This website use cookies to help you have a superior and more admissible browsing experience on the website.
Loading...
Enterprise data transfers to AI and machine learning applications surged to 18,033 terabytes in 2025, a 93% year-over-year increase.
Organizations now report an average of 223 generative AI-related data policy violations per month, with the top quartile experiencing as many as 2,100 monthly incidents. ChatGPT alone accounted for more than 410 million data loss prevention (DLP) policy violations in 2025, including attempts to share Social Security numbers, source code, and medical records.
We aggregated data from IBM, Zscaler, Netskope, GitGuardian, Gartner, CrowdStrike, and dozens of other primary sources to compile this report. The findings point to a rapidly widening structural gap: enterprise AI adoption is accelerating at triple-digit rates, while governance, visibility, and enforcement capabilities continue to lag behind in the single digits.
Key Takeaways
The sheer volume of data flowing into AI tools has moved beyond what most security programs were originally designed to monitor.
In 2025, Zscaler’s ThreatLabz platform analyzed 989.3 billion AI/ML transactions across approximately 9,000 organizations, revealing a landscape far removed from controlled adoption.
The number of distinct AI applications generating enterprise transactions quadrupled to more than 3,400, yet many organizations still lack even a basic inventory of the AI models operating within their environments. ChatGPT alone produced more DLP violations than many companies see across their entire application portfolio.
|
Metric |
Value |
Source |
|
Enterprise data transferred to AI/ML apps (2025) |
18,033 TB |
Zscaler ThreatLabz 2026 AI Security Report |
|
Year-over-year increase in AI data transfers |
93% |
Zscaler ThreatLabz 2026 AI Security Report |
|
AI/ML transactions analyzed across ~9,000 orgs |
989.3 billion |
Zscaler ThreatLabz 2026 AI Security Report |
|
Distinct AI applications driving enterprise transactions |
3,400+ (4× YoY increase) |
Zscaler ThreatLabz 2026 AI Security Report |
|
ChatGPT DLP policy violations (2025) |
410 million |
Zscaler ThreatLabz 2026 AI Security Report |
|
Data volume to Grammarly |
3,615 TB |
Zscaler ThreatLabz 2026 AI Security Report |
|
Data volume to ChatGPT |
2,021 TB |
Zscaler ThreatLabz 2026 AI Security Report |
|
AI/ML transactions blocked due to data exposure concerns |
39% of all transactions |
Zscaler ThreatLabz 2026 AI Security Report |
The concentration of risk is striking. OpenAI services generated three times more enterprise traffic than the next competitor, and Grammarly and ChatGPT alone accounted for more than 5,600 TB of corporate data flow—transforming productivity tools into de facto repositories of corporate intelligence.
IBM’s 2025 Cost of a Data Breach Report revealed a paradox: the global average cost of a data breach fell to $4.44 million—a decrease of $94.88 million and the first decline in five years. AI-powered defenses contributed to faster detection and containment. However, the same report also found that shadow AI increased breach costs by $670,000, making it one of the three most expensive contributing factors in a breach.
The United States presented a far darker picture, with the average cost of a data breach rising to a record $10.22 million. In the insurance market, cyber claim severity for large U.S. businesses doubled to more than $4.4 million in 2025, even as claim frequency declined by 34%, driven by increasingly sophisticated AI-enabled attacks (Chubb 2026 Cyber Claims Report).
|
Metric |
Value |
Source |
|
Global average data breach cost (2025) |
$4.44 million |
IBM/Ponemon Cost of a Data Breach 2025 |
|
US average data breach cost (2025) |
$10.22 million (all-time high) |
IBM/Ponemon Cost of a Data Breach 2025 |
|
Shadow AI additional breach cost |
$670,000 |
IBM/Ponemon Cost of a Data Breach 2025 |
|
Organizations breached due to shadow AI |
20% (1 in 5) |
IBM/Ponemon Cost of a Data Breach 2025 |
|
Breach cost savings with extensive AI/automation |
$1.9 million saved; 80 days faster containment |
IBM/Ponemon Cost of a Data Breach 2025 |
|
Mean breach detection and containment lifecycle |
241 days (9-year low) |
IBM/Ponemon Cost of a Data Breach 2025 |
|
Cyber claim severity (large US businesses, 2025) |
Doubled to $4.4 million+ |
Chubb 2026 Cyber Claims Report |
|
US data-breach claims exceeding historic threshold |
$10.2 million |
Chubb 2026 Cyber Claims Report |
Note: The IBM/Ponemon report is based on real-world breaches experienced by 600 organizations globally across 17 sectors and 16 countries, with 3,470 interviews conducted between March 2024 and February 2025.
