3 in 4 Enterprise Users Upload Data to GenAI Including passwords and keys

The 2025 Generative AI Cloud and Threat Report, released by Netskope Threat Labs, unveils a staggering 30-fold increase in data sent to genAI apps by enterprise users over the past year. A broader analysis found that 75% of enterprise users are accessing applications with genAI features, creating a larger issue for security teams to address: the unintentional insider threat. This trend underscores the urgent need for advanced data security capabilities to regain governance, visibility, and control over genAI usage within organizations. The integration of AI-fueled security measures will be crucial in keeping pace with the rapidly changing threat landscape and ensuring the safe and responsible use of genAI technologies in the enterprise environment. Ray Canzanese, Director of Netskope Threat Labs, notes, “Our latest data shows genAI is no longer a niche technology; it’s everywhere”. While many organizations are attempting to mitigate risks by implementing “block first and ask questions later” policies, security leaders are urged to pursue safe enablement strategies as employees seek efficiency and productivity benefits from these tools. In a startling revelation, a new report indicates that three out of four enterprise users are uploading data to generative AI (genAI) applications, including sensitive information such as passwords and keys. While this move reduces the risks of unwanted data exposure to third-party cloud apps, it introduces new data security risks related to supply chains, data leakage, and improper data output handling. The report reveals that 72% of enterprise users are accessing genAI apps through personal accounts for work-related purposes. The report also reveals a significant shift in genAI infrastructure, with the number of organizations running genAI locally increasing from less than 1% to 54% over the past year. As the AI landscape continues to evolve, organizations must remain vigilant and proactive in their approach to data security. Key steps include assessing the genAI landscape within the organization, bolstering genAI app controls, and inventorying local controls for organizations running genAI infrastructure locally. Netskope had visibility into 317 genAI apps, including popular platforms like ChatGPT, Google Gemini, and GitHub Copilot.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 26 Mar 2025 14:35:17 +0000


Cyber News related to 3 in 4 Enterprise Users Upload Data to GenAI Including passwords and keys

Aim Security Raises $10M to Secure Generative AI Enterprise Adoption - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)-Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million in seed funding. Aim Security was founded by ...
1 year ago Darkreading.com
Flow Security Launches GenAI DLP - PRESS RELEASE. TEL AVIV, Israel, Nov. 30, 2023 /PRNewswire/ - Flow Security, the pioneering Data Security Lifecycle Platform, announced today its extension to GenAI Security with the launch of a new GenAI DLP module. This move makes Flow Security the ...
1 year ago Darkreading.com
3 in 4 Enterprise Users Upload Data to GenAI Including passwords and keys - The 2025 Generative AI Cloud and Threat Report, released by Netskope Threat Labs, unveils a staggering 30-fold increase in data sent to genAI apps by enterprise users over the past year. A broader analysis found that 75% of enterprise users are ...
3 days ago Cybersecuritynews.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
5 months ago Aws.amazon.com
GenAI Regulation: Why It Isn't One Size Fits All - With President Biden calling on Congress to pass bipartisan data privacy legislation to accelerate the development and use of privacy-centric techniques for the data that is training AI, it's important to remember that excessive regulation can stifle ...
1 year ago Cybersecurity-insiders.com
Akto Launches Proactive GenAI Security Testing Solution - With the increasing reliance on GenAI models and Language Learning Models like ChatGPT, the need for robust security measures have become paramount. Akto, a leading API Security company, is proud to announce the launch of its revolutionary GenAI ...
1 year ago Darkreading.com
AI Market Research: The Pivotal Role of Generative AI in Cyber Security - What researchers are learning about GenAI and cyber security. Pair AI with cyber security and the possibilities are staggering. For many security professionals, it's a foregone conclusion that incorporating intelligence into cyber security will ...
10 months ago Blog.checkpoint.com
Cisco Motific reduces GenAI security, trust, and compliance risks - Cisco announced Motific, Cisco's SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco's incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and ...
1 year ago Helpnetsecurity.com Cuba
CISOs Reconsider Their Roles in Response to GenAI Integration - Chief information security officers face mounting pressure as cyberattacks surge and complexities surrounding the implementation of GenAI and AI technologies emerge. The vast majority - 92% - of the 500 CISOs surveyed by Trellix admitted they are ...
10 months ago Securityboulevard.com
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
1 year ago Helpnetsecurity.com
Businesses gain upper hand with GenAI integration - Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their competition, according to Forrester. Between July and September 2023, the number of enterprises that are ...
1 year ago Helpnetsecurity.com
Legal, compliance and privacy leaders anxious about rapid GenAI adoption - Rapid GenAI adoption is the top-ranked issue for the next two years for legal, compliance and privacy leaders, according to Gartner. 70% of respondents reported rapid GenAI adoption as a top concern for them. Gartner experts have identified four key ...
1 year ago Helpnetsecurity.com
Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors - The 2023 data from Enzoic for Active Directory Lite data from 2023 offers a revealing glimpse into the current state of cybersecurity, highlighting a significant increase in risk factors that lead to data breaches. The free password auditor has been ...
1 year ago Securityboulevard.com
CVE-2023-38291 - An issue was discovered in a third-party component related to ro.boot.wifimacaddr, shipped on devices from multiple device manufacturers. Various software builds for the following TCL devices (30Z and 10L) and Motorola devices (Moto G Pure and Moto G ...
11 months ago
CIOs shape long-term success with GenAI expertise - Today's CIOs have evolved from managing IT infrastructure and ensuring systems' efficiency to becoming key business strategists, according to IDC. They stand at the intersection of technology and business, leveraging innovations to shape ...
1 year ago Helpnetsecurity.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
4 years ago
The most popular passwords of 2023 are easy to guess and crack - Each year, analysts at various Internet security companies release lists of the most used passwords. ADVERTISEMENT. The passwords that are on these lists may act as a warning for any Internet and electronic device user. Some common passwords have ...
1 year ago Ghacks.net
The Power and Limitations of AI in Cybersecurity - Today's chief information security officers face new cybersecurity challenges because of the increasing use of artificial intelligence, particularly generative AI. This is not a surprise given the growing use of GenAI in the workplace, with fully ...
1 year ago Feeds.fortinet.com
Cybersecurity trends: IBM's predictions for 2024 - As organizations begin planning their security strategies for 2024, now is the time to look back on the year before and extrapolate what the future may hold. The impact of the many new uses for GenAI rippled the cybersecurity world and was a top ...
1 year ago Securityintelligence.com
CVE-2023-38298 - Various software builds for the following TCL devices (30Z, A3X, 20XE, 10L) leak the device IMEI to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party ...
11 months ago
CVE-2023-38301 - An issue was discovered in a third-party component related to vendor.gsm.serial, shipped on devices from multiple device manufacturers. Various software builds for the BLU View 2, Boost Mobile Celero 5G, Sharp Rouvo V, Motorola Moto G Pure, Motorola ...
11 months ago
Preventing PII Leakage through Text Generation AI Systems - Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into giving you information that was supposed to be blocked. This remains ...
1 year ago Securityboulevard.com
The 7 technology trends that could replace passwords - In passwords, this provides a secure way to let users prove that they know their own password, without any need to transmit their actual credentials – it is a cryptographic method that proves you know your password without needing to actually ...
3 days ago Bleepingcomputer.com
CVE-2023-38297 - An issue was discovered in a third-party com.factory.mmigroup component, shipped on devices from multiple device manufacturers. Certain software builds for various Android devices contain a vulnerable pre-installed app with a package name of ...
11 months ago
15% of office workers use unsanctioned GenAI tools - Help Net Security - Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. When employees have unfettered access to ...
5 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)