{"id":203495,"date":"2025-04-01T09:34:58","date_gmt":"2025-04-01T09:34:58","guid":{"rendered":"https:\/\/ibkrcampus.eu\/campus\/?p=203495"},"modified":"2025-04-01T12:52:57","modified_gmt":"2025-04-01T12:52:57","slug":"cybercriminals-are-winning-cybersecurity-must-strike-back-now","status":"publish","type":"post","link":"https:\/\/www.interactivebrokers.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/","title":{"rendered":"Cybercriminals are winning\u2014cybersecurity must strike back now"},"content":{"rendered":"\n<p>Originally posted 31 March 2025 &#8211; <a href=\"https:\/\/www.wisdomtree.eu\/fr-lu\/blog\/2025-03-31\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\">Cybercriminals are winning\u2014cybersecurity must strike back now<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybercriminals are using AI and social engineering to launch more sophisticated attacks.<\/li>\n\n\n\n<li>Rapid detection is critical\u2014some breaches escalate in under a minute.<\/li>\n\n\n\n<li>High-profile cyber-attacks are exposing geopolitical risks, from election interference to government breaches.<\/li>\n<\/ul>\n\n\n\n<p>I recently created a website, but soon after launching it, I noticed it wasn\u2019t appearing in Google searches. While researching how to fix this, I received an email with step-by-step instructions on what to do. Nothing about it seemed suspicious\u2014not even the sender\u2019s address. But when I used artificial intelligence (AI) to verify its authenticity, it was flagged as suspicious.<\/p>\n\n\n\n<p>A few years ago, phishing emails had obvious red flags\u2014poor grammar, strange formatting, or sketchy links. Today, with AI-powered tools at their disposal, cybercriminals are far more sophisticated. And if they\u2019re getting smarter, cybersecurity must become smarter still.<\/p>\n\n\n\n<p><strong>The unbearable cost of a data breach<\/strong><\/p>\n\n\n\n<p>In 2024, the average cost of a data breach soared to nearly $5 million<sup>1<\/sup>. And that\u2019s just the average\u2014meaning many breaches resulted in far greater losses. While this number has been rising for years, 2024 saw a sharp uptick, underscoring how the widespread adoption of advanced AI tools is making cybercriminals smarter and attacks more costly than ever.<\/p>\n\n\n\n<p><em><strong>\u201cAttack speeds could increase up to 100x as threat actors leverage generative AI\u201d \u2013 Palo Alto Networks<\/strong><\/em><\/p>\n\n\n\n<p>In many cases, the true cost of a data breach goes beyond dollars and cents\u2014it\u2019s immeasurable. What happens when customer trust in a business\u2019 security is shattered? The reputational damage could be irreversible. What if a hospital is hacked and a life is lost? The stakes couldn\u2019t be higher. That\u2019s why cybersecurity isn\u2019t just a priority\u2014it\u2019s a necessity. And the world is finally waking up to that reality.<\/p>\n\n\n\n<p id=\"smarter-attacks\">&nbsp;<\/p>\n\n\n\n<p><strong>Cybercriminals are becoming smarter<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong><br>442%<\/strong> increase in voice phishing (vishing) in H2 2024 vs H1 2024<\/td><td><strong><br>79%<\/strong> of attacks were malware-free in 2024 (up from 40% in 2019)<\/td><\/tr><tr><td><strong><br>51 seconds<\/strong> Fastest recorded e-crime breakout time<br>&nbsp;<\/td><td><strong><br>257<\/strong> tracked adversaries including 26 new ones in 2024<br>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Source: CrowdStrike 2025 Global Threat Report, March 2025.<\/p>\n\n\n\n<p>When cybercriminals compromise a target, their intention is to infiltrate the organisation via a weak link and move deeper into the network. E-crime breakout time refers to how quickly they escalate control\u2014spreading from the initial breach to critical systems, stealing data, disabling security, or deploying ransomware. Some attackers achieve this in under an hour, making rapid detection and response crucial. In 2024, the fastest recorded time attackers were able to do this was 51 seconds<sup>2<\/sup>.<\/p>\n\n\n\n<p>Attackers aren&#8217;t always relying on emails\u2014the nuisance calls we receive can often be quite nefarious. Vishing (voice phishing) attacks involve cybercriminals using phone calls to impersonate trusted entities, such as banks, government agencies, or service providers, to trick victims into revealing sensitive information or transferring money. These scams have surged dramatically, with a 442% increase in vishing in H2 2024 vs H1 2024<sup>3<\/sup>, highlighting how criminals are exploiting human trust over the phone to bypass traditional cybersecurity defences.<\/p>\n\n\n\n<p>A few weeks ago, I saw a post on LinkedIn of a man surrounded by police officers. He was telling the story of how he physically hacked into an organisation, walking through security checkpoints, accessing restricted areas, and pushing his luck until he finally got caught. But this wasn\u2019t a real attack\u2014it was a penetration test, a controlled security exercise designed to identify vulnerabilities before actual criminals exploit them. Organisations conduct these tests because hackers are employing increasingly sophisticated social engineering techniques\u2014manipulating people rather than systems\u2014to bypass security and gain access. The threat is growing, with 79% of attacks in 2024 being malware-free, up from 40% in 2019<sup>4<\/sup>, proving that cybercriminals don\u2019t always need malware when they can simply trick humans into opening the door.