Shadow AI—the use of unsanctioned, ungoverned AI tools by employees—has become the dominant data loss vector that most organizations cannot effectively detect.
The behavior is nearly universal: employees routinely paste, upload, and share sensitive data with AI tools as part of their everyday workflows, often through personal accounts that exist entirely outside corporate visibility.
What makes this exposure structurally dangerous is that it generates no malware signature, no suspicious login pattern, and no alert in legacy security tools. From a monitoring perspective, it appears indistinguishable from legitimate work.
The personal account problem overshadows nearly every other data loss pathway. When employees use free-tier AI tools through personal accounts, organizations lose visibility entirely: there are no audit trails, no DLP controls, and no guarantees that the data will not be used to train public models. LayerX Security found that 77% of employees paste data directly into generative AI prompt boxes, and 82% of those interactions occur through non-corporate accounts (LayerX Enterprise AI and SaaS Data Security Report 2025).
|
Metric |
Value |
Source |
|
Employees pasting company data into GenAI |
77% |
IBM Cost of a Data Breach 2025 / LayerX Security |
|
Paste actions through personal/non-corporate accounts |
82% |
LayerX Enterprise AI and SaaS Data Security Report 2025 |
|
GenAI users accessing tools via personal accounts |
47% |
Netskope Cloud and Threat Report: 2026 |
|
Employees using free-tier AI tools via personal accounts |
68% |
Menlo Security 2025 Report |
|
Sensitive data exposures from personal/free accounts |
12% of all exposures |
Harmonic Security (Q3 2025) |
|
Copy-and-paste attempts logged in a single month |
155,005 copy; 313,120 paste |
Menlo Security 2025 Report |
The data employees share with AI tools is far from trivial. Regulated data—including personal, financial, and healthcare information- accounts for 54% of all GenAI-related policy violations.
In the financial services sector, the exposure is even more severe: regulated data represents 59% of violations, followed by intellectual property at 20%, source code at 11%, and passwords and API keys at 9% (Netskope Threat Labs Financial Services Report).
|
Metric |
Value |
Source |
|
Regulated data as share of GenAI policy violations |
54% |
Netskope Cloud and Threat Report: 2026 |
|
Regulated data violations in financial services |
59% |
Netskope Threat Labs Financial Services Report |
|
Intellectual property as share of violations |
20% |
Netskope Threat Labs Financial Services Report |
|
Source code as share of violations |
11% |
Netskope Threat Labs Financial Services Report |
|
File uploads to GenAI containing sensitive data |
26.4% (up from 22% in Q2 2025) |
Harmonic Security (Q3 2025) |
|
Business/legal data as share of sensitive disclosures |
57% |
Harmonic Security (Q3 2025) |
|
Technical data (65% proprietary source code) |
25% of sensitive disclosures |
Harmonic Security (Q3 2025) |
The lack of employee training further amplifies the behavioral risk. 58% of employees report receiving no training from their employers on the data security and privacy risks of AI tools, according to a 6,500-person study across seven countries.
