Connect with us

Business

Artificial Intelligence (AI) and AI-agents: A Game-Changer for Both Cybersecurity and Cybercrime (By Anna Collard)

Published

on

Artificial Intelligence

The broader an AI’s reach through integrations and automation, the greater the potential threat of it going rogue, making robust oversight, security measures, and ethical AI governance essential in mitigating these risks

JOHANNESBURG, South Africa, March 3, 2025/APO Group/ —By Anna Collard, SVP Content Strategy & Evangelist KnowBe4 Africa (www.KnowBe4.com).

Artificial Intelligence is no longer just a tool—it is a gamechanger in our lives, our work as well as in both cybersecurity and cybercrime. While businesses leverage AI to enhance defences, cybercriminals are weaponising AI to make these attacks more scalable and convincing​.

In 2025, researchers forecast that AI agents, or autonomous AI-driven systems capable of performing complex tasks with minimal human input, are revolutionising both cyberattacks and cybersecurity defences. While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements don’t just enhance cybercriminal tactics—they may fundamentally change the cybersecurity battlefield.

How Cybercriminals Are Weaponising AI: The New Threat Landscape

AI is transforming cybercrime, making attacks more scalable, efficient, and accessible. The WEF Artificial Intelligence and Cybersecurity Report (2025)  (https://apo-opa.co/3QO7O7H) highlights how AI has democratised cyber threats, enabling attackers to automate social engineering, expand phishing campaigns, and develop AI-driven malware​. Similarly, the Orange Cyberdefense Security Navigator 2025 (https://apo-opa.co/3FfJZ6c) warns of AI-powered cyber extortion, deepfake fraud, and adversarial AI techniques. And the 2025 State of Malware Report by Malwarebytes (https://apo-opa.co/43lwZpY) notes, while GenAI has enhanced cybercrime efficiency, it hasn’t yet introduced entirely new attack methods—attackers still rely on phishing, social engineering, and cyber extortion, now amplified by AI. However, this is set to change with the rise of AI agents—autonomous AI systems capable of planning, acting, and executing complex tasks—posing major implications for the future of cybercrime.

Here is a list of common (ab)use cases of AI by cybercriminals:

AI-Generated Phishing & Social Engineering

Generative AI and large language models (LLMs) enable cybercriminals to craft more believable and sophisticated phishing emails in multiple languages—without the usual red flags like poor grammar or spelling mistakes. AI-driven spear phishing now allows criminals to personalise scams at scale, automatically adjusting messages based on a target’s online activity. AI-powered Business Email Compromise (BEC) scams are increasing, as attackers use AI-generated phishing emails sent from compromised internal accounts to enhance credibility​. AI also automates the creation of fake phishing websites, watering hole attacks and chatbot scams, which are sold as AI-powered crimeware as a service’ offerings, further lowering the barrier to entry for cybercrime​.

Deepfake-Enhanced Fraud & Impersonation

Deepfake audio and video scams are being used to impersonate business executives, co-workers or family members to manipulate victims into transferring money or revealing sensitive data. The most famous 2024 incident was UK based engineering firm Arup (https://apo-opa.co/4h56I27) that lost $25 million after one of their Hong Kong based employees was tricked by deepfake executives in a video call. Attackers are also using deepfake voice technology to impersonate distressed relatives or executives, demanding urgent financial transactions.

Cognitive Attacks

Online manipulation—as defined by Susser et al. (2018) (https://apo-opa.co/4h8qxpw) —is “at its core, hidden influence — the covert subversion of another person’s decision-making power”. AI-driven cognitive attacks are rapidly expanding the scope of online manipulation, leveraging digital platforms and state-sponsored actors increasingly use generative AI to craft hyper-realistic fake content, subtly shaping public perception while evading detection. These tactics are deployed to influence elections, spread disinformation, and erode trust in democratic institutions. Unlike conventional cyberattacks, cognitive attacks don’t just compromise systems—they manipulate minds, subtly steering behaviours and beliefs over time without the target’s awareness. The integration of AI into disinformation campaigns dramatically increases the scale and precision of these threats, making them harder to detect and counter.

