Seeky

Cybersecurity trends for 2024

Date of issue

23. 2. 2024

Are you interested in the described topic?

contact us
Cybersecurity trends for 2024

According to all available indications and expert reports from the world of “Big Tech”, 2024 seems to be a turning point in the field of cyber security. By the end of the year, the cost of cyber attacks on the global economy is estimated to reach $10.5 trillion.

A number of trends and challenges are expected to have an immediate impact on the way organisations protect themselves. Two factors will dominate. The increasing number of security threats and the continuing increase in their sophistication.

What can we expect?

1. Increase in cyber attacks using artificial intelligence

With the increasing use of artificial intelligence (AI) and machine learning (ML), the sophistication of cyber attacks is expected to increase dramatically .

For example, in the area of phishing attacks, spoofed emails will be more difficult to detect, because attackers use information from publicly available sources, such as professional social networks, where they tailor the content to their target and generate it “at the snap of a finger”, in an order of magnitude and size never seen before. Entire generative adversarial networks (GANs) have already been created to create fake news, voices and images. These new technologies and environments support the so-called 3D vector of phishing attacks, i.e. using augmented video and audio material.

Another example of the use of AI is the creation of new types of malicious code, whether it is tools for exploiting the environment or adaptive forms of malware that can adapt to defence mechanisms and changes in the environment. This type of malware can dynamically change its behaviour and attack patterns based on detection methods and the response of security systems.

2. Continued development of ransomware

Ransomware attacks continue to grow this year not only because of their high profitability, but the fact that attackers have been using the ransomware-as-a-service (RaaS) model. This allowed less experienced attackers to carry out attacks. This type of attack is also becoming more targeted, with attackers using increasingly advanced techniques and strategies, including geographic targeting.

Organized groups remain a major threat, and they are conducting much more thorough reconnaissance of their targets, thereby increasing their success. For example, they collect information on network architecture, technologies used, security measures and workflows. They create fake emails to confirm MFA or websites that pose as legitimate to obtain access credentials and other sensitive information. They also use social engineering to obtain information about the target organization and their employees. This is done by externally researching the organization using publicly available information such as public profiles of the organization and their employees on social media, the web, and public databases. This makes it relatively easy to obtain key information about the organisation’s structure, key employees and partner-supplier relationships.

3. Cyber warfare, espionage and geopolitical attacks

Given the rising tensions in Eastern Europe and the Middle East, a significant increase in geopolitical attacks can be expected. These may include the dissemination of disinformation and propaganda to manipulate public opinion, destabilise political processes and undermine public confidence in democratic institutions. State actors may target critical infrastructure such as power grids, telecommunications systems and medical facilities to undermine the economy and security. Cyber espionage and sabotage may aim to obtain sensitive information, influence production processes or cause damage to the infrastructure and service systems of target countries.

As the number of connected devices increases, so does the risk of cyber attacks on IoT devices. Attackers will continue to exploit the vulnerabilities of IoT devices to create botnets, which are networks of connected devices that can be used to carry out malicious activities, such as DDoS attacks. IoT devices used in critical infrastructure, industrial systems, and healthcare facilities are also at risk, with the aim of causing damage or affecting operations. This can include attacks on smart cities, energy grids, transport systems and other key sectors.

Many IoT devices have inadequate protection and contain a number of vulnerabilities. For example, weak passwords, insufficient communication security and lack of software updates. With the growing number of smart home devices and wearable technologies, the risks associated with their misuse are also expected to increase.

Planning and effective investment will be key

According to a Flexera survey, 39% of companies surveyed expect a significant increase in cloud investments, despite the fact that increasing computing capacity and hosting is no longer a focus. So where are these cost increases coming from, often beyond planned budgets? One answer is the development and adoption of artificial intelligence. Another factor is the new NIS2 directive.

Insight and a good understanding of key trends in cybersecurity, including opportunities to leverage ML/AI tools, is central to key planning strategies and investments in advanced protection.

The industry will continue to face a shortage of skilled workers

The growing number of cyber threats has put the IT industry in a deep deficit of skilled workers. At the end of last year, there were approximately 1 million job openings with this specialisation in Europe, according to the Digital Skills & Job Platform, with estimates approaching 4 million globally. The expected demand for cyber professionals has long exceeded supply. As a result, this means the inevitable need to move to advanced protection methods such as Zero Trust architecture and the involvement of Machine-Learning/AI tools, regardless of the size and importance of the organization.

Petr Malina, Business Development Manager

More posts

We live with digital technologies. And that’s why we write about them.

Latest Articles
More posts
1/10

Or contact us directly

Martina Plisková

Martina Plisková

office coordinator

Contact us

Fill out our form, we will contact you within a few days with a proposal for a non-binding consultation.