Meanwhile, 65% of respondents use AI in daily life—a 21% year-over-year increase. Among data professionals specifically, 40% admit to using unapproved AI tools at work (General Assembly, December 2025).
|
Metric |
Value |
Source |
|
Employees with no AI security/privacy training |
58% |
National Cybersecurity Alliance / CybNet (Sept 2025) |
|
Workers who shared sensitive info with AI tools |
43% |
National Cybersecurity Alliance / CybNet (Sept 2025) |
|
Data professionals using unapproved AI tools |
40% |
General Assembly (Dec 2025) |
|
Negative GenAI data incidents experienced |
Nearly 80% of organizations |
Komprise 2025 AI Survey |
|
Incidents resulting in financial/customer/reputational damage |
13% |
Komprise 2025 AI Survey |
|
Organizations “extremely worried” about shadow AI |
46% |
Komprise 2025 AI Survey |
Menlo Security recorded 155,005 copy and 313,120 paste attempts in a single month across its telemetry—more than 10,000 paste actions per day in just the monitored subset of organizations (Menlo Security 2025 Report: How AI is Shaping the Modern Workspace).
The rise of AI coding assistants has supercharged software production; however, the volume of credentials, API keys, and tokens inadvertently embedded within code has also surged.
GitGuardian’s State of Secrets Sprawl 2026 report documented the highest-ever annual increase in leaked secrets since tracking began in 2021. AI service secrets grew faster than any other category, and a new generation of AI infrastructure tools introduced entirely new leakage pathways. The code that ships faster is also shipping with more embedded credentials.
28.65 million new hardcoded secrets were detected in public GitHub commits in 2025—a 34% year-over-year jump, making the largest single-year increase on record (GitGuardian).
Public commits surged 43% to approximately 1.94 billion, while the developer base grew 33%. AI-specific secrets reached 1,275,105, up 81% year-over-year, with DeepSeek API keys alone accounting for 113,000 leaked instances. Eight of the ten fastest-growing secret detector categories were tied to AI services.
|
Metric |
Value |
Source |
|
Hardcoded secrets leaked on public GitHub (2025) |
28.65 million |
GitGuardian State of Secrets Sprawl 2026 |
|
Year-over-year increase in leaked secrets |
34% (largest jump since 2021) |
GitGuardian State of Secrets Sprawl 2026 |
|
AI service secrets leaked |
1,275,105 (up 81% YoY) |
GitGuardian State of Secrets Sprawl 2026 |
|
DeepSeek API keys leaked |
113,000 |
GitGuardian State of Secrets Sprawl 2026 |
|
Public GitHub commits (2025) |
1.94 billion (up 43% YoY) |
GitGuardian State of Secrets Sprawl 2026 |
|
AI infrastructure secrets leak rate vs. core model providers |
5× faster |
GitGuardian State of Secrets Sprawl 2026 |
|
Secrets from 2022 still active in 2025 |
64% |
GitGuardian State of Secrets Sprawl 2026 |
|
Internal repos vs. public repos likelihood of hardcoded secrets |
6× more likely |
GitGuardian State of Secrets Sprawl 2026 |
AI coding assistants are not just accelerating development, they are introducing secrets at measurably higher rates. Commits co-authored by Claude Code leaked secrets at a 3.2% rate, more than double the 1.5% baseline across all public GitHub commits.
The researchers noted that the gap between AI-assisted and human-only leak rates began to converge around September 2025, coinciding with improved model guardrails.
At the same time, a new attack surface emerged: 24,008 unique secrets were exposed through Model Context Protocol (MCP) configuration files, with 2,117 of those credentials still valid at the time of analysis. The exposure stemmed directly from documentation practices that normalized embedding API keys in plaintext configuration files.
|
Metric |
Value |
Source |
|
Claude Code secret leak rate |
3.2% (vs. 1.5% baseline) |
GitGuardian State of Secrets Sprawl 2026 |
|
Secrets exposed via MCP configurations |
24,008 (2,117 valid) |
GitGuardian State of Secrets Sprawl 2026 |
|
Internal collaboration tool secrets incidents |
28% of internal exposure |
GitGuardian State of Secrets Sprawl 2026 |
|
Internal repositories containing hardcoded secrets |
~33% (1 in 3) |
GitGuardian State of Secrets Sprawl 2026 |
The AI attack surface is expanding simultaneously across three dimensions: AI systems themselves are vulnerable, attackers are leveraging AI to accelerate offensive operations, and a new generation of autonomous AI agents is creating incidents that many organizations are unable to detect or contain.
