
AI-driven search ad spending set to surge to $26 billion by 2029, data shows
Companies that rely on traditional keyword-based search ads could experience revenue declines due to the growing popularity of AI search ads, which offer greater convenience and engagement for users, according to the research firm.
WHY IT'S IMPORTANT
Search giants such as Alphabet-owned Google and Microsoft's Bing have added AI capabilities to better compete with chatbots such as OpenAI's ChatGPT and Perplexity AI, which provide users with direct information without requiring to click through multiple results.
Apple is exploring the integration of AI-driven search capabilities into its Safari browser, potentially moving away from its longstanding partnership with Google.
The report has come as concerns grew about users increasingly turning to the chatbots for conversational search and AI-powered search results could upend business models of some companies.
Online education firm Chegg said in May that it would lay off about 248 employees as it looks to cut costs and streamline operations because students are using AI-powered tools including ChatGPT over traditional edtech platforms.
QUOTE
"Publishers and other sites are feeling the pain from AI search. As they lose out on traffic, we're seeing publishers lean into subscriptions and paid AI licensing deals to bolster revenue," Emarketer analyst Minda Smiley said.
GRAPHIC
AI search ad spending is expected to constitute nearly 1 per cent of total search ad spending this year and 13.6 per cent by 2029 in the U.S., according to Emarketer.
Sectors such as financial services, technology, telecom, and healthcare are embracing AI as they are seeing clear advantages in using the technology to enhance their ad strategies, while the retail industry's adoption is slow, the report said.
Google recently announced the expansion of its AI-powered search capabilities into the consumer packaged goods sector through enhancements in Google Shopping.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CNA
4 hours ago
- CNA
South Korea seeks mutually agreeable US trade package as Aug 1 tariff deadline looms
SEOUL: South Korea will prepare a trade package that is mutually agreeable with the United States ahead of minister-level meetings planned next week and a US tariff-pause deadline of Aug 1, the presidential office said on Saturday (Jul 26). The package will include shipbuilding cooperation, a sector of high interest to US Commerce Secretary Howard Lutnick, who discussed the matter with South Korea's Industry Minister Kim Jung-kwan on Friday, it said in a statement. Friday's meeting was a follow-up to a meeting on Thursday, where Lutnick and Kim reaffirmed their commitment to reach a trade deal by Aug 1, after a joint meeting of finance ministers and top trade envoys that had been scheduled for Friday was postponed. South Korea, facing 25 per cent tariffs, is rushing to reach a trade deal with Washington, with National Security Adviser Wi Sung-lac visiting the US recently for high-level talks and Minister for Trade Yeo Han-koo also in the US for negotiations, as pressure grows on officials to clinch a deal that is no worse than Japan's that cut tariffs to 15 per cent. South Korea's trade negotiations with the US have included non-tariff barriers in the agricultural and digital service sectors, but foreign exchange has not been part of trade talks beyond usual consultations, according to South Korean officials. US President Donald Trump arrived in Scotland on Friday for bilateral talks with European Commission President Ursula von der Leyen on Sunday, which could yield a trade deal with the European Union, after making a deal earlier this week with Japan and the Philippines. Next week, US officials will hold a new round of trade talks with China in Sweden for an extension to a separate deadline of Aug 12 set between the two countries. South Korea's Finance Minister Koo Yun-cheol and Foreign Minister Cho Hyun will also hold meetings with US Treasury Secretary Scott Bessent and State Secretary Marco Rubio, respectively, next week.


International Business Times
5 hours ago
- International Business Times
Who Is Shengjia Zhao? META Appoints ChatGPT co-creator as Head of Superintelligence AI Team
Meta is making a big push into advanced artificial intelligence with its Super Intelligence Lab. Now the Mark Zuckerberg-led tech giant has appointed Shengjia Zhao to head up its Superintelligence AI team. Zhao, one of the developers that helped create ChatGPT at OpenAI, will now be its chief scientist for the latest AI division of Meta. X Zhao joined Meta in June 2025. On Friday (July 25), Meta announced that Zhao will officially serve as its Chief Scientist. The announcement was made on Threads by CEO Mark Zuckerberg, who referred to Zhao as the team's 'lead scientist from day one.' At OpenAI, Zhao was involved with some of the company's most significant early efforts. He was a co-author of the first ChatGPT paper and helped to produce the initial reasoning model, titled "o1." It's the model that effectively ushered in the concept of "chain-of-thought" AI, in which the AI works its way through problems step by step, an idea they've gone on to license and which has been adopted by many other companies, including Google. At Meta, Zhao will answer to Alexandr Wang, Meta's new Chief AI Officer. Wang had joined Meta in June, after leading Scale AI. He now leads Meta's quest to create synthetic general intelligence (AGI), or AI, that can think and reason like humans. Meta's Superintelligence Lab, which was launched in June 2025, is distinct from Meta's older AI research group FAIR (Facebook AI Research). FAIR will retain its work under AI pioneer Yann LeCun, who now reports to Wang. The hiring of Zhao is an indication of Meta's aggressive talent acquisition approach. In recent months, Meta has hired more than a dozen AI researchers from top companies, including Apple, Google, OpenAI, and Anthropic. The list features industry veterans such as two of Apple's most famous scientists, Tom Gunter and Mark Lee. Some reports have said Meta is making huge pay packages to attract talent, including, in one case, up to $300 million. Meta has disputed those numbers but says it is also pouring significant resources into top AI talent. Presently, Meta's top open-source AI model, LLaMA 4, is still behind rivals such as GPT-4 and Gemini. But the company is due to put out a beefier model, codenamed Behemoth, later this year. Zuckerberg said, "We are piloting a team that can build learnings with the tools and pass on the baton to the future of superintelligence AI."

