Cyber security predictions for 2024

The year 2023 saw heightened cybersecurity activity, with both security professionals and adversaries engaged in a constant cat-and-mouse game. Here are some cybersecurity predictions for 2024 to help security professionals. It is crucial to anticipate the key themes likely to dominate the cybersecurity space in 2024.

Cybersecurity is an ever-evolving process that can never be ‘complete’ in the exact sense. The cybersecurity field evolves constantly as technology advances, global events create uncertainty, and threat actors refine and improve their malicious tactics. It is expected that 2024 again emphasizes the critical need to strike a balance between cybersecurity and cyber resilience. Safeguarding mission-critical assets and developing the capacity to anticipate, withstand, recover from, and adapt to cyberattacks remain central to organizational cybersecurity strategies. While preparedness remains one of the most important facets of effective organizational cybersecurity, it can be difficult to plan for the year ahead with so many unknowns.

Five Cybersecurity Predictions for 2024
https://www.securityweek.com/five-cybersecurity-predictions-for-2024/
A Never-Ending Story: Compromised Credentials
Ransomware Attacks Continue to Wreak Havoc
Global Conflicts and Elections Lead to a Rise in Hacktivism
White House Cybersecurity Strategy Triggers Revival of Vulnerability Management
The Emergence of Next-Gen Security Awareness Programs

10 Global Cybersecurity Predictions for 2024
https://www.fticonsulting.com/insights/articles/10-global-cybersecurity-predictions-2024
Election Security Making Headlines
A Two-Sided Approach to Artificial Intelligence
Widespread Adoption of Zero-Trust Architecture
Cities Integrating IoT into Critical Infrastructure
Increasing Cybersecurity Supply Chain Risks
Third Party Scrutiny Taking Priority for Compliance Officers
The Start of Significant Fines From Australian Regulators
Corporate Responsibility Shifting to Individuals
Organizational Transparency Surrounding Cybersecurity
Emergence of Incentivized Cybersecurity

Experts Talk: Predicting the Cybersecurity Landscape in 2024
Spiceworks News & Insights brings you expert insights on what to expect in cybersecurity in 2024.
https://www.spiceworks.com/it-security/security-general/articles/cybersecurity-predictions-2024/
By investing in AI governance tools and developing complimentary guardrails, companies can avoid what may end up being the biggest misconception in 2024: the assumption that you can control the adoption of AI.
“In 2024, we can expect a surge in malicious AI-generated content.”
“Organizations’ inability to identify the lineage of AI will lead to an increase in software supply chain attacks in 2024,”
The integration of AI into the development process, particularly in the CI/CD pipeline, is crucial.
“Cyberattacks overall are expected to increase; ransomware groups are targeting vendors, government agencies, and critical infrastructure in the United States.”
How can AI help threat actors: “With the assistance of AI, particularly generative AI (GenAI) technology, attackers will be able to refine their techniques, increasing their speed and effectiveness. GenAI will allow criminal cyber groups to quickly fabricate convincing phishing emails and messages to gain initial access into an organization.”
“If cyber leaders want to take on this responsibility (and burden), they will have to be reasonably informed of cyber risks faced by the organization and able to communicate those risks to investors,”
“Third-party risk management is no longer an experiment; it’s an expectation,”
“We will see breaches related to Kubernetes in high-profile companies,”

API Security Trends and Projections for 2024
https://www.spiceworks.com/it-security/application-security/guest-article/api-security-trends-and-projections/
1. The pervasiveness of API vulnerabilities – These vulnerabilities in AAA, if exploited, can lead to major security breaches.
2. Limitations of standard frameworks – While foundational, traditional frameworks like the OWASP API Security Top-10 have limitations in addressing the dynamic nature of API threats.
3. Leak protection – The report highlighted the critical need for enhanced API leak protection, especially considering significant breaches at companies like Netflix and VMware.
4. Rising threats and strategic recommendations – The Wallarm report identified injections as the most pressing API threat, underscoring their likelihood of significant damage.

