Generative AI attacks
Hyper-personalised phishing, voice and video deepfakes, and automatically generated malicious code. Volume has multiplied 10x in 2 years.
CiberSec · José Enrique Ibarra
Threats evolve with AI. Your defence must too. Audit, strategy and protection for companies that cannot afford a breach.
Threat landscape
In 2025 AI has changed the board. Attackers are faster, more precise and cheaper. Defence has to be smarter.
Hyper-personalised phishing, voice and video deepfakes, and automatically generated malicious code. Volume has multiplied 10x in 2 years.
RaaS democratises attacks. Any actor can launch sophisticated ransomware by subscription. Average encryption time: 45 minutes.
One compromised vendor compromises all its clients. 62% of 2024 breaches arrived through third parties.
New EU regulations require technical controls, response plans and 72h notification. Penalties reach 2% of global turnover.
Services
We don't sell tools. We build your organisation's defensive capability with AI and proven methodology.
01 / 04
Full assessment of your security posture. We identify vulnerabilities, NIS2/DORA compliance gaps and prioritised critical risks.
02 / 04
Zero trust architecture adapted to your organisation. Identity, network, endpoints and data protected with least privilege principle.
03 / 04
Security operations centre powered by AI. Real-time threat detection, automated response and predictive analysis.
04 / 04
NIS2, DORA, GDPR, ENS. Full accompaniment to achieve and maintain regulatory compliance without paralysing the business.
AI + Cybersecurity
Attackers are already using AI. The question is not whether you should use it in your defence — it's when you start.
Real-time detection
AI models detect anomalous patterns in milliseconds. A human analyst takes minutes or hours. The difference can be catastrophic.
Threat prediction
Global threat intelligence analysis to anticipate attack vectors before they affect you. From reactive to proactive.
Automated response
AI-powered SOAR executes response playbooks in seconds. Containment, isolation and remediation without human intervention for known threats.
False positive reduction
Traditional SOCs manage thousands of alerts daily. AI filters the noise and prioritises what truly matters. −80% irrelevant alerts.
Why act now
The data is clear. The cost of a breach is 10× the cost of preventing it.
Average breach cost
IBM Cost of a Data Breach 2024 figure. Includes response, legal, reputation and business loss.
AI-powered attack growth
Increase in attacks generated or enhanced by AI in the last 24 months. The curve keeps accelerating.
NIS2 notification deadline
Affected companies must notify significant incidents within 72 hours. Without a prior plan, it is impossible.
Breaches via third parties
More than half of 2024 breaches arrived through suppliers or partners. The supply chain matters.
False positives with AI
An AI-powered SOC drastically reduces noise. Analysts focus on real threats.
Automated response
Response time of an AI-powered SOAR to known threats. A human needs minutes.
Blog
No alarmism. Data-driven. For professionals who need strategic clarity.
Ecosystem
Personal brand
joseenrique.es
Professional profile and career path.
Visit →
AI for executives
ai.joseenrique.es
AI strategy for the C-Suite.
Visit →
Project management
aiprojectmanager.es
Intelligent PMO with AI.
Visit →
Cybersecurity
ciberseguridad.joseenrique.es
AI-powered defence. You are here.
← Here
Next step
A 45-minute diagnostic session. No product sales. Just clarity on your current security posture and the 3 most urgent risks.
Request free diagnosticNo commitment · No jargon · With a concrete plan