Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024

Post a Comment

To move forward, it’s good to take a minute and reflect on what’s happened.

Today’s episode focuses on insights from Daniel Blackford and Alexis Dorais-Joncas, both Senior Managers of Threat Research at Proofpoint. This is the first in our two-part series looking at what’s on the horizon for 2024.

Reflecting on 2023, they discuss the use of QR codes, major technique shifts from the biggest ecrime and APT actors, and the ongoing problem of ransomware.

Looking ahead to 2024, the emphasis goes to the gradual shift of attacks outside corporate-managed infrastructure, leveraging personal email accounts to bypass extensive security measures. On the cybercrime side, there’s a prediction of the continued development of as-a-service models, particularly focusing on traffic distribution services, leading to more modular and challenging-to-attribute attack chains.

They also dive into:

  • Threat actor activity during the elections and Olympics
  • Specific threat actor groups that caught their attention in 2023, TA473 and TA577
  • Living off the Land concepts
For more information, check out our website.

Article Link: Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024

1 post - 1 participant

Read full topic



Malware Analysis, News and Indicators - Latest topics
Sp123
"The real threat is actually not when the computer begins to think like a human, but when humans begin to think like computers."

Post a Comment