Gartner’s 8 Cybersecurity Predictions for 2023-2025
https://krontech.com/gartners-8-cybersecurity-predictions-for-2023-2025
By 2025, 60% of organizations will use cybersecurity risk as the primary determinant in conducting third-party transactions and business relationships. Investors, especially venture capitalists, use cybersecurity risk as an important factor in evaluating opportunities.
1. By the end of 2023, modern data privacy laws will cover the personal information of 75% of the world’s population.
2. By 2024, organizations that adopt a cybersecurity network architecture will be able to reduce the financial costs of security incidents by an average of 90%.
3. By 2024, 30% of enterprises will deploy cloud-based Secure Web Gateway (SWG), Cloud Access Security Brokers (CASB), Zero Trust Network Access (ZTNA), and Firewall as a Service (FWaaS), sourced from the same vendor.
4. By 2025, 60% of organizations will use cybersecurity risk as the primary determinant in conducting third-party transactions and business relationships.
5. The percentage of states that enact laws regulating ransomware payments, fines and negotiations will increase from less than 1% in 2021 to 30% by the end of 2025.
6. By 2025, 40% of boards will have a dedicated cybersecurity committee overseen by a qualified board member.
7. By 2025, 70% of CEOs will build a culture of corporate resilience to protect themselves from threats from cybercrime, severe weather events, social events, and political instability.
8. By 2025, cyber-attackers will be able to use operational technology environments as weapons successfully enough to cause human casualties.

Top 10 Cyber Security Trends And Predictions For 2024
https://www.splashtop.com/blog/cybersecurity-trends-and-predictions-2024
Trend 1: Increased Focus on AI and Machine Learning in Cybersecurity
Trend 2: Growing Importance of IoT Security
Trend 3: Expansion of Remote Work and Cybersecurity Implications
Trend 4: The Rise of Quantum Computing and Its Impact on Cybersecurity
Trend 5: Evolution of Phishing Attacks
Trend 6: Enhanced Focus on Mobile Security
Trend 7: Zero Trust Security
Trend 8: Cybersecurity Skills Gap and Education
Trend 9: Blockchain and Cybersecurity
Trend 10: Cybersecurity Insurance Becoming Mainstream

6 Predictions About Cybersecurity Challenges In 2024
https://www.forbes.com/sites/edwardsegal/2023/12/09/6-predictions-about-cybersecurity-challenges-in-2024/?sh=172726819433
‘Uptick in Disruptive Hacktivism’
Election Interference
More Targeted Attacks
Fooling Users
Leveraging AI Tools
‘New Avenues For Cybercrime’

5 cybersecurity predictions for 2024
https://www.fastcompany.com/90997838/5-cybersecurity-predictions-for-2024
1. Advanced phishing
2. AI-powered scams
3. Increase in supply chain attacks
4. Deployment of malicious browser extensions
5. Changing demographics brings more threats

Top cybersecurity predictions of 2024
https://www.securitymagazine.com/articles/100271-top-cybersecurity-predictions-of-2024
Adoption of passwordless authentication
Multi-Factor Authentication (MFA) will become a standard requirement for most online services and applications. Traditional methods like SMS-based MFA will decline in favor of more secure options, such as time-based one-time passwords (TOTP) generated by authenticator apps.
Both enterprises and consumers are increasingly adopting passwordless solutions across various sectors. Transitioning to a passwordless mindset may appear unconventional, as it requires users to change their habits. However, the enhanced security and the seamless experience it offers reduce the learning curve, making the transition more user-friendly.
Cybersecurity will be a higher priority for law firms
For nearly any law firm, part of the ‘big picture’ approach to cybersecurity includes an ability to scale detection and response capabilities.
Artificial intelligence and large language models
Phishing and BEC attacks are becoming more sophisticated because attackers are using personal information pulled from the Dark Web (stolen financial information, social security numbers, addresses, etc.), LinkedIn and other internet sources to create targeted personal profiles that are highly detailed and convincing. They also use trusted services such as Outlook.com or Gmail for greater credibility and legitimacy.
We should also expect the rise of 3D attacks, meaning not just text but also voice and video. This will be the new frontier of phishing. We are already seeing highly realistic deep fakes or video impersonations of celebrities and executive leadership.
I expect to see a major breach of an AI company’s training data exposing the dark side of large language models (LLM) and the personal data they hold that were scraped from open sources.
One of the big trends we expect to see in 2024 is a surge in use of generative AI to make phishing lures much harder to detect, leading to more endpoint compromise. Attackers will be able to automate the drafting of emails in minority languages, scrape information from public sites — such as LinkedIn — to pull information on targets and create highly-personalized social engineering attacks en masse.
Simultaneously, we will see a rise in ‘AI PC’s’, which will revolutionize how people interact with their endpoint devices. With advanced compute power, AI PCs will enable the use of “local Large Language Models (LLMs)”
With the increase in regulatory and security requirements, GRC data volumes continue to grow at what will eventually be an unmanageable rate. Because of this, AI and ML will increasingly be used to identify real-time trends, automate compliance processes, and predict risks.
Prioritize training
Insider threats are a leading problem for IT/security teams — many attacks stem from internal stakeholders stealing and/or exploiting sensitive data, which succeed because they use accepted services to do so. In 2024, IT leaders will need to help teams understand their responsibilities and how they can prevent credential and data exploitation.
On the developer side, management will need to assess their identity management strategies to secure credentials from theft, either from a code repository hosted publicly or within internal applications and systems that have those credentials coded in. On the other hand, end users need to understand how to protect themselves from common targeted methods of attack, such as business email compromise, social engineering and phishing attacks.
Security teams need to prioritize collaboration with other departments within their organization to make internal security training more effective and impactful.

