{"@type":"StructuredNewsArticle","access":{"license":"neupai_standard","structured_data":"free","full_text_access":null,"full_text_available":false,"attribution_required":true},"content":{"claims":[{"id":"c1","type":"fact","as_of":"2025","figures":{"unit":"%","value":40,"converted":null,"approximate":false},"as_of_raw":"last year","statement":"40% of attacks observed last year started with vulnerability exploitation","comparison":null,"expiry_hint":null,"source_type":"research_paper","as_of_explicit":false},{"id":"c2","type":"fact","as_of":"2025","figures":{"unit":"%","value":44,"converted":null,"approximate":false},"as_of_raw":"compared to the previous year","statement":"Attacks targeting public applications increased by 44% compared to the previous year","comparison":"previous_year_same_period","expiry_hint":null,"source_type":"research_paper","as_of_explicit":false},{"id":"c3","type":"fact","as_of":"2025","figures":{"unit":"%","value":49,"converted":null,"approximate":false},"as_of_raw":"last year","statement":"Ransomware and extortion groups increased by 49%","comparison":"previous_year_same_period","expiry_hint":null,"source_type":"research_paper","as_of_explicit":false},{"id":"c4","type":"fact","as_of":"2025","figures":{"unit":"배","value":4,"converted":null,"approximate":true},"as_of_raw":"since 2020","statement":"Major breaches targeting supply chains and third-party environments have grown to nearly 4 times the level since 2020","comparison":"2020_baseline","expiry_hint":null,"source_type":"research_paper","as_of_explicit":false},{"id":"c5","type":"fact","as_of":"2025","figures":{"unit":"건","value":300000,"converted":null,"approximate":false},"as_of_raw":"last year","statement":"Over 300,000 ChatGPT credentials were found to be exposed by infostealer malware during last year","comparison":null,"expiry_hint":null,"source_type":"research_paper","as_of_explicit":false},{"id":"c6","type":"fact","as_of":"2026-03","figures":{"unit":"명","value":33700000,"converted":null,"approximate":true},"as_of_raw":"according to investigation","statement":"The former engineer was found to have accessed information of approximately 33.7 million customers","comparison":null,"expiry_hint":null,"source_type":"government_official","as_of_explicit":false},{"id":"c7","type":"fact","as_of":"2025","figures":null,"as_of_raw":"for 5 consecutive years","statement":"Manufacturing was the most attacked industry for 5 consecutive years","comparison":"industry_comparison","expiry_hint":null,"source_type":"research_paper","as_of_explicit":false},{"id":"c8","type":"fact","as_of":"2025","figures":{"unit":"%","value":27.7,"converted":null,"approximate":false},"as_of_raw":"last year","statement":"Manufacturing accounted for 27.7% of all incidents last year","comparison":null,"expiry_hint":null,"source_type":"research_paper","as_of_explicit":false}],"topics":["ai","cybersecurity","enterprise security","cloud","authentication"],"summary":"As AI spreads throughout enterprises, attackers are using the same technology to execute existing attacks faster and more efficiently, requiring companies to reorganize basic security controls like authentication, authorization, and logging rather than pursuing new security solutions.","entities":[{"name":"IBM","type":"company","metadata":{"parent":null,"ticker":"IBM"},"canonical_id":"corp:us:ibm","role_in_article":"primary_subject"},{"name":"Microsoft","type":"company","metadata":{"parent":null,"ticker":"MSFT"},"canonical_id":"corp:us:microsoft","role_in_article":"mentioned"},{"name":"Coupang","type":"company","metadata":{"parent":null,"ticker":"CPNG"},"canonical_id":"corp:kr:coupang","role_in_article":"mentioned"},{"name":"ChatGPT","type":"product","metadata":{"parent":"corp:us:openai"},"canonical_id":"product:us:chatgpt","role_in_article":"mentioned"},{"name":"X-Force Threat Intelligence Index","type":"product","metadata":{"parent":"corp:us:ibm"},"canonical_id":"product:us:x-force-threat-intelligence-index","role_in_article":"source"}],"headline":"[AI, Now It's On-Site③] As AI Grows, Attacks Get Faster... Why Corporate Security Must Return to 'Fundamentals' - Tech42","geography":["KR","US"]},"@context":"https://neupai.io/schema/v0.2","identity":{"ai_url":null,"author":"황정호 기자","language":"en","publisher":{"name":"테크42","type":"online","domain":"www.tech42.co.kr"},"article_id":"tech42_20260326_ai-security-basics-return","updated_at":null,"originality":"self_produced","article_type":"analysis","published_at":"2026-03-26T22:03:28.000Z","canonical_url":"https://www.tech42.co.kr/ai-%ec%9d%b4%ec%a0%9c%eb%8a%94-%ed%98%84%ec%9e%a5%ec%9d%b4%eb%8b%a4%e2%91%a2-ai%ea%b0%80-%ec%bb%a4%ec%a7%88%ec%88%98%eb%a1%9d-%ea%b3%b5%ea%b2%a9%eb%8f%84-%eb%b9%a8%eb%9d%bc%ec%a7%84%eb%8b%a4/"},"temporal":{"freshness":"archival","next_update_expected":null},"provenance":{"source_chain":["primary_reporting"],"related_articles":[],"original_source_url":null}}