IBM has released its 20th annual Cost of a Data Breach Report, and for the first time in five years, global breach costs have declined.
The 2025 report highlights the growing role of artificial intelligence in both defense and offense. Faster containment driven by AI-powered tools helped lower costs, yet at the same time attackers are weaponizing generative AI for phishing and deepfakes. Meanwhile, organizations are racing to adopt AI without establishing governance, leaving them exposed to shadow AI risks and costly incidents.
This year marked a global turning point: overall breach costs decreased for the first time since 2019. Faster detection and containment, driven by AI-powered defenses, contributed to this drop. But the U.S. bucked the trend, setting a new record with average costs that doubled the global figure, largely due to regulatory pressure and higher detection expenses.
While AI adoption is surging across industries, security controls are not keeping pace. Most organizations deploying AI lack basic governance policies and access controls. Shadow AI in particular has emerged as a hidden but costly threat, amplifying risks to sensitive data and driving breach costs higher.
Attackers are no longer manually crafting phishing emails or scams. Generative AI has dramatically reduced the time needed to create convincing lures and fake personas. This year’s findings confirm what many defenders feared: AI is not just an enterprise tool, it is also a weapon for adversaries.
Ransomware remains one of the most disruptive and expensive types of attacks. However, organizations are increasingly refusing to pay ransom demands. At the same time, fewer are involving law enforcement, which could undermine the cost savings previously associated with coordinated responses.
One of the more surprising findings is that fewer organizations plan to increase security spending after a breach. While AI-driven solutions remain a top priority among those who do invest, the decline in overall post-breach investment may reflect fatigue, budget pressures, or misplaced confidence.
The 2025 IBM report makes one thing clear: AI is rewriting the rules of cybersecurity.
Defenders who embrace AI and automation are reducing breach lifecycles by months and saving millions. But attackers are just as adaptive. Phishing and impersonation powered by generative AI are already mainstream, and shadow AI is creating blind spots inside organizations that many leaders do not even know exist.
From a ThreatMon perspective, this is a critical inflection point. The findings validate why organizations need continuous monitoring, intelligence-driven defenses, and governance around AI usage. ThreatMon’s solutions can directly help address these challenges in four ways:
The bottom line: IBM’s 2025 report should serve as a wake-up call. AI will not wait for governance frameworks to catch up, and neither will attackers. ThreatMon equips organizations with the intelligence, visibility, and automation needed to not only close the AI oversight gap but to turn it into a defensive advantage. The organizations that succeed in this new era will be those that deploy AI with discipline, monitor it with rigor, and integrate threat intelligence at every stage of the breach lifecycle.