Are AI Bots Overtaking Human Web Activity and Creating Cyber Risks?

Article Highlights
Off On

The prevalence of automated bot traffic on the internet has been a rising concern, with recent reports indicating that bots have started to dominate web activity, surpassing human interactions. Bot traffic accounted for 51% of the total web activity last year. Among this, bad bot traffic grew significantly, from 32% to 37%, posing clear cyber risks. This surge can be attributed to advancements in artificial intelligence and large language models (LLMs), which now make it easier to create bots on a massive scale. Prominent bots like ByteSpider Bot, responsible for 54% of AI-enabled attacks, along with others such as Applebot, ClaudeBot, and the ChatGPT User Bot, are at the forefront of this alarming trend.

Rising Threat of Bad Bots in Key Industries

Certain sectors have been particularly targeted by bot attacks, with dramatic effects on their operations. In the travel industry, bot attacks accounted for 41% of total incidents, while the retail sector faced an even higher threat at 59%. The travel industry, having faced the most attacks last year, experienced a decline in the complexity of attacks but an increase in volume. This shift is largely due to AI, allowing less skilled threat actors to execute a higher number of less complex assaults, further stressing the security infrastructures of these sectors. Bad bots exhibit a high degree of versatility, being exploited for Distributed Denial of Service (DDoS) attacks, custom rules violations, and breaches of Application Programming Interfaces (APIs). A salient point from the report indicates that advanced bot traffic targeted APIs in 44% of recorded cases for executing automated payment fraud, account hijacking, and data exfiltration. Financial services, healthcare, and e-commerce sectors are especially vulnerable due to the sensitive nature of the data they manage. The vulnerabilities in APIs are primarily attributed to their intrinsic business logic, which can be easily manipulated by experienced attackers.

The adoption of cloud-based services and microservices architectures, while offering numerous operational advantages, also brings associated risks. It is essential for organizations to fully comprehend the risks related to APIs and take active measures to mitigate fraud and data breaches. Failing to secure these touchpoints can lead to significant harm, both financially and reputationally.

Conclusion and Future Considerations

The rise of automated bot traffic on the internet is causing increasing concern. Recent reports reveal that bots are now more active online than humans. Bot traffic made up 51% of total web activity last year. This includes a notable increase in bad bot traffic, which climbed from 32% to 37%, highlighting distinct cyber risks. This trend is linked to the progress in artificial intelligence and large language models (LLMs), which have simplified the mass production of bots. Major bots such as ByteSpider Bot, responsible for 54% of AI-driven attacks, and others like Applebot, ClaudeBot, and the ChatGPT User Bot are leading this troubling development. These bots have become highly sophisticated, making it challenging to distinguish between human and automated interactions online, thereby increasing threats to cybersecurity. As bots continue to advance, mitigation efforts must be enhanced to protect web integrity and user security.

Explore more

AWS Launches AI DevOps Agent to Automate Cloud Operations

The silence of a stable data center at midnight no longer feels like a fragile truce between engineering teams and the inevitable chaos of system failures. For years, the life of a site reliability engineer (SRE) revolved around the sudden, jarring vibration of a smartphone on a nightstand, signaling a high-stakes emergency that required immediate attention. This scenario often led

What Defines a Successful Email Open Rate Today?

The sheer volume of digital correspondence flooding professional and personal inboxes in 2026 has transformed the simple act of opening an email into a selective process governed by split-second cognitive filters. As users navigate an increasingly dense digital landscape, the ability of a brand to secure that initial interaction serves as a critical litmus test for its overall market relevance

How Is Ericsson Leading the Shift to Enterprise 5G?

Pioneering the Next Frontier of Industrial Connectivity Modern industrial complexes are rapidly abandoning traditional wired systems in favor of high-performance wireless ecosystems that prioritize agility and real-time data processing above all else. As the global telecommunications landscape undergoes a seismic shift, Ericsson is positioning itself at the forefront of a major transition toward Enterprise 5G. While earlier iterations focused on

Dynamics 365 Expense Integration – Review

Achieving a streamlined financial close often remains an elusive goal for many enterprises when front-end spending habits clash with the rigid requirements of back-end accounting protocols. The Dynamics 365 expense integration ecosystem represents a sophisticated response to this friction, acting as a bridge between chaotic daily expenditures and the structured environment of enterprise resource planning. While Microsoft offers native tools,

How to Fix Device Settings Migration Errors in Windows 11?

Navigating the transition to a new operating system often feels like walking a tightrope where one misstep in driver compatibility can send an entire professional workflow plummeting into chaos. The promise of Windows 11 was a frictionless leap into a modern interface, yet many IT professionals and power users are hitting a frustrating roadblock: the notification that specific settings were