Humans Are Notoriously Bad at Assessing Risk
https://www.epanorama.net/newepa/2022/12/31/cyber-trends-for-2023/
We as humans, with our emotions, can sometimes be irrational and subjective. When too much subjectivity is mixed into risk assessment, it can produce a risk picture that is not an accurate representation of reality.

Threat Intel: To Share or Not to Share is Not the Question
https://www.securityweek.com/threat-intel-to-share-or-not-to-share-is-not-the-question/
To share or not to share isn’t the question. It’s how to share, what to share, where and with whom. The sooner we arrive at answers, the safer we’ll be collectively and individually.

Addressing the State of AI’s Impact on Cyber Disinformation/Misinformation
https://www.securityweek.com/addressing-the-state-of-ais-impact-on-cyber-disinformation-misinformation/
The recent rapid rise of artificial intelligence continues to be a game-changer in many positive ways. Yet, within this revolution, a shadow looms. By embracing a strategy that combines technological advancements with critical thinking skills, collaboration, and a culture of continuous learning, organizations can safeguard against AI’s disruptive effects.

108 Comments

  1. Tomi Engdahl says:

    Venäjä, Ukraina ja Kiiina maailman ensimmäisen kyberrikoslistan kärjessä
    https://etn.fi/index.php/13-news/16120-venaejae-ukraina-ja-kiiina-maailman-ensimmaeisen-kyberrikoslistan-kaerjessae

    Kansainvälinen tutkijaryhmä on kolmen vuoden intensiivisen tutkimuksen jälkeen koonnut kaikkien aikojen ensimmäisen “World Cybercrime Indexin”, joka tunnistaa maailman tärkeimmät kyberrikollisuuden keskittymät. Listan kärjessä ovat Venäjä, Ukraina, Kiina, Yhdysvallat ja Nigeria.

    Tutkimuksen toinen kirjoittaja tohtori Miranda Bruce Oxfordin yliopistosta ja UNSW Canberrasta sanoi, että tutkimus antaa julkiselle ja yksityiselle sektorille mahdollisuuden keskittää resurssinsa tärkeimpiin tietoverkkorikollisuuden keskuksiin. Samalla se antaa mahdollisuuden käyttää vähemmän aikaa ja varoja kyberrikollisuuden vastatoimiin maissa, joissa ongelmia ei ole.

    Kyberrikosindeksi on julkaistu PLOS ONE -lehdessä.
    https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0297312

    Reply
  2. Tomi Engdahl says:

    ”Monissa yrityksissä tietoturvaloukkaus on lähes väistämätön”
    https://etn.fi/index.php/13-news/16138-monissa-yrityksissae-tietoturvaloukkaus-on-laehes-vaeistaemaetoen

    Tietoturvayritys Barracuda Networks on julkaissut tietohallintoa koskevan CIO-raportin Leading your business through cyber risk. Sen tulokset ovat hälyttäviä. Jopa kuudella kymmenestä yrityksestä on vaikeuksia hallita tietoturvariskiä. – Monille yrityksille jonkinlainen tietoturvaloukkaus on nykyään lähes väistämätön, sanoo yhtiön tietohallintojohtaja Siroui Mushegian.

    Tutkimuksen tiedot ovat peräisin Cybernomicsin kyselystä, johon osallistui viime syyskuussa 1917 tietoturva-alan ammattilaista 100-5000 työntekijän yrityksistä eri toimialoilta Yhdysvalloissa (522), UK:ssa (372), Ranskassa (329), Saksassa (425) ja Australiassa (269).