One of the most alarming findings of 2025 came from Zscaler’s red team assessments: 100% of the enterprise AI systems tested contained critical vulnerabilities. The median time to first critical failure was just 16 minutes, and 90% of systems were compromised in under 90 minutes, with the fastest failure occurring in a single second.
These weaknesses included data leakage, prompt manipulation, hallucinations, policy bypasses, and inadequate safety alignment, with even simple one-shot prompts proving effective. Separately, a study conducted by Anthropic, the UK AI Safety Institute, and researchers from Oxford demonstrated that as few as 250 malicious documents could backdoor an LLM, regardless of model size.
|
Metric |
Value |
Source |
|
Enterprise AI systems with critical vulnerabilities |
100% |
Zscaler ThreatLabz 2026 AI Security Report |
|
Median time to first critical failure |
16 minutes |
Zscaler ThreatLabz 2026 AI Security Report |
|
Systems compromised within 90 minutes |
90% |
Zscaler ThreatLabz 2026 AI Security Report |
|
Documents needed to backdoor any LLM |
250 (regardless of model size) |
Anthropic / UK AISI / Oxford (Oct 2025) |
|
Incidents involving data exposure or privacy violations |
23% of recorded incidents |
AI Incident Database (ongoing) |
|
Incidents with no documented detection mechanism |
38% of recorded incidents |
AI Incident Database (ongoing) |
AI-enabled adversary activity surged by 89% year over year, with attackers increasingly using generative AI for reconnaissance, credential theft, exploit development, and evasion. The average eCrime breakout time—the period between initial compromise and lateral movement—fell to 29 minutes in 2025, representing a 65% acceleration from the previous year. The fastest recorded breakout occurred in just 27 seconds.
Organizations faced an average of 1,968 cyberattacks per week in 2025, a 70% increase compared with 2023. Meanwhile, 82% of detections in 2025 were malware-free, as adversaries increasingly relied on valid credentials and trusted access pathways instead of traditional malware.
|
Metric |
Value |
Source |
|
AI-enabled adversary operations increase |
89% YoY |
CrowdStrike 2026 Global Threat Report |
|
Average eCrime breakout time (2025) |
29 minutes (fastest: 27 seconds) |
CrowdStrike 2026 Global Threat Report |
|
Breakout time acceleration vs. 2024 |
65% faster |
CrowdStrike 2026 Global Threat Report |
|
Average weekly cyberattacks per organization (2025) |
1,968 (up 70% from 2023) |
Check Point Research 2026 |
|
Malware-free detections |
82% |
CrowdStrike 2026 Global Threat Report |
|
Breaches involving attackers using AI |
16% |
IBM/Ponemon Cost of a Data Breach 2025 |
|
Organizations targeted via malicious GenAI prompt injection |
90+ |
CrowdStrike 2026 Global Threat Report |
The emergence of autonomous AI agents—systems capable of modifying records, creating accounts, and deploying code without human review—has introduced a governance gap that is already leading to real-world incidents. According to research from the Cloud Security Alliance and Token Security, 65% of organizations experienced at least one cybersecurity incident caused by AI agents within the past year.
Among those incidents, 61% involved the exposure of sensitive data, 43% resulted in operational disruption, and 35% led to direct financial losses. Despite these risks, only 19% of organizations classify AI agents as equivalent to human insiders for risk management purposes, while 63% remain unable to enforce purpose limitations on agent behavior.