The Security Risks of LLM Adoption

Beyond misuse by threat actors, business adoption of AI-chatbots and LLMs introduces their own significant security risks—especially when untested AI interfaces connect the open internet to critical backend systems or sensitive data. Poorly integrated AI systems can be exploited by adversaries and enable new attack vectors, including prompt injection, content evasion, and denial-of-service attacks. Multimodal AI expands these risks further, allowing hidden malicious commands in images or audio to manipulate outputs.

Additionally, bias within LLMs poses another challenge, as these models learn from vast datasets that may contain skewed, outdated, or harmful biases. This can lead to misleading outputs, discriminatory decision-making, or security misjudgments, potentially exacerbating vulnerabilities rather than mitigating them. As LLM adoption grows, rigorous security testing, bias auditing, and risk assessment are essential to prevent exploitation and ensure trustworthy, unbiased AI-driven decision-making.

When AI Goes Rogue: The Dangers of Autonomous Agents

The integration of AI into disinformation campaigns dramatically increases the scale and precision of these threats, making them harder to detect and counter

With AI systems now capable of self-replication, as demonstrated in a recent study (https://apo-opa.co/4i7HgdN), the risk of uncontrolled AI propagation or rogue AI—AI systems that act against the interests of their creators, users, or humanity at large – is growing. Security and AI researchers have raised concerns that these rogue systems can arise either accidentally or maliciously, particularly when autonomous AI agents are granted access to data, APIs, and external integrations. The broader an AI’s reach through integrations and automation, the greater the potential threat of it going rogue, making robust oversight, security measures, and ethical AI governance essential in mitigating these risks.

The future of AI Agents for Automation in Cybercrime

A more disruptive shift in cybercrime can and will come from AI Agents, which transform AI from a passive assistant into an autonomous actor capable of planning and executing complex attacks. Google, Amazon, Meta, Microsoft, and Salesforce are already developing Agentic AI for business use, but in the hands of cybercriminals, its implications are alarming. These AI agents can be used to autonomously scan for vulnerabilities, exploit security weaknesses, and execute cyberattacks at scale. They can also allow attackers to scrape massive amounts of personal data from social media platforms and automatically compose and send fake executive requests to employees or analyse divorce records across multiple countries to identify individuals for AI-driven romance scams, orchestrated by an AI agent. These AI-driven fraud tactics don’t just scale attacks—they make them more personalised and harder to detect. Unlike current GenAI threats, Agentic AI has the potential to automate entire cybercrime operations, significantly amplifying the risk​.

How Defenders Can Use AI & AI Agents

Organisations cannot afford to remain passive in the face of AI-driven threats and security professionals need to remain abreast of the latest development. Here are some of the opportunities in using AI to defend against AI:

AI-Powered Threat Detection and Response:

Security teams can deploy AI and AI-agents to monitor networks in real time, identify anomalies, and respond to threats faster than human analysts can. AI-driven security platforms can automatically correlate vast amounts of data to detect subtle attack patterns that might otherwise go unnoticed, create dynamic threat modelling, real-time network behaviour analysis, and deep anomaly detection​. For example, as outlined by researchers of Orange Cyber Defense (https://apo-opa.co/3FfJZ6c), AI-assisted threat detection is crucial as attackers  increasingly use “Living off the Land” (LOL) techniques that mimic normal user behaviour, making it harder for detection teams to separate real threats from benign activity. By analysing repetitive requests and unusual traffic patterns, AI-driven systems can quickly identify anomalies and trigger real-time alerts, allowing for faster defensive responses.

However, despite the potential of AI-agents, human analysts still remain critical, as their intuition and adaptability are essential for recognising nuanced attack patterns and leverage real incident and organisational insights to prioritise resources effectively.

