best security, highest intelligence, and fastest recovery <\/a>\u2014 across cloud, on-prem, and SaaS workloads.<\/p>\n\n\n\nAI-driven Attacks\u00a0<\/h2>\n\n\n\n <\/strong>Cybercriminals leverage AI in various ways and explore further enhancements to increase their attack capabilities. For example:<\/p>\n\n\n\n\nAdvanced phishing and social engineering<\/strong> Generative AI empowers bad actors to automate fraudulent activities, such as crafting of phishing mails, generating fake social media accounts, reviews, and comments, impersonating service and support agents, and carrying out scams. Massive datasets of stolen credentials and personal data can be analyzed in seconds to enhance phishing and social engineering campaigns.<\/li>\n\n\n\nAdaptive malware and botnet generation <\/strong>AI-driven malware and botnets that shapeshift during attack stages expose exponential risk to IT and security teams by evolving in real-time to avoid security measures, identify vulnerabilities in target systems, and coordinate attacks more efficiently than human-generated threats. A growing concern in cybersecurity is related to AI-generated malware capable of bypass traditional signature-based defenses.<\/li>\n\n\n\nZero-day exploits and supply chain attacks<\/strong> Threat actors are creatively hiding malicious code and zero-day exploits from defenders to widen the attack distribution and extend the blast radius. For example, hiding malicious payload inside an AI model that is built to fulfill legitimate functions such as biometric authentication. In another scenario attackers can manipulate AI to learn algorithms of threat intrusion systems and evade their detection.<\/li>\n\n\n\nCredential stuffing and brute-force attacks <\/strong>By automating the process of gaining unauthorized access to business accounts and systems through stolen credentials and common password combinations AI speeds up the attack itself. Additionally, machine learning algorithms are utilized to evade security detection systems and AI-driven tools accelerate password cracking by analyzing patterns in leaked password databases.<\/li>\n\n\n\nDeepfake attacks<\/strong> Videos and audio generated by AI impersonate familiar voices and faces to manipulate individuals into performing actions that grant access to sensitive data, systems, and funds. The technology behind deepfakes creates convincing audio and images with minimal input gathered via social media or other public platforms.<\/li>\n<\/ul>\n\n\n\nAI has the power to amplify the impact and the complexity of cyberattacks increasing potential damage and risks to your data estates. Commvault helps you to address uncertainty by combining cutting edge data protection technology with strong cybersecurity measures in alignment with regulatory frameworks to invest in proper cyber resilience and detection mechanisms that keeps your data protected.<\/p>\n\n\n\n
Spotting Threats Early\u00a0<\/h2>\n\n\n\n ThreatWise, our cyber deception service integrated in the Commvault Cloud that layer\u2019s defenses along the path to your data, shielding it from AI-driven attacks, and surfacing threat actors that are targeting the most valuable assets in production \u2013 your data. This early warning layer enables your organization to adopt a cyber resilience strategy defending your data against tomorrows threat actors:<\/p>\n\n\n\n
\nLimit the blast radius of an incident and divert the threat sooner \u2013 before it\u2019s time to recover. ThreatWise alerts key business stakeholders upon first touch while simultaneously luring attackers in and away from actual critical assets, forcing them to waste resources.<\/li>\n\n\n\n Spot the attacker and gather insights about utilized tactics, techniques, and procedures across the complete kill chain. By revealing the original source of the AI-driven attack the symptoms and cause of it can be remediated to stop its aggravation.<\/li>\n\n\n\n Delay attacks by confusing and misleading attackers’ algorithms. ThreatWise feeds AI-driven threats fake tokens leading to deceptive data that is making it harder to automate and execute attacks while wasting threat actors\u2019 time.<\/li>\n\n\n\n ThreatWise detection is highly accurate, because it\u2019s not reliant on signatures to identify malicious activity, spotting zero-day attacks, shape shifting malware, and silent threats across workloads and data estates.<\/li>\n\n\n\n Maximize your response time by automating the alteration of key stakeholders across the business and ease coordination of your recovery to limit impact.<\/li>\n<\/ul>\n\n\n\nKeeping pace with evolving threats<\/h4>\n\n\n\n For more information about how Commvault helps you unleash the power of AI without skyrocketing costs read this blog.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Find out more about the growing risks around AI-based attacks and how to minimizes the blast radius of an incident.<\/p>\n","protected":false},"author":85,"featured_media":503125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[1064],"tags":[],"cmv_author":[1444],"class_list":{"0":"post-503124","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-commvault","8":"cmv_author-guy-waizel","9":"entry"},"yoast_head":"\n
Guarding Against AI-Driven Attacks | Commvault | Blog<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"Guarding Against AI-Driven Attacks | Commvault | Blog","description":"Find out more about the growing risks around AI-based attacks and how to minimizes the blast radius of an incident.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud","og_locale":"en_US","og_type":"article","og_title":"Guarding Against AI-Driven Attacks: The Power of Commvault \u00ae Cloud","og_description":"Find out more about the growing risks around AI-based attacks and how to minimizes the blast radius of an incident.","og_url":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2023-11-17T14:00:00+00:00","article_modified_time":"2023-11-16T21:33:38+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/Guarding-Against-AI.png","type":"image\/png"}],"author":"dpauciullo","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"dpauciullo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud"},"author":{"name":"dpauciullo","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e"},"headline":"Guarding Against AI-Driven Attacks: The Power of Commvault \u00ae Cloud","datePublished":"2023-11-17T14:00:00+00:00","dateModified":"2023-11-16T21:33:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud"},"wordCount":783,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/Guarding-Against-AI.png","articleSection":["Commvault"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud","url":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud","name":"Guarding Against AI-Driven Attacks | Commvault | Blog","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/Guarding-Against-AI.png","datePublished":"2023-11-17T14:00:00+00:00","dateModified":"2023-11-16T21:33:38+00:00","description":"Find out more about the growing risks around AI-based attacks and how to minimizes the blast radius of an incident.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/Guarding-Against-AI.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/Guarding-Against-AI.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/guarding-against-ai-driven-attacks-the-power-of-commvault-cloud#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Guarding Against AI-Driven Attacks: The Power of Commvault \u00ae Cloud"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/0d027e3bbfd09715cc267f372fdc4c7e","name":"dpauciullo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a1c2b1eb2dd35e14333ef22306348e?s=96&d=mm&r=g","caption":"dpauciullo"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2023\/11\/Guarding-Against-AI.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/503124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=503124"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/503124\/revisions"}],"predecessor-version":[{"id":503132,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/503124\/revisions\/503132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/503125"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=503124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=503124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=503124"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=503124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}