Artificial intelligence as a threat factor
Today’s digital world is increasingly seen by users as unsafe – and with good reason. The problem is not only the scale of cyberattacks, but also the fact that many companies fail to respond quickly and effectively. Even isolated incidents now reinforce a sense of wider vulnerability, directly reducing trust in online services.
Key Numbers
Cybercrime and fraud in the digital space are no longer rare. Here are some important statistics from leading cybersecurity researchers:
- A Fortinet study found that automated system scans grew by 16.7% year-on-year, reaching 36,000 scans per second worldwide. Hackers are focusing on weak points early in the attack cycle, such as Remote Desktop Protocols, Internet of Things (IoT) systems, and session initiation protocols;
- IBM reports that 20% of 600 surveyed organizations have suffered breaches linked to technology-driven security incidents.
The situation in cryptocurrency markets is even more alarming:
- According to the New York Post, global crypto fraud grew by 456% between May 2024 and April 2025;
- In 2024 criminals stole more than 10,7 billion USD through scams such as romance fraud, fake trading platforms, and “pig butchering” schemes, where scammers build fake relationships before draining victims’ accounts;
- The FBI reported 150,000 crypto-related complaints in the USA in 2024, with losses exceeding 3,9 billion USD. Experts believe the real number is much higher.
The Double Nature of Technology
Modern digital tools bring clear benefits: they help automate routine work, speed up data analysis, and simplify processes. But the same tools can also create new risks. They can imitate human behavior, generate fake documents and voices, and create convincing social-engineering scenarios (Source: TechRadar).
In short, the same technology that makes business easier also makes attackers more dangerous.
The most common threats include:
Automated Attacks: Scanning for vulnerabilities, cracking passwords, and spreading malware can now be done automatically, reducing attack times from weeks to just minutes.
Social Engineering: Fraud that uses synthetic media is growing fast. In just one year, crypto scams with deepfakes and voice cloning increased more than fourfold (Source: New York Post). Victims are often pressured into transferring money through fake “urgent situations.”
Real Incidents
Cybercriminals are already using these tools not only to write malicious code, but also to carry out complex attack chains – from information gathering to personalized extortion campaigns (Source: ITPro). These breaches are happening in real organizations – including healthcare, government, and business.
Conclusion
Digital technology is no longer just about efficiency. It has become a factor that both speeds up business processes and strengthens cyberthreats. Its dual nature is clear: automation can be used for defense, but also for attack.
The real question is not whether to adopt advanced tools, but how to build a stronger level of security around them.
The work of DIVA.EXCHANGE focusses very much on the development of free banking technology for everyone. To fulfil this mission in the future, it is a necessity to have a secure and completely reliable, private and anonymous network as a foundation. This is why DIVA.EXCHANGE is focussing that much on the research of the I2P network. We will cover this in more detail in our next article.
THIS IS DIVA.EXCHANGE
The non-profit association diva.exchange, Switzerland, uses a barrier-free and collaborative approach to create free banking technology for everyone. Open-source technology ensures the privacy of all participants in the financial system of the future. The blockchain-based system is fully distributed. Everyone can participate in diva.exchange.
Diva.exchange is committed to the belief that only commercially free technology can reliably protect user privacy.
Collaboration with the scientific community plays an important role in the development of diva.exchange. The results of diva.exchange research are constantly being validated by academic institutions and publicly presented at specialized conferences.
LEARN MORE ABOUT OUR WORK
All technical information is available at: https://github.com/diva-exchange/
I2P beginner’s guide and installation guide:https://www.diva.exchange/en/privacy/introduction-to-i2p-your-own-internet-secure-private-and-free/
All videos are here: https://odysee.com/@diva.exchange:d/
Introduction to I2P: https://en.wikipedia.org/wiki/I2P
Testnet of diva.exchange: https://testnet.diva.exchange
CONTACT US
Twitter: https://twitter.com/@DigitalValueX
Mastodon: https://social.diva.exchange/@social
If you still have questions you can always find us on Telegram: https://t.me/diva_exchange_chat_de (in English, German, or Russian)