Automated Phishing and Fraud Prevention:

AI-powered email security solutions can analyse linguistic patterns, and metadata to identify AI-generated phishing attempts before they reach employees, by analysing writing patterns and behavioural anomalies. AI can also flag unusual sender behaviour and improve detection of BEC attacks​. Similarly, detection algorithms can help verify the authenticity of communications and prevent impersonation scams. AI-powered biometric and audio analysis tools detect deepfake media by identifying voice and video inconsistencies. *However, real-time deepfake detection remains a challenge, as technology continues to evolve.

User Education & AI-Powered Security Awareness Training:

AI-powered platforms (e.g., KnowBe4’s AIDA) deliver personalised security awareness training, simulating AI-generated attacks to educate users on evolving threats, helping train employees to recognise deceptive AI-generated content​ and strengthen their individual susceptility factors and vulnerabilities.

Adversarial AI Countermeasures:

Just as cybercriminals use AI to bypass security, defenders can employ adversarial AI techniques, for example deploying deception technologies—such as AI-generated honeypots—to mislead and track attackers, as well as continuously training defensive AI models to recognise and counteract evolving attack patterns.

Using AI to Fight AI-Driven Misinformation and Scams:

AI-powered tools can detect synthetic text and deepfake misinformation, assisting fact-checking and source validation. Fraud detection models can analyse news sources, financial transactions, and AI-generated media to flag manipulation attempts​. Counter-attacks, like shown by research project Countercloud (https://apo-opa.co/3Xp1RSs) or O2 Telecoms AI agent “Daisy” (https://apo-opa.co/4h15eGp) show how AI based bots and deepfake real-time voice chatbots can be used to counter disinformation campaigns as well as scammers by engaging them in endless conversations to waste their time and reducing their ability to target real victims​.

In a future where both attackers and defenders use AI, defenders need to be aware of how adversarial AI operates and how AI can be used to defend against their attacks. In this fast-paced environment, organisations need to guard against their greatest enemy: their own complacency, while at the same time considering AI-driven security solutions thoughtfully and deliberately. Rather than rushing to adopt the next shiny AI security tool, decision makers should carefully evaluate AI-powered defences to ensure they match the sophistication of emerging AI threats. Hastily deploying AI without strategic risk assessment could introduce new vulnerabilities, making a mindful, measured approach essential in securing the future of cybersecurity.

To stay ahead in this AI-powered digital arms race, organisations should:

✅Monitor both the threat and AI landscape to stay abreast of latest developments on both sides.

✅ Train employees frequently on latest AI-driven threats, including deepfakes and AI-generated phishing.
✅ Deploy AI for proactive cyber defense, including threat intelligence and incident response.
✅ Continuously test your own AI models against adversarial attacks to ensure resilience.

Distributed by APO Group on behalf of KnowBe4

Business

Orange Africa and Middle East and Eutelsat Announce a Strategic Partnership to Accelerate the Deployment of Satellite Internet in Africa and the Middle East

Published

on

Orange is already a reference customer of Eutelsat’s KONNECT VHTS satellite, which it uses to provide broadband services to its subscribers in France

CASABLANCA, Morocco, March 4, 2025/APO Group/ –Orange Africa and Middle East (OMEA) (www.Orange.com) and Eutelsat announce a strategic partnership to bridge the digital divide through satellite connectivity in Africa and the Middle East. It aims to connect isolated areas with broadband access, thereby strengthening digital inclusion in the region.

As part of this multi-year partnership, Orange will use the EUTELSAT KONNECT satellite, which offers state-of-the-art broadband technology, to provide reliable and accessible Internet access. Initially, deployment will involve Jordan, Côte d’Ivoire, Senegal and the Democratic Republic of Congo, with the aim of gradually extending to all countries in the region.

By combining Orange’s expertise in telecommunications and Eutelsat’s technological innovation in the satellite sector, this partnership will make it possible to offer services tailored to both private individuals (B2C) and businesses (B2B), guaranteeing secure, reliable and high-performance connectivity. The complementary nature of the fixed, mobile and satellite technology offers will help to connect isolated territories and meet the growing need for Internet access in the region.

