BlueVoyant Report Reveals the Latest Cyber Attack Techniques

Share
BlueVoyant has released its second cyber defense trends report
BlueVoyant’s new cyber defence trends report reveals recent cyber criminal tactics and identifies the best practise for defending against them

Leading full-spectrum, cloud-native cyber defence company BlueVoyant was founded in 2017 with a mission to solve some of the most pressing cybersecurity challenges facing companies and government entities. By continuously monitoring your network, endpoints, attack surface, and supply chain, as well as the clear, deep, and dark web for threats, the company combines internal and external cyber defence capabilities into an outcomes-based cloud-native cyber security solution that illuminates, validates, and remediates threats for over 900 clients globally.

BlueVoyant’s recently released cyber defence trends report highlights the new risks organisations face from outside the traditional IT perimeters, revealing that recent cyber criminal tactics include using generative AI for phishing, online advertisements as an attack vector, and continued quicker exploitation of new vulnerabilities.

"AI is here to stay, which brings both benefits and drawbacks for businesses," says Ron Feler, BlueVoyant's Global Head of Threat Intelligence.

Ron Feler, BlueVoyant's Global Head of Threat Intelligence

"Alongside the huge benefits to businesses using AI to scale their operations and products, threat actors' growing use of AI for malicious purposes would force organisations to improve awareness amongst their employees, customers and partners for new cyber risks (such as sophisticated fake websites/emails) and also update and improve existing critical processes, such as the "know your customer" process, in order to deal with new AI-based cybercrime techniques (such as deep fake impersonations)."

 Feler is the former Deputy Commander of the Israeli Defense Forces’ Unit 8200, a unit he served in for 26 years. Prior to becoming the Unit’s Deputy Commander, he was Head of Intelligence Production in the unit. Feler received his Bachelor of Arts in Computer Science and the History of the Middle East from Tel Aviv University. He joined BlueVoyant in 2017.

Staying on top of changing cyber crime tactics

“Organisations’ attack surfaces are ever expanding, and cyber threat actors are adapting their strategies to exploit new avenues of vulnerabilities,” shares Joel Molinoff, BlueVoyant’s Global Head of Supply Chain Defence. 

“BlueVoyant undertook this research to shine a light on the attack vectors organisations need to be aware of and recommended actions to help prevent the latest threats.” 

“The biggest cybersecurity risk from the increasing use of AI tools is an escalated volume of attacks,” Feler adds.

“While the essentials of the attacks don’t change, the increased number and diversity of attacks make defenders’ jobs more challenging.”   

The report is based on research completed using trend data queries from BlueVoyant’s Supply Chain Defence and Digital Risk Protection solutions, and focuses on:

  • Online ads as an attack vector
  • Cyber criminals’ use of AI
  • The need for better email security
  • The continued need to patch quicker

**************

Make sure you check out the latest industry news and insights at Cyber Magazine and also sign up to our global conference series - Tech & AI LIVE 2024

**************

Cyber Magazine is a BizClik brand 

**************

Share

Featured Articles

How The UK’s AI Plan Will Impact The Cybersecurity Sector

The UK’s £14bn AI investment requires enhanced cybersecurity measures as Kyndryl and Vantage Data Centres prepare for infrastructure expansion

Darktrace to Acquire Cado Security in Cloud Defence Push

AI cybersecurity firm Darktrace expands its cloud investigation capabilities through purchase of Cado Security, following recent acquisition by Thoma Bravo

Sophos MDR Reports 37% Customer Growth in Cybersecurity Push

Managed detection service now protects 26,000 organisations as demand rises for round-the-clock threat monitoring and incident response capabilities

Netskope Data Shows Phishing Success Rate Tripled in 2024

Cyber Security

CrowdStrike Field CTO Warns of Identity-Based Attacks Shift

Cyber Security

Gartner: How to Align Risk Management and Governance in 2025

Operational Security