AI turbo-charges cybersecurity and cyberthreats: Artificial intelligence will boost both attackers and defenders while causing governance issues and learning pains.
Attack surfaces will explode: Cyberdefense complexity will compound as API, cloud, edge, and OT resources add to the list of assets to defend.
Industry experts see that AI will require governance action, cause learning pains, and will be used to both improve and attack cybersecurity.
Shivajee Samdarshi, Chief Product Officer at Venafi sees the possibility of AI itself becoming the source of the attack.
In addition to enabling cyberattacks, AI will also be used to create more believable disinformation to attack both governments and businesses.
While cybercriminals have always shown strong adaptability and opportunism, experts expect that attackers will develop further in capabilities and strategies throughout 2024.
Some attacks will be aided by technology, while others will be more strategic in nature as companies strengthen cyberdefense against older attacks.
As development and operations uses automation to transition to development, security and operations attackers find themselves with less human error to exploit.
Recent successes with poisoned open-source libraries and other development channels to deliver malware will continue to influence attacks deeper into the development supply chain for both traditional and new technologies.
As cybersecurity teams eliminate vulnerabilities and add security to block current attacks, cybercriminals will adjust to attack easier targets or change tactics.
Even as AI turbocharges attack and defense and cybercriminals expand their capabilities, the attack surface cybersecurity teams need to defend will grow at a rapid pace - well beyond standard network security.
The continuing rise in cloud adoption will also expand the attack surface and increase interest for cybercriminals to attack cloud resources.
Even as attackers pursue API and cloud attacks, more organizations push out computing to edge resources beyond any network controls.
While many envision attacks on smart cars and surveillance cameras, servers exposed to the demilitarized zone, such as MoveIT servers, also provide tantalizing edge targets.
The ransomware attack on Colonial Pipeline exposed overlooked OT security and the potential disruption to US infrastructure from a single failure.
Over the past two years attacks by Russia, China, Iran, and North Korea exploited vulnerabilities and created enormous challenges for public and private organizations of all sizes.
Reading up on past attacks can provide hints for tactics and the speed at which nation-sponsored attacks can occur.
The trends of weak security foundations, poor cybersecurity awareness, and ongoing ransomware attacks will remain a major focus until these trends can be mitigated.
While advanced attackers will seek novel evasion tactics, we can't make their job easy by deploying sloppy cyberdefense.
Consider implementing strong endpoint protection as one of many layers of defense against ransomware and other attacks.
This Cyber News was published on www.esecurityplanet.com. Publication date: Tue, 19 Dec 2023 14:13:05 +0000