The partnership is based on cutting-edge solutions offering speeds of up to 100 Mbps, which, combined with Orange’s capabilities, will make it possible to:

Our satellite technology including GEO capacity, combined with Orange’s local footprint, brings connectivity where it’s needed most

  • Cover white and rural areas,
  • Provide services tailored to local conditions and the needs of individuals and businesses,
  • Provide reliable and secure connectivity, in compliance with national regulations.

This proactive approach is part of a long-term vision to support digital development in all the areas where Orange is present, using the best technologies available, while respecting national frameworks and enhancing local ecosystems.

Jérôme Hénique, CEO of Orange Africa and Middle East, comments: “This partnership illustrates our commitment to connecting all territories and bridging the digital divide in Africa and the Middle East.

Today, Orange serves more than 160 million customers in the region, and is pursuing its ambition to provide digital access for all. Drawing on our expertise and local roots, we are positioning ourselves as a key player in supporting evolving customer expectations, while guaranteeing sustainable connectivity that respects local legislation.”

Michael Trabbia, CEO of Orange Wholesale, said: “I am delighted with this strategic partnership between the Orange Group and Eutelsat Group, which is part of a long-term relationship. It is part of our strategy to offer our customers the best satellite connectivity solutions in high and low orbit, complementing our terrestrial networks. Orange Wholesale’s satellite factory has all the expertise required to implement this strategy for all Orange Group entities. We also offer satellite operators the terrestrial connectivity solutions they need, such as teleports or long-distance fiber.”

Cyril Dujardin, President of the Connectivity Business Unit within the Eutelsat Group added: “Our satellite technology including GEO capacity, combined with Orange’s local footprint, brings connectivity where it’s needed most. Together, we’re creating a robust solution to accessibility challenges, providing reliable and affordable connectivity for consumers and businesses alike.”

Orange is already a reference customer of Eutelsat’s KONNECT VHTS satellite, which it uses to provide broadband services to its subscribers in France.

Distributed by APO Group on behalf of Orange Middle East and Africa.

Continue Reading

Business

Cloud-Based Cybersecurity: Future-Proofing African Business

Published

on

The demand for cloud computing services in Africa is growing between 25% and 30% annually, according to data firm Xalam Analytics

CAPE TOWN, South Africa, March 4, 2025/APO Group/ –Legacy cybersecurity systems – once recognized as the cornerstone of business infrastructure – are putting African companies at risk of data breaches and cyberattacks, which could end up costing more than just money. These on-premises solutions have been identified as major threat to businesses, due to outdated tech, missing modern security features, and integration challenges – an issue that only grows worse as hardware gets older. In response, cybersecurity experts recommend that businesses switch over to cloud-based solutions, which offer continuous, automated updates for up to date protection.

 

“Africa’s rapidly expanding economy has made it a target for cybercriminals looking to exploit weak points in the digital infrastructure of local businesses. Cyber threats are also evolving and adapting faster than ever – which means that businesses need to be able to upgrade their cybersecurity in real-time, to ensure their data and finances remain protected against the latest threats,” says Tony Anscombe, Chief Security Evangelist at ESET, a leading international cybersecurity company with a presence across the continent.

As technology progresses, support for older systems, including patches and updates, dwindles. This means that legacy systems may not be able to accommodate modern technologies and new security best practices – including multi-factor authentication and encryptions. As a result, vulnerabilities in older software and hardware remain unaddressed, leaving gaps in the defense framework and making them prime targets for cyberattacks. This can also lead to non-compliance, resulting in legal issues and hefty fines.

Africa’s rapidly expanding economy has made it a target for cybercriminals looking to exploit weak points in the digital infrastructure of local businesses

“If a data breach occurs, it will impact operational continuity and damage the brand’s reputation far more than the downtime needed to upgrade their systems. Recognizing that outdated solutions could cost them more in the long run, businesses are switching over to cloud-based solutions,” says Anscombe.

Cloud-based cybersecurity systems host digital defences outside of a business’s internal network, providing a ‘protective layer’ that blocks threats before they can reach critical infrastructure. By nature of being hosted on the cloud, these digital solutions offer greater cost flexibility and opportunity to scale (up or down), compared to hardware-bound legacy systems – both of which are key considerations when it comes to Africa’s thriving start-up ecosystem.