    Tulokset osoittavat muun muassa, että monien organisaatioiden on vaikea toteuttaa koko yrityksen laajuisia turvallisuuskäytäntöjä, kuten todennustoimenpiteitä ja pääsynvalvontaa. Puolet (49 %) tutkituista pienistä ja keskisuurista yrityksistä mainitsi tämän yhdeksi kahdesta tärkeimmästä hallintoon liittyvästä haasteestaan. Lisäksi hieman yli kolmannes (35 %) pienemmistä yrityksistä on huolissaan siitä, että ylin johto ei pidä verkkohyökkäyksiä merkittävänä riskinä, kun taas suuremmat yritykset kamppailevat todennäköisimmin budjetin (38 %) ja ammattitaitoisten ammattilaisten (35 %) puutteen kanssa.

    Monet organisaatiot ovat huolissaan toimitusketjun turvallisuuden ja valvonnan puutteesta sekä näkyvyyden puutteesta kolmansiin osapuoliin, joilla on pääsy arkaluonteisiin tai luottamuksellisiin tietoihin. Noin joka kymmenennellä ei ole toimintasuunnitelmaa, mikäli yrityksen tietoturva vaarantuu.

    Reply
  3. Tomi Engdahl says:

    The CIO report:
    Leading your
    business through
    cyber risk
    Get expert guidance on how to navigate
    your business to a stronger, more resilient future
    https://www.barracuda.com/reports/cyber-resilience-report

    Reply
  4. Tomi Engdahl says:

    Dustin Volz / Wall Street Journal:
    Sam Altman, Satya Nadella, Sundar Pichai, Jensen Huang, and others join a panel to advise US DHS on deploying AI safely within America’s critical infrastructure

    OpenAI’s Sam Altman and Other Tech Leaders to Serve on AI Safety Board
    https://www.wsj.com/tech/ai/openais-sam-altman-and-other-tech-leaders-to-serve-on-ai-safety-board-7dc47b78?st=xggtkj1be488ozw&reflink=desktopwebshare_permalink

    Panel will advise Department of Homeland Security on deploying artificial intelligence safely within America’s critical infrastructure

    Reply
  5. Tomi Engdahl says:

    Reuters:
    Sources: ByteDance prefers a TikTok shutdown in the US rather than a sale if legal options fail, deeming TikTok’s algorithm as core to overall ByteDance systems — TikTok owner ByteDance would prefer shutting down its loss-making app rather than sell it if the Chinese company exhausts …

    https://www.reuters.com/technology/bytedance-prefers-tiktok-shutdown-us-if-legal-options-fail-sources-say-2024-04-25/

    Sherry Qin / Wall Street Journal:
    ByteDance says it has no plans to sell TikTok, responding to a report suggesting that it is considering scenarios for selling a majority stake in US TikTok
    https://www.wsj.com/tech/bytedance-says-it-wont-sell-u-s-tiktok-business-61f43079

    Reply
  6. Tomi Engdahl says:

    Pilvifirman asiakkaat menettivät kaiken datansa kyberhyökkäykseen, ja yhtiö lakkasi olemasta kotisivuja myöten – Voiko pilveen luottaa?
    Pilvipalveluita on totuttu pitämään paitsi kätevänä ja kustannustehokkaana myös turvallisena vaihtoehtona. Tanskalaisen Cloudnordic-palvelun romahdus herätti kuitenkin kysymään, voiko pilveen luottaa.
    https://www.tekniikkatalous.fi/uutiset/pilvifirman-asiakkaat-menettivat-kaiken-datansa-kyberhyokkaykseen-ja-yhtio-lakkasi-olemasta-kotisivuja-myoten-voiko-pilveen-luottaa/28de055f-1d64-4b3c-8e1a-1d2f772648d5#Echobox=1700778420

    Elokuussa 2023 pienen tanskalaisen pilvipalveluntarjoajan Cloudnordicin asiakkaille tapahtui pahin mahdollinen: kyberrikolliset olivat onnistuneet salaamaan kaikki yrityksen palvelinten tiedot, mukaan lukien tietojen varmistukseen käytetyt palvelimet.

    Reply
  7. Tomi Engdahl says:

    Volkswagen Group’s Systems Hacked: 19,000+ Documents Stolen
    https://gbhackers.com/volkswagen-systems-hacked/

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*