AI Adoption Fuels Surge in Critical Security Flaws

▼ Summary
– Bugcrowd’s 2025 report reveals a sharp increase in hardware, API, and network vulnerabilities, exposing organizations to new risks.
– AI-assisted software development is widening the attack surface by accelerating release cycles and leaving security gaps in access control and data protection.
– The analysis shows significant increases in specific vulnerabilities, including an 88% rise in hardware flaws and a 36% increase in broken access control issues.
– CISOs face evolving responsibilities, needing to balance technical defense with broader business alignment and communication.
– The report concludes that collective intelligence and continuous offensive testing are essential to withstand escalating, AI-accelerated threats.
A significant surge in hardware, API, and network vulnerabilities is creating unprecedented risks for modern organizations, according to the latest cybersecurity research. The rapid integration of artificial intelligence into software development processes, while driving innovation, is simultaneously creating a broader and more complex attack surface. This expansion leaves critical gaps in areas like access control and data protection, which malicious actors are increasingly exploiting.
The annual report from Bugcrowd, drawing on hundreds of thousands of data points from global bug bounty programs, highlights a high-stakes environment. Nick McKenzie, CISO of Bugcrowd, observed, “We are in a high-stakes innovation race, but with every AI advance, the security landscape becomes exponentially more complex.” He emphasized that attackers are leveraging this complexity while still focusing on fundamental layers like hardware and APIs, noting that no single security leader can manage this challenge alone.
John Watters, CEO of iCOUNTER, suggested that security chiefs have long understood the problem of an almost infinite attack surface. He described a new era for defenders where “everyone becomes patient zero,” with novel, unpredictable threats replacing the recycled attack methods of the past.
The data from the 2025 analysis reveals several alarming trends:
- An 88% increase in hardware vulnerabilities, largely driven by the proliferation of Internet of Things devices.
- A significant 32% rise in payouts for critical vulnerabilities discovered by researchers.
- Broken access control flaws saw a 36% increase, making them the leading vulnerability category.
- Instances of sensitive data exposure jumped by 42%.
- API vulnerabilities grew by 10%, while network vulnerabilities doubled.
Diana Kelley, CISO at Noma Security, pointed out that foundational security issues remain the most pressing. She warned that the autonomous nature of agentic AI systems could intensify these challenges without strong monitoring and privilege controls in place.
The role of the Chief Information Security Officer is also undergoing a significant transformation. The report indicates CISOs must now balance deep technical expertise with strategic business communication. Bruce Jenkins, CISO at Black Duck, affirmed that the CISO is an essential voice in business discussions, but stressed that public-facing duties must not detract from the primary mission: defending the enterprise from cyber threats proactively.
This evolution is partly driven by regulatory pressures. Agnidipta Sarkar, chief evangelist at ColorTokens, noted that regulations are pushing security leaders toward “greater alignment towards business enablement through agile and collaborative cyber practices.”
Another emerging danger comes from AI-enabled impersonation attacks. Randolph Barr, CISO at Cequence Security, highlighted that this threat goes beyond simple phishing. “This goes beyond phishing, it’s targeted impersonation backed by research and AI,” he said, arguing that security systems must evolve beyond blaming human error to instead detect and neutralize these advanced attacks as they happen.
Ultimately, the report concludes that building resilience against these escalating digital threats will require a collective intelligence approach and continuous offensive security testing.
(Source: Info Security)
