{"id":114900,"date":"2025-07-25T10:00:27","date_gmt":"2025-07-25T10:00:27","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=114900"},"modified":"2026-04-01T15:23:02","modified_gmt":"2026-04-01T08:23:02","slug":"strengthening-cyber-resilience-against-ai-driven-email-attacks","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/jp\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/","title":{"rendered":"AI\u3092\u6d3b\u7528\u3057\u305f\u30e1\u30fc\u30eb\u653b\u6483\u306b\u5bfe\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u306e\u5f37\u5316"},"content":{"rendered":"<p><span data-contrast=\"auto\">AI\u3092\u6d3b\u7528\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u3001\u7279\u306b\u30d3\u30b8\u30cd\u30b9\u30e1\u30fc\u30eb\u8a50\u6b3a\uff08BEC\uff09\u306e\u5f62\u614b\u306b\u304a\u3044\u3066\u6025\u5897\u3057\u3066\u3044\u307e\u3059\u3002BEC\u306f\u9ad8\u5ea6\u306aAI\u30c4\u30fc\u30eb\u3092\u99c6\u4f7f\u3057\u3066\u4fe1\u983c\u3067\u304d\u308b\u9023\u7d61\u5148\u3092\u507d\u88c5\u3057\u3001\u5f93\u6765\u306e\u9632\u5fa1\u7b56\u3092\u56de\u907f\u3057\u3066\u3044\u307e\u3059\u3002Bitdefender\u306e\u6700\u8fd1\u306e\u8abf\u67fb\u306b\u3088\u308b\u3068\u3001\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u306f\u904e\u53bb1\u5e74\u9593\u306eAI\u30d9\u30fc\u30b9\u306e\u653b\u6483\u5897\u52a0\u306b\u304a\u3044\u3066\u4e16\u754c\u7b2c3\u4f4d\u306b\u30e9\u30f3\u30af\u30a4\u30f3\u3057\u3066\u304a\u308a\u3001501\u51045\u5343\u4e07\u4eba\u4ee5\u4e0a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u304c\u3001\u305f\u3068\u3048\u9069\u5207\u306a\u60c5\u5831\u958b\u793a\u3067\u3042\u3063\u3066\u3082\u3001\u4fb5\u5bb3\u306e\u79d8\u5bc6\u4fdd\u6301\u3092\u5f37\u3044\u3089\u308c\u3066\u3044\u308b\u3068\u5831\u544a\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u8105\u5a01\u306f\u307e\u3059\u307e\u3059\u5de7\u5999\u5316\u3057\u3066\u304a\u308a\u3001AI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3092\u7528\u3044\u3066\u30c7\u30a3\u30fc\u30d7\u30d5\u30a7\u30a4\u30af\u97f3\u58f0\u306e\u8907\u88fd\u3001\u591a\u8a00\u8a9e\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3001\u8106\u5f31\u6027\u306e\u8fc5\u901f\u306a\u60aa\u7528\u3092\u81ea\u52d5\u5316\u3057\u3066\u3044\u307e\u3059\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Bitdefender\u306e\u30a2\u30b8\u30a2\u592a\u5e73\u6d0b\u5730\u57df\u304a\u3088\u3073\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u62c5\u5f53\u30d0\u30a4\u30b9\u30d7\u30ec\u30b8\u30c7\u30f3\u30c8\u3001\u30dd\u30fc\u30eb\u30fb\u30cf\u30b8\u6c0f\u306b\u3088\u308b\u3068\u3001BEC\u653b\u6483\u304c\u8513\u5ef6\u3059\u308b\u539f\u56e0\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u610f\u8b58\u306e\u4f4e\u3055\u3001\u73fe\u72b6\u7dad\u6301\u3078\u306e\u6cb9\u65ad\u3001\u305d\u3057\u3066\u6642\u4ee3\u9045\u308c\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u3078\u306e\u904e\u4fe1\u306b\u3042\u308a\u307e\u3059\u3002\u540c\u793e\u304c2025\u5e74\u306b\u4e16\u754c\u4e2d\u306e1,200\u4eba\u4ee5\u4e0a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u3092\u5bfe\u8c61\u306b\u5b9f\u65bd\u3057\u305f\u8abf\u67fb\u3067\u306f\u3001\u7d4c\u55b6\u5e79\u90e8\u306e\u81ea\u4fe1\u3068\u73fe\u5834\u306e\u80fd\u529b\u306e\u9593\u306b\u5927\u304d\u306a\u30ae\u30e3\u30c3\u30d7\u304c\u3042\u308b\u3053\u3068\u304c\u660e\u3089\u304b\u306b\u306a\u308a\u307e\u3057\u305f\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u4e3b\u306a\u653b\u6483\u306e\u50be\u5411\u306f\u6b21\u306e\u3068\u304a\u308a\u3067\u3059\u3002<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u300cLiving off the Land (LOTL)\u300d\u624b\u6cd5\u306e\u4f7f\u7528 - PowerShell \u306a\u3069\u306e\u6b63\u898f\u30c4\u30fc\u30eb\u3092\u30b9\u30c6\u30eb\u30b9\u653b\u6483\u306b\u60aa\u7528\u3059\u308b\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u5206\u6790\u3055\u308c\u305f\u653b\u6483\u306e 84% \u306f\u3001\u5f93\u6765\u306e\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u691c\u51fa\u3092\u56de\u907f\u3059\u308b LOTL \u65b9\u5f0f\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3057\u305f\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u8105\u5a01\u306e\u653b\u6483\u8005\u306f\u3001\u7279\u306b\u30a8\u30c3\u30b8\u30c7\u30d0\u30a4\u30b9\u306b\u304a\u3044\u3066\u3001\u767a\u898b\u5f8c\u6570\u6642\u9593\u4ee5\u5185\u306b\u8106\u5f31\u6027\u3092\u60aa\u7528\u3059\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3057\u305f\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">\u3053\u3046\u3057\u305f\u6226\u8853\u306b\u5bfe\u6297\u3059\u308b\u305f\u3081\u3001\u30cf\u30b8\u6c0f\u306f\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u3092\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306b\u5f37\u5316\u3057\u3001\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3092\u7e2e\u5c0f\u3059\u308bBitdefender\u306eGravityZone