<\/p>\n\n\n\n<p id=\"geopolitical-risk\">&nbsp;<\/p>\n\n\n\n<p><strong>High profile attacks underscore geopolitical risks<\/strong><\/p>\n\n\n\n<p>At the outset of 2024, concerns about cyber risks in the election year were widespread. While many countries navigated the electoral cycle without major known cyber incidents, Romania&#8217;s December presidential election was notably annulled due to allegations of Russian interference. Far-right candidate Calin Georgescu&#8217;s unexpected lead in the first round prompted investigations revealing a coordinated online campaign and cyberattacks supporting his candidacy, leading the courts to void the election.<\/p>\n\n\n\n<p>In the same month, the US Treasury Department reported a significant cybersecurity breach attributed to Chinese state-sponsored hackers. The attackers exploited a third-party software provider to access Treasury workstations and unclassified documents. The breach involved the theft of a security key, allowing remote access to the department&#8217;s systems. Although China\u2019s foreign ministry denied these allegations, the incident underscores the growing intersection of geopolitical and cybersecurity risks.<\/p>\n\n\n\n<p><strong>Executives are concerned about risks from AI<\/strong><\/p>\n\n\n\n<p>A recent World Economic Forum survey<sup>5<\/sup> of executives revealed that 66% believe AI and machine learning will have the biggest impact on cybersecurity in the next 12 months. Yet, 63% admitted their organisations lack processes to assess the security of AI tools before deploying them\u2014highlighting a critical gap between innovation and risk management.<\/p>\n\n\n\n<p><strong>Figure 1: In your view, which of the following will most significantly affect cybersecurity in the next 12 months?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1100\" height=\"691\" data-src=\"https:\/\/www.interactivebrokers.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-1100x691.jpg\" alt=\"Executive survey:  which of the following will most significantly affect cybersecurity in the next 12 months?\" class=\"wp-image-203496 lazyload\" data-srcset=\"https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-1100x691.jpg 1100w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-700x440.jpg 700w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-300x188.jpg 300w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-768x482.jpg 768w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-1536x965.jpg 1536w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-2048x1286.jpg 2048w\" data-sizes=\"(max-width: 1100px) 100vw, 1100px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1100px; aspect-ratio: 1100\/691;\" \/><\/figure>\n\n\n\n<p>Source: World Economic Forum, Global Cybersecurity Report 2025.<\/p>\n\n\n\n<p><strong>Figure 2: Does your organisation have a process in place to assess the security of AI tools before deploying them?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1100\" height=\"726\" data-src=\"https:\/\/www.interactivebrokers.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2-1100x726.jpg\" alt=\"Executive survey:   Does your organisation have a process in place to assess the security of AI tools before deploying them? 63% say no, 37% say yes\" class=\"wp-image-203497 lazyload\" data-srcset=\"https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2-1100x726.jpg 1100w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2-700x462.jpg 700w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2-300x198.jpg 300w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2-768x507.jpg 768w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2-1536x1014.jpg 1536w, https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-2.jpg 1950w\" data-sizes=\"(max-width: 1100px) 100vw, 1100px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1100px; aspect-ratio: 1100\/726;\" \/><\/figure>\n\n\n\n<p>Source: World Economic Forum, Global Cybersecurity Report 2025.<\/p>\n\n\n\n<p><strong>Cybersecurity must stay one step ahead<\/strong><\/p>\n\n\n\n<p>Cybersecurity must constantly innovate, leveraging cutting-edge technology to stay one step ahead of evolving threats. This relentless race between defenders and attackers is what makes cybersecurity such an exciting and dynamic field. Recent headlines around quantum computing suggest that the age of quantum might be closer than we once thought\u2014a future where a quantum computer could shatter even the most sophisticated encryption effortlessly. This would redefine cybersecurity as we know it. Whether it\u2019s quantum computing, AI, or blockchain, every breakthrough introduces new vulnerabilities, and safeguarding them must be a proactive pursuit, not a reactive one. Because if we wait until the attack happens, it might already be too late.