Emerging Threats to Add to Your Security Radar Screen

  /     /     /  
Publicated : 22/11/2024   Category : security


Emerging Threats to Add to Your Security Radar Screen


The cybersecurity threat landscape is poised to grow in size and complexity - what to look out for.



As security pros scramble to defend against todays threats as well as a new wave of attacks such as the
WannaCry ransomware worm
, emerging technologies and determined cybercriminals are poised to make cyber-defense even more complex.
Machine learning and the Internet of Things arent new terms, but theyre new to the workplace. As more businesses adopt advanced systems, theyll find themselves vulnerable to a broader range of security threats. The geopolitical landscape will also drive security risk as nation-states target foreign adversaries without fear of punishment.
At last weeks Interop ITX conference in Las Vegas, security experts discussed the implications of current and future threats. Here are what they identified as the next big threats for enterprises:
The Internet of Things
IoT poses a tremendous security threat as users and devices become increasingly connected. The problem is, its so new that many people havent begun to worry about it.
I was blown away to hear most people dont think thats really a thing yet, said Dawn-Marie Hutchinson, executive director for the office of the CISO at Optiv, of the IoT during her Interop presentation on securing enterprise infrastructure.
The pressure to build for the IoT has already started. Companies rushing to cash in on the demand for connected products are churning out smart appliances, accessories, and other gadgets faster than they can secure them. Most people dont bother to take precautions like changing default passwords, an oversight thats leaving them vulnerable.
Were racing for innovation and disruption … but just because you can, doesnt mean you should, says Cheryl Biswas, a cybersecurity consultant for threat intelligence at KPMG. We dont need any of this stuff, but we are making it.
The competition is driving an influx of Internet-connected devices built without basic security measures, and businesses and consumers will be at risk as flaws are discovered and exploited. The implications of poor IoT securitywere underscored with last years Mirai botnet attacks and the 
Persirai botnet
 discovered earlier this month.
FireEye CEO Kevin Mandia says attack strategies will continue to change and may evolve to the point where attackers will begin to exploit user trust. Human communication will become the backbone for how we control devices, he says.
With wearable devices, all will be cloud-based, as well all have physiology combined with technology, combined with the Internet, Mandia continues. Money, identity, everything will be part of the devices that you carry.
Machine Learning
Todays criminals may find success with quick-and-easy attacks, but look for them to experiment with advanced techniques as machine learning and artificial intelligence as these technologies slowly pervade our everyday lives through Alexa, Amazon Echo, search results, and other instances.
The information that machine learning systems derive from rules, heuristics, signatures, and people will soar into the billions of pieces of information, according to Mandia. If the good guys are using it, we can bet the bad guys will use it, too.
Future attackers will exploit peoples reliance on machine learning and ignorance of how it generates results. Many users dont take time to understand the processes behind these systems, instead trusting machine learning algorithms to find the shortest path to a result.
Machine learning accepts what its given, and theres no transparency into what went into a decision or model, explains Anomali VP of product management Anthony Aragues.
He anticipates this will fuel the rise of adversarial machine learning, where attackers enter false information into systems to generate bad results. This could be used to disrupt services like facial recognition, as well as to misdirect people and conduct other attacks that abuse user trust in machine learning to target victims.
Nation-states
The risk of nation-state cyberattacks will also evolve amid todays geopolitical landscape. Were at the beginning of an age when well miss data breaches, said Paul Kurtz, TruSTAR cofounder and CEO, during a talk on nation-state attacks at last weeks Interop conference.
Everything weve seen so far … is nothing, he continued, explaining how nation-state attacks will lead to more serious damage like incapacitated systems. These threats are so complex because adversaries share tools and strategies, and attacks are collaborative and automated.
Kurtz explained how adversaries like Russia and China are considered major powers because they have the influence to threaten victims in an existential way. Regional powers North Korea and Iran pose less of an immediate danger but are still a growing concern.
Were always on defense in cybersecurity, FireEyes Mandia said of the rise in nation-state threats during his Interop
keynote
. Foreign adversaries dont need complex tactics; many exploit human trust. More than 90% of attacks FireEye investigates began with spearphishing.
Mandia noted FireEye is responding to more state-sponsored intrusions than financially motivated attacks. The rise in nation-state threats is partly due to a lack of punishment: there are no risks or repercussions to hackers, he continued.
Itll be about money, itll be about influence, itll be about espionage, said Mandia of future attacks.
What to do about it
With the IoT, its basically everyday things becoming digital, said Daniel Miessler, director of advisory services at IOActive, during his Interop presentation on IoT security. The problem is, businesses depend on those everyday things.
He advised businesses adopting IoT take the time to conduct risk assessments before implementing products. Ask the questions: What data is being captured, and via what sensors? Where is it sent? How is it stored?
Those who use machine learning should not accept that a magic algorithm is producing good results, says Aragues. Take the time to understand how these systems work and interpret data so you can recognize and respond when something is suspicious.
On a consumer level, we need to emphasize
basic security steps
and explain the risks to users, says IBM Securitys global executive security advisor Diana Kelley. Cyberattacks will become more disruptive as we depend more on software and connectivity, she predicts.
The key is making security accessible, she says. We need to help people help themselves.
Related Content:
In Search of an Rx for Enterprise Security Fatigue
Ransomware Rocks Endpoint Security Concerns
5 Security Lessons WannaCry Taught Us the Hard Way
Dont Forget Basic Security Measures, Experts Say

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Emerging Threats to Add to Your Security Radar Screen