PHASR\u306a\u3069\u306e\u3001\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u306e\u884c\u52d5\u30d9\u30fc\u30b9\u691c\u77e5\u3068AI\u7d71\u5408\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u63a8\u5968\u3057\u3066\u3044\u307e\u3059\u3002\u5f7c\u306f\u4ee5\u4e0b\u306e\u70b9\u306e\u91cd\u8981\u6027\u3092\u5f37\u8abf\u3057\u3066\u3044\u307e\u3059\u3002<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u8105\u5a01\u306e\u691c\u51fa\u3092\u81ea\u52d5\u5316\u3057\u3066\u3001\u30a2\u30e9\u30fc\u30c8\u75b2\u52b4\u3068\u4eba\u54e1\u4e0d\u8db3\u3092\u8efd\u6e1b\u3057\u307e\u3059\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u30c4\u30fc\u30eb\u306e\u6a5f\u80fd\u3092\u5236\u9650\u3057\u3001\u7ba1\u7406\u8005\u6a29\u9650\u3092\u76e3\u67fb\u3057\u3001\u62e1\u5f35\u691c\u51fa\u304a\u3088\u3073\u5bfe\u5fdc (XDR) \u30b7\u30b9\u30c6\u30e0\u3092\u5c0e\u5165\u3057\u307e\u3059\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">AI \u3092\u6d3b\u7528\u3057\u305f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u3084\u30c7\u30a3\u30fc\u30d7\u30d5\u30a7\u30a4\u30af\u653b\u6483\u306b\u5099\u3048\u308b\u305f\u3081\u306b\u3001\u7d99\u7d9a\u7684\u306a\u30b9\u30bf\u30c3\u30d5 \u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3068\u30ec\u30c3\u30c9 \u30c1\u30fc\u30e0\u6f14\u7fd2\u3092\u5b9f\u65bd\u3057\u307e\u3059\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">\u6700\u7d42\u7684\u306b\u3001AI\u4e3b\u5c0e\u306e\u8105\u5a01\u306b\u5bfe\u3059\u308b\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u3092\u69cb\u7bc9\u3059\u308b\u306b\u306f\u3001AI\u3092\u6d3b\u7528\u3057\u305f\u9632\u5fa1\u3068\u3001\u4eba\u9593\u306b\u3088\u308b\u76e3\u8996\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3001\u305d\u3057\u3066\u7d99\u7d9a\u7684\u306a\u30b7\u30df\u30e5\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u7d44\u307f\u5408\u308f\u305b\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002\u653b\u6483\u8005\u304cAI\u3092\u60aa\u7528\u3059\u308b\u30b1\u30fc\u30b9\u304c\u5897\u3048\u308b\u306b\u3064\u308c\u3001\u30c7\u30b8\u30bf\u30eb\u30a4\u30f3\u30d5\u30e9\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u3082\u8fc5\u901f\u306b\u9032\u5316\u3055\u305b\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><strong>\u30bd\u30fc\u30b9\uff1a\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.itnews.asia\/news\/how-can-we-bolster-our-resilience-against-ai-enabled-e-mail-attacks-618936\"><span data-contrast=\"none\">https:\/\/www.itnews.asia\/news\/how-can-we-bolster-our-resilience-against-ai-enabled-e-mail-attacks-618936<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>AI-driven cyberattacks are escalating, particularly in the form of Business Email Compromise (BEC), which now leverages advanced AI tools to impersonate trusted contacts and bypass conventional defenses. A recent Bitdefender study shows Singapore ranked third globally in the rise of AI-based attacks over the past year, with over 50% of security professionals reporting pressure to keep breaches confidential\u2014even when disclosure was appropriate. These threats are increasingly sophisticated, employing AI Agents to automate deepfake voice cloning, multilingual phishing, and rapid vulnerability exploitation.\u00a0 According to Paul Hadjy, Bitdefender\u2019s Vice President of APAC and Cybersecurity Services, BEC attacks thrive due to low awareness, complacency, and overconfidence in outdated security postures. The company\u2019s 2025 [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":114902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1564,1646],"class_list":["post-114900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai-agent","tag-cyberattacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strengthening Cyber Resilience Against AI-Driven Email Attacks - Eastgate Software<\/title>\n<meta name=\"description\" content=\"AI-enabled email threats like BEC are rising. Learn how AI agents and proactive cybersecurity strategies can help organizations.