|
Metric |
Value |
Source |
|
Organizations with AI agent cybersecurity incidents |
65% |
CSA / Token Security (April 2026) |
|
AI agent incidents involving data exposure |
61% |
CSA / Token Security (April 2026) |
|
Organizations unable to enforce purpose limitations on agents |
63% |
CSA / Token Security (April 2026) |
|
Organizations unable to terminate a misbehaving agent |
60% |
CSA / Token Security (April 2026) |
|
Organizations classifying AI agents as equivalent to human insiders |
19% |
CSA / Token Security / DTEX 2026 |
In a February 2026 red team exercise, an autonomous offensive AI agent achieved full read-and-write access to a production database at one of the world’s best-resourced organizations in under two hours—without credentials and without human intervention
The single most structural finding across all research is the widening gap between AI deployment velocity and governance maturity. AI tools are deployed at 73% of organizations, but governance that enforces security policy in real time has reached only 7%—a 66-point structural deficit. This is not a gap that will close organically. AI adoption is accelerating: Cyberhaven Labs data shows total enterprise endpoint AI adoption grew 509% between February 2025 and February 2026, with coding assistants up 357% and Claude adoption alone surging 5,680% (Cyberhaven Labs, May 2026). Governance programs are not scaling at remotely comparable rates.
|
Metric |
Value |
Source |
|
Organizations deploying AI tools |
73% |
Cybersecurity Insiders / Cyera (2026) |
|
Organizations with real-time AI governance |
7% |
Cybersecurity Insiders / Cyera (2026) |
|
Governance deficit |
66 percentage points |
Cybersecurity Insiders / Cyera (2026) |
|
AI security budgets increased this year |
90% of organizations |
Cybersecurity Insiders / Cyera (2026) |
|
Security pros feeling less secure than 12 months ago |
29% |
Cybersecurity Insiders / Cyera (2026) |
|
Organizations with gaps in AI activity visibility |
94% |
Cybersecurity Insiders / Cyera (2026) |
|
Cannot distinguish personal from corporate AI accounts |
88% |
Cybersecurity Insiders / Cyera (2026) |
|
Have semantic content controls (vs. pattern-matching DLP) |
8% |
Cybersecurity Insiders / Cyera (2026) |
|
Organizations describing AI governance as reactive or developing |
68% |
Cybersecurity Insiders / Cyera (2026) |
|
Experienced AI-related near-miss data exposure |
39% (17% changed nothing) |
Cybersecurity Insiders / Cyera (2026) |
The endpoint reality amplifies the governance gap. AI endpoint adoption grew 509% year-over-year, coding assistants 357%, and Claude usage 5,680%—all happening faster than security programs can inventory, classify, or govern these tools.
Gartner projects that 40% of enterprise applications will embed task-specific AI agents by the end of 2026, up from less than 5% at the start of 2025. That means the governance surface area is about to expand another 8× in a single year. Gartner separately forecasts that up to 40% of enterprises globally will experience a shadow AI-related breach by 2030 (Gartner, November 2025).
Only 12% of organizations feel “very prepared” to assess, manage, and recover from AI governance risks (The 2025 New Generation of Risk Report). Meanwhile, the global cybersecurity workforce gap reached 4.8 million professionals, a 19% increase from the previous year (ISC2 Cybersecurity Workforce Study 2024, the most recent available)—meaning the talent pool available to close the governance gap is shrinking even as the problem expands.
The regulatory landscape shifted from proposal to enforcement in 2025–2026. The EU AI Act’s prohibited practices provisions became enforceable on August 2, 2025, carrying fines of up to €35 million or 7% of global annual turnover—whichever is higher. For large technology companies, 7% of global revenue translates to multi-billion-euro exposure. General-purpose AI model rules activate in August 2026. In the US, 20 states now enforce consumer privacy laws, with eight new statutes taking effect in 2025 alone (Chambers and Partners, 2025 Year in Review). The Italian Data Protection Authority fined Replika €5 million for unlawful AI training practices (December 2025).
