1、ThreatLabz 2025_AI Security Report2025 Zscaler,Inc.All rights reserved.Executive Summary 3Key Findings 4AI and ML Usage Trends 6 AI/ML transactions overview 6Blocked AI/ML transactions 12Data loss to AI/ML apps 13AI usage by industry 14Industry spotlights 15ChatGPT usage trends 19AI usage by country
2、 20EMEA insights 21APAC insights 22Enterprise AI Risks and Real-World Threat Scenarios 23Core risks of enterprise AI adoption 23DeepSeek and open-source AI:the risk of frontier models in your pocket 25 5 prompts to deception:DeepSeek-generated phishing page 27AIs growing role in cyber threats 29 Sup
3、ercharged social engineering 29 AI-driven malware and ransomware across the attack chain 30 Agentic AI:the next frontier in autonomous AIand attack vectors 31 Case study:How threat actors are exploiting interest in AI 33The Evolving Scope of AI Regulations 35AI Threat Predictions for 2025-2026 37Bes
4、t Practices for Secure Enterprise AI Adoption 395 steps to securely integrate GenAI tools 40How Zscaler Delivers Zero Trust+AI 42Under the hood:Zscalers AI security and data advantage 42A comprehensive approach to AI security 43Leveraging AI security across the attack chain 46Research Methodology 48
5、About ThreatLabz 48About Zscaler 48Table_of Contents_2ThreatLabz 2025 AI Security Report2025 Zscaler,Inc.All rights reserved.Another year in the still new“era of AI”has come and gone,marked by game-changing advancements,rising adoption across industries,and high-profile challenges.Enterprises now se
6、e artificial intelligence(AI)and machine learning(ML)as essential for growth,driving efficiency,smarter decision-making,and faster innovation.On the other hand,AI adoption brings serious security risks,from unsanctioned usage(“shadow AI”)to data exposure.Even more concerning,threat actors seem to ha