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthening Cyber Resilience Against AI-Driven Email Attacks\" \/>\n<meta property=\"og:description\" content=\"AI-enabled email threats like BEC are rising. Learn how AI agents and proactive cybersecurity strategies can help organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/jp\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-25T10:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:23:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"Strengthening Cyber Resilience Against AI-Driven Email Attacks\",\"datePublished\":\"2025-07-25T10:00:27+00:00\",\"dateModified\":\"2026-04-01T08:23:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/\"},\"wordCount\":287,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"AI Agent\",\"Cyberattacks\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/\",\"name\":\"Strengthening Cyber Resilience Against AI-Driven Email Attacks - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2025-07-25T10:00:27+00:00\",\"dateModified\":\"2026-04-01T08:23:02+00:00\",\"description\":\"AI-enabled email threats like BEC are rising. Learn how AI agents and proactive cybersecurity strategies can help organizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"Strengthening Cyber Resilience Against AI-Driven Email Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/strengthening-cyber-resilience-against-ai-driven-email-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthening Cyber Resilience Against AI-Driven Email Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/jp\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthening Cyber Resilience Against AI-Driven Email Attacks - Eastgate Software","description":"AI-enabled email threats like BEC are rising. Learn how AI agents and proactive cybersecurity strategies can help organizations.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"ja_JP","og_type":"article","og_title":"Strengthening Cyber Resilience Against AI-Driven Email Attacks","og_description":"AI-enabled email threats like BEC are rising. Learn how AI agents and proactive cybersecurity strategies can help organizations.","og_url":"https:\/\/wp.eastgate-software.com\/jp\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2025-07-25T10:00:27+00:00","article_modified_time":"2026-04-01T08:23:02+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"\u57f7\u7b46\u8005":"huongnguyen253","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"Strengthening Cyber Resilience Against AI-Driven Email Attacks","datePublished":"2025-07-25T10:00:27+00:00","dateModified":"2026-04-01T08:23:02+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/"},"wordCount":287,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1","keywords":["AI Agent","Cyberattacks"],"articleSection":["Tech Enthusiast"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/","url":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/","name":"Strengthening Cyber Resilience Against AI-Driven Email Attacks - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1","datePublished":"2025-07-25T10:00:27+00:00","dateModified":"2026-04-01T08:23:02+00:00","description":"AI-enabled email threats like BEC are rising. Learn how AI agents and proactive cybersecurity strategies can help organizations.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"Strengthening Cyber Resilience Against AI-Driven Email Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/strengthening-cyber-resilience-against-ai-driven-email-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"Strengthening Cyber Resilience Against AI-Driven Email Attacks"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"\u30b0\u30ed\u30fc\u30d0\u30eb\u30d5\u30a9\u30fc\u30c1\u30e5\u30f3500\u4f01\u696d\u306e\u6226\u7565\u7684\u30d1\u30fc\u30c8\u30ca\u30fc","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"\u30d5\u30aa\u30f3\u30b0\u30a8\u30f3253","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/jp\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/07\/Sen-news-website-1-4.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-tTe","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/114900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/comments?post=114900"}],"version-history":[{"count":3,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/114900\/revisions"}],"predecessor-version":[{"id":119908,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/114900\/revisions\/119908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media\/114902"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media?parent=114900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/categories?post=114900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/tags?post=114900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}