AI copyright litigation escalated dramatically. Federal AI-related copyright filings in the US surged from 22 in 2024 to 94 in 2025—a 327% increase—with 26 additional filings already recorded in early 2026 (Review of AI Law). The total number of pending copyright lawsuits against AI developers approached 70 by year-end 2025, more than doubling from approximately 30 at the end of 2024 (Copyright Alliance, January 2026). The largest AI copyright settlement to date—Anthropic’s $1.5 billion agreement over pirated books used in training data—was finalized in September 2025.
|
Metric |
Value |
Source |
|
EU AI Act maximum fine (prohibited practices) |
€35 million or 7% of global annual turnover |
EU AI Act, Articles 99–101 |
|
EU AI Act prohibited practices enforcement date |
August 2, 2025 |
EU AI Act |
|
US states enforcing consumer privacy laws (end of 2025) |
20 states |
Chambers and Partners |
|
US federal AI copyright filings (2025) |
94 (up from 22 in 2024, +327%) |
Review of AI Law |
|
Pending copyright lawsuits against AI developers (end 2025) |
~70 (up from ~30 in 2024) |
Copyright Alliance |
|
Largest AI copyright settlement |
$1.5 billion (Anthropic, Sept 2025) |
Munck Wilson Mandala |
|
Italian DPA fine on Replika (unlawful AI training) |
€5 million |
Italian Garante (Dec 2025) |
|
Organizations relying on NIST AI RMF or EU AI Act for guidance |
51% |
Wavestone / SecurityBrief (2025) |
|
Organizations with both AI data classification and encryption |
22% (78% missing at least one) |
Wavestone / SecurityBrief (2025) |
The 94 federal AI copyright filings count represents cases tracked through US federal dockets only. The actual global total, including state courts, international jurisdictions, and pre-litigation claims—is substantially higher. Global publicly tried generative AI copyright cases reached 1,183 in just the first seven months of 2025, up 230% year-over-year, with the highest single-case claim reaching $3.2 billion.
|
Metric |
Value |
Source |
|
Enterprise data transferred to AI/ML apps (2025) |
18,033 TB (+93% YoY) |
Zscaler ThreatLabz 2026 |
|
ChatGPT DLP policy violations (2025) |
410 million |
Zscaler ThreatLabz 2026 |
|
Global average data breach cost |
$4.44 million |
IBM/Ponemon 2025 |
|
Shadow AI additional breach cost |
$670,000 |
IBM/Ponemon 2025 |
|
Organizations breached due to shadow AI |
20% |
IBM/Ponemon 2025 |
|
Employees pasting company data into GenAI |
77% |
IBM/LayerX 2025 |
|
Average GenAI policy violations per org/month |
223 (top quartile: 2,100) |
Netskope 2026 |
|
GenAI app user growth YoY |
200% |
Netskope 2026 |
|
GenAI prompt volume increase YoY |
500% |
Netskope 2026 |
|
Hardcoded secrets leaked on GitHub (2025) |
28.65 million (+34% YoY) |
GitGuardian 2026 |
|
AI service secrets leaked |
1,275,105 (+81% YoY) |
GitGuardian 2026 |
|
Enterprise AI systems with critical vulnerabilities |
100% |
Zscaler ThreatLabz 2026 |
|
Median time to first critical AI failure |
16 minutes |
Zscaler ThreatLabz 2026 |
|
AI-enabled adversary operations increase |
89% YoY |
CrowdStrike 2026 |
|
Average breakout time (2025) |
29 minutes (fastest: 27 sec) |
CrowdStrike 2026 |
|
Organizations deploying AI tools |
73% |
Cybersecurity Insiders/Cyera 2026 |
|
Organizations with real-time AI governance |
7% |
Cybersecurity Insiders/Cyera 2026 |
|
AI endpoint adoption growth (Feb 2025–Feb 2026) |
509% YoY |
Cyberhaven Labs 2026 |
|
AI agent cybersecurity incidents |
65% of organizations |
CSA/Token Security 2026 |
|
EU AI Act maximum fine |
€35M or 7% of global turnover |
EU AI Act |
|
US AI copyright filings (2025) |
94 (+327% YoY) |
Review of AI Law |
Methodology and Sources:
This report prioritizes primary sources: original surveys, telemetry-based analyses, regulatory filings, and peer-reviewed research. All market sizing figures were cross-referenced across at least two firms where available. We flag self-reported survey data and sample sizes where methodology caveats matter. Statistics older than three years are explicitly noted. No stats were invented, rounded for drama, or derived through non-transparent combination.
Primary sources cited: