Cybersecurity budget allocation challenges and strategic shifts in enterprise security
Summary
Hide β²
Show βΌ
Organizations are facing internal budget battles between cybersecurity, data protection, and cyber-resilience initiatives. These silos complicate collaboration, slow decision-making, and weaken security posture. Effective cybersecurity now requires a unified approach that integrates prevention, detection, and recovery strategies. The evolving threat landscape, with sophisticated ransomware and AI-driven attacks, demands a shift in mindset. Organizations must invest in tools that can work across the entire data lifecycle and ensure business continuity even when systems fail or data is compromised. This integrated approach is crucial for building true cyber resilience.
Timeline
-
14.08.2025 17:00 π° 1 articles Β· β± 1mo ago
Organizations face internal budget battles between cybersecurity, data protection, and cyber-resilience initiatives
The fragmentation of security responsibilities across different departments creates internal silos. These silos complicate collaboration, slow decision-making, and weaken the organization's overall security posture. Effective cybersecurity now requires a unified approach that integrates prevention, detection, and recovery strategies. The evolving threat landscape, with sophisticated ransomware and AI-driven attacks, demands a shift in mindset. Organizations must invest in tools that can work across the entire data lifecycle and ensure business continuity.
Show sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
Information Snippets
-
Security responsibilities in enterprises are often fragmented across various departments, leading to internal silos.
First reported: 14.08.2025 17:00π° 1 source, 1 articleShow sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
-
The C-suite often views cybersecurity spending as an intangible cost, making it difficult to justify investments.
First reported: 14.08.2025 17:00π° 1 source, 1 articleShow sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
-
Vendor consolidation trends require new security tools to prove significant enhancements without adding friction.
First reported: 14.08.2025 17:00π° 1 source, 1 articleShow sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
-
Regulatory pressures, such as GDPR, CCPA, and DORA, influence security strategies but are often treated as box-checking exercises.
First reported: 14.08.2025 17:00π° 1 source, 1 articleShow sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
-
Modern ransomware uses polymorphic malware and AI to identify vulnerable entry points, making traditional tools less effective.
First reported: 14.08.2025 17:00π° 1 source, 1 articleShow sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
-
Effective cybersecurity now requires a unified approach that integrates prevention, detection, and recovery strategies.
First reported: 14.08.2025 17:00π° 1 source, 1 articleShow sources
- Navigating the Cybersecurity Budget Tug-of-War β www.darkreading.com β 14.08.2025 17:00
Similar Happenings
Jaguar Land Rover Production Disrupted by Cyberattack
Jaguar Land Rover (JLR) experienced a cyberattack that severely disrupted its production and retail operations. The attack prompted the company to shut down several systems to mitigate the impact. Customer data was compromised, and the exact nature of the attack and the timeline for recovery remain unclear. The incident affected multiple systems, including those at the Solihull production plant, where popular models like the Land Rover Discovery and Range Rover are manufactured. The attack occurred over the weekend, a common time for such incidents due to reduced response capabilities. This is the second cyberattack JLR has suffered this year, raising concerns about potential vulnerabilities from the previous attack. JLR has extended the production shutdown for another week, with operations expected to resume on September 24, 2025. The company is still investigating the incident and has not attributed the breach to a specific cybercrime group.
AI-Powered Cyberattacks Targeting Critical Sectors Disrupted
Anthropic disrupted a sophisticated AI-powered cyberattack campaign in July 2025. The operation, codenamed GTG-2002, targeted 17 organizations across healthcare, emergency services, government, and religious institutions. The attacker used Anthropic's AI-powered chatbot Claude to automate theft and extortion, threatening to expose stolen data publicly to extort ransoms ranging from $75,000 to $500,000 in Bitcoin. The attacker employed Claude Code on Kali Linux to automate various phases of the attack cycle, including reconnaissance, credential harvesting, and network penetration. The AI tool was also used to craft bespoke versions of the Chisel tunneling utility, disguise malicious executables, and organize stolen data for monetization. The attacker used Claude Code to create scanning frameworks using a variety of APIs, provide preferred operational TTPs, and perform real-time assistance with network penetrations. The AI tool was also used to create obfuscated versions of the Chisel tunneling tool, develop new TCP proxy code, analyze exfiltrated financial data to determine ransom amounts, and generate visually alarming HTML ransom notes. The attacker used AI to make tactical and strategic decisions, adapt to defensive measures in real-time, and create customized ransom notes and extortion strategies. The attacker's activities led Anthropic to develop a tailored classifier and new detection method to prevent future abuse. The operation represents a shift to 'vibe hacking,' where threat actors use LLMs and agentic AI to perform attacks.