Straits Times
6 hours ago
- Straits Times
Microsoft probing whether cyber alert tipped off Chinese hackers
Find out what's new on ST website and app. Microsoft is looking into whether a leak from its early alert system led to the widespread exploitation of vulnerabilities in the SharePoint software. Microsoft is investigating whether a leak from its early alert system for cybersecurity companies allowed Chinese hackers to exploit flaws in its SharePoint service before they were patched, according to people familiar with the matter. The technology company is looking into whether the programme – designed to give cybersecurity experts a chance to fix computer systems before the revelation of new security concerns – led to the widespread exploitation of vulnerabilities in its SharePoint software globally over the past several days, the people said, asking not to be identified discussing private matters. 'As part of our standard process, we'll review this incident, find areas to improve, and apply those improvements broadly,' a Microsoft spokesperson said in a statement, adding that partner programmes are an important part of the company's security response. The Chinese embassy in Washington referred to comments made by foreign affairs ministry spokesman Guo Jiakun to media earlier this week, opposing hacking activities. 'Cybersecurity is a common challenge faced by all countries and should be addressed jointly through dialogue and cooperation,'' Mr Guo said. 'China opposes and fights hacking activities in accordance with the law. At the same time, we oppose smears and attacks against China under the excuse of cybersecurity issues.' Microsoft has attributed SharePoint breaches to state-sponsored hackers from China , and at least a dozen Chinese companies participate in the initiative, called the Microsoft Active Protections Program, or MAPP, according to Microsoft's website. Members of the 17-year-old programme must prove they are cybersecurity vendors and that they don't produce hacking tools like penetration testing software. After signing a non-disclosure agreement, they receive information about novel patches to vulnerabilities 24 hours before Microsoft releases them to the public. A subset of more highly-vetted users receive notifications of an incoming patch five days earlier, according to Microsoft's MAPP website. Mr Dustin Childs, head of threat awareness for the Zero Day Initiative at cybersecurity company Trend Micro, says Microsoft alerted members of the program about the vulnerabilities that led to the SharePoint attacks. 'These two bugs were included in the MAPP release,' says Mr Childs, whose company is a MAPP member. 'The possibility of a leak has certainly crossed our minds.' He adds that such a leak would be a dire threat to the program, 'even though I still think MAPP has a lot of value'. Victims of the attacks now total more than 400 government agencies and corporations worldwide, including the US's National Nuclear Security Administration, the division responsible for designing and maintaining the country's nuclear weapons. For at least some of the attacks, Microsoft has blamed Linen Typhoon and Violet Typhoon, groups sponsored by the Chinese government, as well as another China-based group it calls Storm-2603. In response to the allegations, the Chinese Embassy has said it opposes all forms of cyberattacks, while also objecting to 'smearing others without solid evidence'. Mr Dinh Ho Anh Khoa, a researcher who works for the Vietnamese cybersecurity firm Viettel, revealed that SharePoint had unknown vulnerabilities in May at Pwn2Own, a conference in Berlin run by Mr Childs' organisation where hackers sit on stage and search for critical security vulnerabilities in front of a live audience. After the public demonstration and celebration, Mr Khoa headed to a private room with Childs and a Microsoft representative, Mr Childs said. Mr Khoa explained the exploit in detail and handed over a full white paper. Microsoft validated the research and immediately began working on a fix. Mr Khoa won US$100,000 (S$128,160) for the work. It took Microsoft about 60 days to come up with a fix. On July 7, the day before it released a patch publicly, hackers attacked SharePoint servers, cybersecurity researchers said. It is possible that hackers found the bugs independently and began exploiting them on the same day that Microsoft shared them with MAPP members, says Mr Childs. But he adds that this would be an incredible coincidence. The other obvious possibility is that someone shared the information with the attackers. The leak of news of a pending patch would be a substantial security failure, but 'it has happened before,' says Mr Jim Walter, senior threat researcher the cyber firm SentinelOne. MAPP has been the source of alleged leaks as far back as 2012, when Microsoft accused the Hangzhou DPtech Technologies, a Chinese network security company, of disclosing information that exposed a major vulnerability in Windows. Hangzhou DPtech was removed from the MAPP group. At the time, a Microsoft representative said in a statement that it had also 'strengthened existing controls and took actions to better protect our information'. In 2021, Microsoft suspected at least two other Chinese MAPP partners of leaking information about vulnerabilities in its Exchange servers, leading to a global hacking campaign that Microsoft blamed on a Chinese espionage group called Hafnium. It was one of the company's worst breaches ever – tens of thousands of exchange servers were hacked, including at the European Banking Authority and the Norwegian Parliament. Following the 2021 incident, the company considered revising the MAPP program, Bloomberg previously reported. But it did not disclose whether any changes were ultimately made or whether any leaks were discovered. A 2021 Chinese law mandates that any company or security researcher who identifies a security vulnerability must report it within 48 hours to the government's Ministry of Industry and Information Technology, according to an Atlantic Council report. Some of the Chinese companies that remain involved in MAPP, such as Beijing CyberKunlun Technology, are also members of a Chinese government vulnerabilities programme, the China National Vulnerability Database, which is operated by the country's Ministry of State Security, according to Chinese government websites. Mr Eugenio Benincasa, a researcher at ETH Zurich's Center for Security Studies, says there is a lack of transparency about how Chinese companies balance their commitments to safeguard vulnerabilities shared by Microsoft with requirements that they share information with the Chinese government. 'We know that some of these companies collaborate with state security agencies and that the vulnerability management system is highly centralised,' says Mr Benincasa. 'This is definitely an area that warrants closer scrutiny.' BLOOMBERG