<\/p>\n\n\n\n<p><sup>1<\/sup> IBM, 2025.<br><sup>2<\/sup> Source: CrowdStrike 2025 Global Threat Report, March 2025.<br><sup>3<\/sup> Source: CrowdStrike 2025 Global Threat Report, March 2025.<br><sup>4<\/sup> Source: CrowdStrike 2025 Global Threat Report, March 2025.<br><sup>5<\/sup> Source: World Economic Forum, Global Cybersecurity Report 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are using AI and social engineering to launch more sophisticated attacks, Rapid detection is critical\u2014some breaches escalate in under a minute.<\/p>\n","protected":false},"author":1242,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"footnotes":""},"categories":[148,7],"tags":[1404],"contributors-categories":[529],"class_list":{"0":"post-203495","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-text-articles","7":"category-traders-insight","8":"tag-cyber-security","9":"contributors-categories-wisdomtree-europe"},"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybercriminals are winning\u2014cybersecurity must strike back now<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.interactivebrokers.eu\/campus\/wp-json\/wp\/v2\/posts\/203495\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals are winning\u2014cybersecurity must strike back now\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are using AI and social engineering to launch more sophisticated attacks, Rapid detection is critical\u2014some breaches escalate in under a minute.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.interactivebrokers.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/\" \/>\n<meta property=\"og:site_name\" content=\"IBKR Campus EU\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-01T09:34:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T12:52:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.interactivebrokers.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2068\" \/>\n\t<meta property=\"og:image:height\" content=\"1299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julian Amorim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julian Amorim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\\\/\\\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"Julian Amorim\",\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/#\\\/schema\\\/person\\\/33613f54e9fc9f811b0e641082175d43\"\n\t            },\n\t            \"headline\": \"Cybercriminals are winning\u2014cybersecurity must strike back now\",\n\t            \"datePublished\": \"2025-04-01T09:34:58+00:00\",\n\t            \"dateModified\": \"2025-04-01T12:52:57+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/\"\n\t            },\n\t            \"wordCount\": 1030,\n\t            \"commentCount\": 0,\n\t            \"image\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#primaryimage\"\n\t            },\n\t            \"thumbnailUrl\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/04\\\/31-d-03-cyber-1-1100x691.jpg\",\n\t            \"keywords\": [\n\t                \"cyber security\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Text Articles\",\n\t                \"Traders' Insight\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/\",\n\t            \"url\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/\",\n\t            \"name\": \"Cybercriminals are winning\u2014cybersecurity must strike back now - IBKR Campus EU\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/#website\"\n\t            },\n\t            \"primaryImageOfPage\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#primaryimage\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#primaryimage\"\n\t            },\n\t            \"thumbnailUrl\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/04\\\/31-d-03-cyber-1-1100x691.jpg\",\n\t            \"datePublished\": \"2025-04-01T09:34:58+00:00\",\n\t            \"dateModified\": \"2025-04-01T12:52:57+00:00\",\n\t            \"author\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/#\\\/schema\\\/person\\\/33613f54e9fc9f811b0e641082175d43\"\n\t            },\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"ImageObject\",\n\t            \"inLanguage\": \"en-US\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#primaryimage\",\n\t            \"url\": \"https:\\\/\\\/www.interactivebrokers.eu\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/04\\\/31-d-03-cyber-1.jpg\",\n\t            \"contentUrl\": \"https:\\\/\\\/www.interactivebrokers.eu\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/04\\\/31-d-03-cyber-1.jpg\",\n\t            \"width\": 2068,\n\t            \"height\": 1299,\n\t            \"caption\": \"Executive survey: which of the following will most significantly affect cybersecurity in the next 12 months?