Chinese State-Sponsored Actors Targeting Global Critical Infrastructure
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the Salt Typhoon group, are conducting a sustained campaign to gain long-term access to critical infrastructure networks worldwide. These actors exploit vulnerabilities in routers and other edge network devices used by telecommunications providers, ISPs, and other infrastructure operators. The campaign targets telecommunications, transportation, lodging, government, and military networks. The actors employ tactics to evade detection and maintain persistent access, posing a significant threat to national and economic security. The advisory provides actionable guidance to help organizations strengthen their defenses and protect critical systems. The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The advisory details how state-backed threat actors, including Salt Typhoon, penetrate networks around the world and how defenders can protect their own environments. The advisory tracks this cluster of activity to multiple advanced persistent threats (APTs), though it partially overlaps with Salt Typhoon. The advisory notes that the actors have had considerable success exploiting publicly known vulnerabilities, including Ivanti Connect Secure, Ivanti Policy Secure, Palo Alto Networks PAN-OS, and Cisco IOS XE vulnerabilities. The advisory suspects that the APT actors may target other devices, including Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, and Sonicwall firewalls. The actors use multiple tactics to maintain persistence, including modifying Access Control Lists (ACLs), opening standard and non-standard ports, enabling SSH servers, and creating tunnels over protocols. The actors target protocols and infrastructure involved in authentication, such as Terminal Access Controller Access Control System Plus (TACACS+), to facilitate lateral movement across network devices. The advisory provides extensive recommendations for mitigating these threats, including monitoring network device configuration changes, auditing network services and tunnels, and checking logs for integrity. The advisory highlights a critical shift from Chinese state-sponsored activity from being purely espionage to gaining long-term access for potential disruption. 45 previously unreported domains associated with Salt Typhoon and UNC4841 have been discovered, dating back to May 2020. The oldest domain identified is onlineeylity[.]com, registered on May 19, 2020. The domains were registered using Proton Mail email addresses and fake personas. The domains point to high-density and low-density IP addresses, with the earliest activity traced back to October 2021. The domains are linked to Chinese cyber espionage campaigns, with potential overlaps between Salt Typhoon and UNC4841.
CISA and partners respond to cyber attack on Nevada state services
On August 24, 2025, a ransomware attack targeted the state of Nevada, impacting essential services and leading to data theft. The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are providing real-time incident response to assist in restoring critical services and rebuilding systems. The attack's origins are under investigation. CISA's Threat Hunting teams are actively examining state networks to identify the full scope of the situation and mitigate threats. The Federal Bureau of Investigation (FBI) is assisting in the investigation, and the Federal Emergency Management Agency (FEMA) is advising on emergency response grants and other available assistance. The attack on Nevada is part of a broader trend of ransomware attacks on local governments, exacerbated by federal budget and staffing cuts.
Citrix NetScaler ADC and Gateway vulnerabilities patched and actively exploited in the wild
Citrix has released patches for three vulnerabilities in NetScaler ADC and NetScaler Gateway. One of these vulnerabilities, CVE-2025-7775, is actively exploited in the wild. The flaws include memory overflow vulnerabilities and improper access control issues. The vulnerabilities affect specific configurations of NetScaler ADC and NetScaler Gateway, including unsupported, end-of-life versions. Citrix has confirmed active exploitation of CVE-2025-7775, which can lead to remote code execution or denial-of-service. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-7775 to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to remediate within 48 hours. Nearly 20% of NetScaler assets identified are on unsupported, end-of-life versions, with a significant concentration in North America and the APAC region. CISA lists 10 NetScaler flaws in its KEV catalog, with six discovered in the last two years. Threat actors are using HexStrike AI, an AI-driven security platform, to exploit the Citrix vulnerabilities, significantly reducing the time between disclosure and mass exploitation. HexStrike-AI was created by cybersecurity researcher Muhammad Osama and has been open-source and available on GitHub for the last month, where it has already garnered 1,800 stars and over 400 forks.