Key insights
- Cybercriminals are leveraging AI to automate and enhance ransomware, phishing and deepfake attacks, making threats faster and more sophisticated.
- Digital supply chains are increasingly targeted, with vulnerabilities exploited through AI-driven attacks that can cascade across business networks.
- While organizations are investing in AI-powered cybersecurity tools, most still lag in addressing the full scope of AI-related cyber risks.
- Building cyber resilience now requires both advanced technology and well-trained staff, as human vigilance remains a critical line of defense.
The cyber risk landscape is continually evolving as the methods threat actors use keep changing. Ransomware attacks, which have proliferated in recent years, have shifted from an initial scattergun approach to becoming more targeted and sophisticated tactics.
Another major evolution in ransomware attacks is the increasing likelihood of compromises to expose vulnerabilities in digital supply chains, with data breaches then cascading throughout business networks.
"Some of the major claims in the last 12 months have been from incidents involving trusted third parties, attacks which have directly impacted their supply chain," says Tom Mooney, cyber strategy manager, Cyber Risk Management at Gallagher.
He continues, "If you're doing regular (security) scans, are you scanning known vulnerabilities in your supply chain? Realistically, that's where your threat vector may be."
Recent cyberattacks on high-profile businesses have highlighted the growing threat of "triple extortion" events, where the "double extortion" of data encryption and exfiltration is compounded by the threat of a distributed denial-of-service (DDoS) attack on company systems. In 2025, UK retailers targeted in this manner were unable to restock their stores and had to suspend online sales.
Rising use of AI in cybersecurity: Emerging threats
Hackers are increasingly using AI tools to refine and automate ransomware attacks, as well as exploit vulnerabilities in IT systems and digital supply chains.
Cybercriminals typically exploit known problems, or common vulnerability exposures (CVEs), to gain access to company systems. Previously, finding and using CVEs to orchestrate data breaches was a cumbersome manual process for hackers. Finding CVEs is now much easier, using AI and tapping into the cybercrime marketplace available on the dark web marketplace.
"What used to take weeks can now take less than a minute," says Johnty Mongan, head of Cyber Risk Management at Gallagher. "ChatGPT can tell me which CVE has the highest 'blast radius', five major manufacturers that use this technology and the 1,000 most common passwords businesses use — and then write me a bash script for a 'brute force' attack."
AI is also turbo-powering social engineering techniques. It's disturbingly easy for cybercriminals to find information in the public domain about high-profile individuals in an organization, which can be used to access company systems.
With the power of generative AI, threat actors can create convincing spear phishing texts and emails, voice phishing ("vishing") phone messages and video deepfakes from hackers posing as senior colleagues to persuade company employees to release sensitive data or transfer funds.1