EDITOR ’ S question
PATRICK JOYCE , GLOBAL RESIDENT CHIEF INFORMATION SECURITY OFFICER , PROOFPOINT
Across the globe , privacy watchdogs and customers alike will demand responsible AI policies from technology companies . n the ever-evolving landscape
I of cybersecurity , defenders find themselves navigating yet another challenging year . Threat actors persistently refine their tactics , techniques and procedures ( TTPs ), showcasing adaptability and the rapid iteration of novel and complex attack chains . At the heart of this evolution lies a crucial shift : threat actors now prioritise identity over technology . While the specifics of TTPs and the targeted technology may change , one constant remains : humans and their identities are the most targeted links in the attack chain . Looking ahead to 2024 , the trend suggests that threats will persistently revolve around humans , compelling defenders to take a different approach to breaking the attack chain .
Cyber heists : Casinos are just the tip of the iceberg
Cybercriminals are increasingly targeting digital supply chain vendors , with a heightened focus on security and identity providers . Aggressive social engineering tactics , including phishing campaigns , are becoming more prevalent . The Scattered Spider group , responsible for ransomware attacks on Las Vegas casinos , showcases the sophistication of these tactics . The forecast for 2024 includes the replication and widespread adoption of such aggressive social engineering tactics , broadening the scope of initial compromise attempts beyond the traditional Edge device and file transfer appliances .
Generative AI : The double-edged sword The explosive growth of Generative AI tools like ChatGPT , FraudGPT and WormGPT bring both promise and peril , but the sky is not falling as far as cybersecurity is concerned . While Large Language Models ( LLMs ) took the stage , the fear of misuse prompted the US President to issue an executive order in October 2023 . On the flip side , more vendors will start injecting AI and LLMs into their products and processes to boost their security offerings . Across the globe , privacy watchdogs and customers alike will demand responsible AI policies from technology companies , which means we ’ ll start seeing responsibility statements being published . Expect both spectacular failures and more policies to emerge .
Mobile device phishing : The rise of omni-channel tactics take centre stage
A notable trend for 2023 was the dramatic increase in mobile device phishing and we expect this threat to rise even more in 2024 . Threat actors are strategically redirecting victims to mobile interactions , exploiting the vulnerabilities inherent in mobile platforms . Conversational abuse , including conversational smishing , has experienced exponential growth . Multi-touch campaigns aim to lure users away from desktops to mobile devices , utilising tactics like QR codes and fraudulent voice calls . This not only makes phishing attacks more effective on mobile devices but also complicates detection for corporate security teams .
Open-source and GenAI : Levelling the ground for malware developers
Malware developers are leveraging open-source tools and GenAI , making advanced programming techniques accessible to a broader audience . As a result , malware capable of evading sandboxes and endpoint detection and response ( EDR ) tools is becoming more widespread . This democratization lowers the barrier to entry for less skilled developers , contributing to the proliferation of sophisticated malware families .
Identity-centric breaches : The achilles heel
Identity-based attacks will dominate breaches , exploiting vulnerabilities rooted in human behaviour and obscured by limited visibility . The conventional belief in cyberattackers relying on common vulnerabilities and exposures ( CVEs ) is losing relevance . The new truth : identity is the new vulnerability . Organisations must shift their focus from primarily fortifying infrastructure to securing stored credentials , session cookies , access keys and addressing misconfigurations , especially when it comes to privileged accounts ( very much now including their IDPs ). The human link in the attack chain demands swift and innovative defences .
30 WWW . INTELLIGENTCISO . COM