These solutions also make use of the latest technologies – for example, leveraging artificial intelligence and machine learning to continuously monitor digital infrastructure. This means they can detect and respond to cyber threats, including zero-day attacks (previously unknown vulnerabilities), much earlier than conventional methods. Cloud-based solutions also learn and share information about emerging threats detected in other regions, integrating the information in real time and adjusting detection models so they are always prepared.

A further element of flexibility offered by cloud-based solutions is having more options to choose from; “Since cloud-based operations can be deployed and serviced from anywhere, businesses can look beyond their immediate physical borders when it comes to choosing a provider. This means being able to select a provider based on best-fit, instead of closest-to-the-office,” says Anscombe.

The demand for cloud computing services in Africa is growing between 25% and 30% annually, according to data firm Xalam Analytics. This is based on an understanding that cloud-based solutions enable African businesses to compete globally, without the financial strain of upfront investment and ongoing maintenance of expensive IT infrastructure. Applying the same school of thought to cybersecurity is the first step in building a resilient, digitally secure business in an age of ever-developing cybercrime.

Distributed by APO Group on behalf of ESET.

Continue Reading

Business

SUNRATE and Atlas Forge Strategic Partnership to Revolutionise Travel Payments with Innovative Solutions

Published

on

SINGAPORE – Media OutReach Newswire – 4 March 2025 – SUNRATE, the global payment and treasury management platform, today announced a strategic partnership with Atlas, the global travel technology company, at ITB Berlin 2025. As part of the partnership, SUNRATE will integrate its advanced travel payment solutions with Atlas’s ATRIP (Air Travel Retailing and Information Platform).

Revolutionising the Travel Industry with Global Payments and Low-Cost Carrier (LCC) Content

This partnership exemplifies how SUNRATE tackles key challenges in global travel distribution. At ITB Berlin, SUNRATE showcased how its commercial cards – trusted by partners like Atlas – are transforming travel payments for the industry.

SUNRATE’s virtual and physical commercial cards enable customers to settle card spends in more than 15 currencies. They also allow the customisation of key parameters, such as card limits and use cases, providing tailored financial control. Customers can also access real-time transaction statements and reconciliation tools. SUNRATE is certified to the international financial data security standard, Payment Card Industry Data Security Standard (PCI DSS) Level 1.

“Teaming up with Atlas underscores our commitment to innovation and customer-centric solutions. As we continue to lead the way in global payment solutions, we remain steadfast in our mission to evolve our commercial card offerings, empowering travel businesses to navigate complex payment landscapes with agility and confidence,” said Shawn Qin, Head of Card Business at SUNRATE.

Addressing Cross-Border Payment Challenges

Cross-border payments remain one of the biggest challenges for the global travel distribution industry. Providing flexible, secure, and efficient payment solutions to travel sellers is essential for Atlas, which partners with 150 low-cost airlines and serves clients across the globe.

“The global payment ecosystem is constantly evolving, and keeping up with changing needs and regulations is no small task. That’s why Atlas is committed to working with the world’s leading payment providers to deliver the most up-to-date solutions to our customers,” said Mary Li, CEO and Founder of Atlas. “We are thrilled to partner with SUNRATE to empower the global travel ecosystem with efficient, convenient, and secure payment infrastructure.”

About SUNRATE
SUNRATE is a global payment and treasury management platform for businesses worldwide. Since its inception in 2016, SUNRATE has been recognised as a leading solution provider and has enabled companies to operate and scale both locally and globally in 190+ countries and regions with its cutting-edge proprietary platform, extensive global network, and robust APIs.

With its global business headquarters in Singapore and offices in Hong Kong, Jakarta, London, and Shanghai, SUNRATE partners with the top global financial institutions, such as Citibank, Standard Chartered, Barclays, J.P. Morgan and is the principal member of both Mastercard and Visa. To learn more about SUNRATE, visit https://www.sunrate.com/

Continue Reading

Trending

Exit mobile version