\"\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/traders-insight\\\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\\\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\\\/\\\/www.interactivebrokers.eu\\\/campus\\\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Cybercriminals are winning\u2014cybersecurity must strike back now\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/#website\",\n\t            \"url\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/\",\n\t            \"name\": \"IBKR Campus EU\",\n\t            \"description\": \"\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.eu\\\/campus\\\/#\\\/schema\\\/person\\\/33613f54e9fc9f811b0e641082175d43\",\n\t            \"name\": \"Julian Amorim\",\n\t            \"url\": \"https:\\\/\\\/www.interactivebrokers.eu\\\/campus\\\/author\\\/julian1amorim\\\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercriminals are winning\u2014cybersecurity must strike back now","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.interactivebrokers.eu\/campus\/wp-json\/wp\/v2\/posts\/203495\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals are winning\u2014cybersecurity must strike back now","og_description":"Cybercriminals are using AI and social engineering to launch more sophisticated attacks, Rapid detection is critical\u2014some breaches escalate in under a minute.","og_url":"https:\/\/www.interactivebrokers.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/","og_site_name":"IBKR Campus EU","article_published_time":"2025-04-01T09:34:58+00:00","article_modified_time":"2025-04-01T12:52:57+00:00","og_image":[{"width":2068,"height":1299,"url":"https:\/\/www.interactivebrokers.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1.jpg","type":"image\/jpeg"}],"author":"Julian Amorim","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Julian Amorim","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#article","isPartOf":{"@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/"},"author":{"name":"Julian Amorim","@id":"https:\/\/ibkrcampus.eu\/campus\/#\/schema\/person\/33613f54e9fc9f811b0e641082175d43"},"headline":"Cybercriminals are winning\u2014cybersecurity must strike back now","datePublished":"2025-04-01T09:34:58+00:00","dateModified":"2025-04-01T12:52:57+00:00","mainEntityOfPage":{"@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/"},"wordCount":1030,"commentCount":0,"image":{"@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#primaryimage"},"thumbnailUrl":"https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-1100x691.jpg","keywords":["cyber security"],"articleSection":["Text Articles","Traders' Insight"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/","url":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/","name":"Cybercriminals are winning\u2014cybersecurity must strike back now - IBKR Campus EU","isPartOf":{"@id":"https:\/\/ibkrcampus.eu\/campus\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#primaryimage"},"image":{"@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#primaryimage"},"thumbnailUrl":"https:\/\/ibkrcampus.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1-1100x691.jpg","datePublished":"2025-04-01T09:34:58+00:00","dateModified":"2025-04-01T12:52:57+00:00","author":{"@id":"https:\/\/ibkrcampus.eu\/campus\/#\/schema\/person\/33613f54e9fc9f811b0e641082175d43"},"breadcrumb":{"@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#primaryimage","url":"https:\/\/www.interactivebrokers.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1.jpg","contentUrl":"https:\/\/www.interactivebrokers.eu\/campus\/wp-content\/uploads\/sites\/3\/2025\/04\/31-d-03-cyber-1.jpg","width":2068,"height":1299,"caption":"Executive survey: which of the following will most significantly affect cybersecurity in the next 12 months?"},{"@type":"BreadcrumbList","@id":"https:\/\/ibkrcampus.eu\/campus\/traders-insight\/cybercriminals-are-winning-cybersecurity-must-strike-back-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.interactivebrokers.eu\/campus\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals are winning\u2014cybersecurity must strike back now"}]},{"@type":"WebSite","@id":"https:\/\/ibkrcampus.eu\/campus\/#website","url":"https:\/\/ibkrcampus.eu\/campus\/","name":"IBKR Campus EU","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ibkrcampus.eu\/campus\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ibkrcampus.eu\/campus\/#\/schema\/person\/33613f54e9fc9f811b0e641082175d43","name":"Julian Amorim","url":"https:\/\/www.interactivebrokers.eu\/campus\/author\/julian1amorim\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/posts\/203495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/users\/1242"}],"replies":[{"embeddable":true,"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/comments?post=203495"}],"version-history":[{"count":0,"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/posts\/203495\/revisions"}],"wp:attachment":[{"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/media?parent=203495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/categories?post=203495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/tags?post=203495"},{"taxonomy":"contributors-categories","embeddable":true,"href":"https:\/\/ibkrcampus.eu\/campus\/wp-json\/wp\/v2\/contributors-categories?post=203495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}