In partnership with

The Future of Shopping? AI + Actual Humans.

AI has changed how consumers shop by speeding up research. But one thing hasn’t changed: shoppers still trust people more than AI.

Levanta’s new Affiliate 3.0 Consumer Report reveals a major shift in how shoppers blend AI tools with human influence. Consumers use AI to explore options, but when it comes time to buy, they still turn to creators, communities, and real experiences to validate their decisions.

The data shows:

  • Only 10% of shoppers buy through AI-recommended links

  • 87% discover products through creators, blogs, or communities they trust

  • Human sources like reviews and creators rank higher in trust than AI recommendations

The most effective brands are combining AI discovery with authentic human influence to drive measurable conversions.

Affiliate marketing isn’t being replaced by AI, it’s being amplified by it.

Want to appear here? Talk with us

AI Risks
Top 5 real-world AI security threats revealed in 2025

AI is now part of many business tools, but new security holes are showing up.

Hidden AI use and weak tools

Many workers use AI tools without asking their security team. Almost half of workers in some surveys use tools that their company does not control.

These tools can have bad settings or known bugs that open the door to attacks. Researchers found weak parts in many popular AI systems that allow bad code to run.

Bad code hidden in AI libraries

Some code libraries and models used to build AI apps were found with harmful code hidden inside them.

Attackers put bad content into files that are hard to check. If developers use these bad pieces, their own software can become unsafe.

Stealing AI access keys

Attack groups are stealing keys that let them use AI services for free. This lets them run many AI tasks that cost money but using someone else’s account. One case was so big that a major tech company went to court over it.

Tricking AI with crafted inputs

AI systems take in text and act on it. But they don’t know when text is safe or bad. Attackers can hide commands inside normal text that the AI then follows by mistake. This can leak data or make the AI do harmful work.

Dangerous server modules

Parts of AI systems called MCP servers help AI talk to other software. Many of these are on the public internet and are not well protected.

Some have flaws that let attackers run unwanted commands or gain access.

AI tools can help teams work faster but they bring real risks that must be watched and fixed.

Data Breach
More than 22 million Aflac customers impacted by June data breach

A large insurance firm has shared news of a data breach that touched millions of people.

The event shows how fast a single break in security can spread harm.

What happened

Aflac said attackers got into its network and took files with personal data.

About 22 million people were affected, including customers and workers.

The stolen data may include names, birth dates, and health details.

How the attack worked

The attackers used stolen login details to get inside systems.

There was no sign of ransomware, but the data was copied and taken.

This points to poor control over user access and weak checks on logins.

Why these matters

Insurance data is very sensitive and hard to replace.

Stolen health and identity data can be used for scams for many years.

Large breach numbers also bring legal risk and loss of trust.

What leaders should note

Strong access control and better checks on logins are key.

Watching for strange data moves inside systems can limit damage.

Clear plans for breach response help reduce chaos when trouble hits.

This breach is a clear sign that basic security steps still matter most.

Data Breach
Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

A major online retailer is paying a very high price after a large data breach.

The response shows how costly poor data protection can become.

What went wrong

Coupang said attackers got access to customer data stored in its systems.

The exposed data included names, email addresses, phone numbers, and order details.

No payment data was reported stolen, but personal data was still taken.

The company response

Coupang chose to offer customers about 1.17 billion dollars in vouchers.

The move aims to keep customer trust and reduce anger after the breach.

This is one of the largest customer payout plans seen after a cyber event.

Why these matters

Even without payment data loss, personal data theft can cause long term harm.

Large payouts show how breach costs go far beyond technical cleanup.

Public trust can drop fast when customer data is not kept safe.

What leaders should note

Strong data controls and limited access can lower breach impact.

Clear plans for customer response matter as much as tech fixes.

This case shows that breach costs can hit the business harder than expected.

Cyberattack
European Space Agency confirms breach of "external servers"

A space agency has confirmed a cyber break that reached systems outside its main network.

The case shows how outside systems can still put key groups at risk.

What happened

The European Space Agency said attackers broke into servers run by a third party.

These servers were used for business and tech work, not space missions.

The agency said its core mission systems were not touched.

What data was exposed

Some user data was taken, including names and email details.

No signs show that classified or mission data was stolen.

The review is still ongoing to confirm the full scope.

How the breach was found

Unusual activity was seen on the outside servers.

This led to an internal check and work with experts to lock down access.

Steps were taken fast to cut off attacker access.

Why these matters

Outside systems often have weaker controls than core networks.

Attackers often target partners and vendors to gain a foothold.

This type of break can still hurt trust and operations.

What leaders should note

Third party systems need the same checks as internal ones.

Clear rules for vendor access can limit damage.

Quick detection helped keep this event from getting worse.

This case is a reminder that outside systems can be a quiet risk if left unchecked.

Security Strategy
Automation forces a reset in security strategy

Security teams are under pressure as work moves across cloud and on-site systems.

A new report looks at how teams are trying to keep control.

Hybrid systems bring mixed risk

Many firms now run systems across data centers and cloud services.

This mix makes it harder to see all activity in one place.

Attackers often use these gaps to move without notice.

Visibility is still a weak spot

Many teams say they lack clear views across their full setup.

Too many tools add noise instead of clarity.

Alerts are missed or seen too late.

AI and automation use is growing

More teams use AI to spot threats faster.

Some also use it to cut down manual work.

But trust in these tools is still limited.

People and process issues remain

Staff shortages continue to slow response times.

Training gaps make it harder to use tools well.

Clear plans and shared rules help teams act faster.

What stands out

Simple controls still matter more than new tools.

Teams that focus on basics handle risk better.

Strong views across systems reduce blind spots.

The report shows that clear views and simple controls are key to safer hybrid systems.

Cybersecurity Report
Executives say cybersecurity has outgrown the IT department

Security leaders are facing more pressure as risks grow and budgets stay tight.

A new report looks at how leaders are trying to stay in control.

Leadership is now a core security tool

Many CISOs say their role has shifted beyond tools and alerts.

They spend more time with boards and business leaders.

Clear talk about risk is now as important as tech skills.

Business goals and security must align

Security teams are asked to support growth, not slow it down.

Leaders must show how security helps protect revenue and trust.

This means tying risk talk to real business impact.

Staff and skill gaps remain a problem

Many teams lack enough skilled workers.

Burnout is rising as threats grow and teams stay small.

Training and support are key to keeping people engaged.

Simple plans beat complex ones

Leaders favor clear rules and repeatable actions.

Too many tools make work harder, not easier.

Strong basics help teams react faster when issues appear.

What stands out

Good leadership helps teams act with confidence.

Clear goals and honest risk talks build trust across the company.

Security leadership now shapes how the whole business thinks about risk.

The report shows that people and clear direction matter as much as any tool.

Stay safe!

Eyal Estrin, Author @ CSec Weekly