis can give hackers a tactical advantage over poorly equipped cyber defenses. Traditional cybersecurity methods are no longer enough to combat AI security threats as new tools evolve in real-time. The result is rapid intrusion and undetected ransomware deployment.

Moreover, there are also predictions about how LLMs and other generative AI tools will be offered as a paid service, like Ransomware-as-a-Service, to help attackers deploy their attacks more efficiently with less effort involved. This means the threat will grow into something even more dangerous and more proliferative.

The only response is to fight fire with fire. AI cybersecurity solutions, such as AI-enhanced versions of the IBM FlashCore Module technology, are designed to thwart the most dangerous attacks now — as well as the ones that security teams will face in the future.

More from Artificial Intelligence

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Are successful deepfake scams more common than we realize?

4 min read - Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of fraud.Earlier this year, a finance worker found themselves talking on a video meeting with someone who looked and sounded just like their CFO. After the…

How to calculate your AI-powered cybersecurity’s ROI

4 min read - Imagine this scenario: A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence (AI) that closely mimic the company's internal communications. The emails contain malicious links designed to steal employee credentials, which the attackers could use to gain access to company assets and data for unknown purposes.The organization's AI-powered cybersecurity solution, which continuously monitors network traffic and user behavior, detects several anomalies associated with the attack, blocks access to the suspicious domains…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today