Kaspersky’s APT predictions for 2024: increased sophistication, broader targets, and more attacks Kaspersky’s APT predictions for 2024: – Increased sophistication – Broader targets – More attacks

Kaspersky’s new report provides the company’s view on the . Existing APT techniques will keep being used, and new ones will likely emerge, such as the increase in AI usage, hacktivism and targeting of smart home tech. New botnets and rootkits will also likely appear, and hacker-for-hire services might increase, as will supply chain attacks, which might be provided as a service on cybercriminals’ underground forums.

Here are some specific examples:

* Kaspersky found that APT attackers might expand their surveillance efforts to include more smart home technology devices, such as smart home cameras and connected car systems.
* Botnets are typically more prevalent in cybercrime activities compared to APT, yet Kaspersky expects the latter to start using them more.
* More kernel-level code will be deployed.
* More hacktivism tied to APTs.
* Supply chain attacks as a service.
* More groups in the hack-for-hire business.
* Increase in AI use for spearphishing.
* MFT systems targeting will grow.

To protect against APT attacks, it is necessary to protect personal and corporate devices and systems. In a corporate environment, using solutions such as , and systems greatly helps detect threats, centralize data, accelerate analysis and correlate security events from various sources.

Here are some specific recommendations:

* Implement strict access controls.
* Use multifactor authentication.
* Network segmentation.
* Have an up to date incident response plan.
* Conduct regular audits and assessments.
* Use Cyber Threat Intelligence feeds.
* Collaborate with industry peers.
* Keep all systems and devices up to date and patched.
* Train employees about , particularly spearphishing.

Link to the original story: https://www.techrepublic.com/article/kaspersky-advanced-threat-predictions-2024/

Add a Comment

Your email address will not be published. Required fields are marked *