The Cyber Year in Stories: Winter 2024
AI, Elections & Cloud Attacks: CrowdStrike’s Threat Report
Global cybersecurity leader CrowdStrike has redefined modern security with the world's most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
The 10th edition 2024 CrowdStrike Global Threat Report explores activities of some of the most prolific threat groups, and highlights the surge in stolen identity credentials being leveraged to exploit gaps in cloud environments and maximise the stealth, speed and impact of cyberattacks. The report digs into the disruptions of the global elections expected in 2024, as well as the exploitation of gen AI to launch more sophisticated attacks.
“Adversaries have faced a hardening attack surface thanks to huge advancements in threat defence technology and threat awareness. But they have responded by increasingly adopting and relying on techniques that empower them to move faster and evade detection - it took only 31 seconds for an adversary to drop initial discovery tools in an attempt to compromise victims this year,” Zeki Turedi, Field CTO Europe, CrowdStrike told Cyber Digital.
Turedi has been with the company since 2016, acting as a trusted advisor and strategist for organisations across Europe.
He is an influential, tenacious and highly motivated cybersecurity leader with professional experience specialising in Endpoint and Network Cyber Security, as well as extensive Incident Response and Forensic knowledge within Law Enforcement and the private sector.
“CISO’s and threat response teams must disrupt these adversaries faster than ever before. We can achieve this through adopting an adversary-focused approach as well as through next generation AI security tools that protect assets from all endpoints, remediate threats and ultimately stop breaches.”
The advent of quantum computers is reshaping our approach to data security, with alarming predictions of current cryptosystems becoming vulnerable within five years.
Enter Thales and Quantinuum, introducing the PQC Starter Kit to assist enterprises in gearing up for Post-Quantum Cryptography (PQC). This innovative kit, the first of its kind, empowers businesses to test quantum-hardened PQC-ready encryption keys within a trusted environment, comprehending the implications quantum computing brings to infrastructure security.
“We understand the enormous challenges and complexities behind this upcoming disruption in cryptography and want to support customers as they transition to these new algorithms,” comments Todd Moore, Global Head of Data Security Products at Thales. “For organisations unsure of navigating this transition, we highly recommend testing current applications, data, and devices that use cryptographic protection as soon as possible to ensure a smooth shift to PQC. Although quantum computing may seem like a future-looking risk, with hackers using HNDL tactics, post-quantum resilience should be on every organisation’s radar today.”
Decrypting the threat landscape
A recent report by DigiCert highlights that 74% of organisations fear 'harvest now, decrypt later' (HNDL) attacks, where encrypted data is collected for future decryption.
“Research suggests that within three years, there is a one in seven chance that quantum computers will break the most used computer encryption systems — this number goes as high as 50% by 2031,” Andersen Cheng, CEO of Post-Quantum told Technology Magazine recently. “Therefore, failing to secure your digital infrastructure against the threat of quantum computing leaves your data and systems vulnerable to attack.”
Thales and Quantinuum's PQC Starter Kit positions itself as the essential tool for organisations to test within a trusted lab environment, using NIST proposed algorithms to assess various security use cases. Customers can observe the impact of implementing PQC technology in simulated test-lab scenarios without affecting operational processes in real-world environments.
Three more winter highlights
Canonical and Intel Collaborate for Confidential Computing
Veeam Finds Ransomware Attacks Are Driving Inflation
McKinsey: Six common beliefs that create unnecessary risks
Explore the latest edition of Cyber Magazine and be part of the conversation at our global conference series, Tech & AI LIVE and Cyber LIVE.
Discover all our upcoming events and secure your tickets today.
Cyber Magazine is a BizClik brand