Modern Australian
The Times Real Estate

.

Proliferation of AI-driven Attacks Anticipated in 2024

Trend Micro urges industry-led regulation and innovative defence strategies

HONG KONG SAR - Media OutReach Newswire - 20 December 2023 - Trend Micro Incorporated (TYO: 4704; TSE: 4704) a global cybersecurity leader, a global cybersecurity leader, a global cybersecurity leader, today warned of the transformative role of generative AI (GenAI) in the cyber threat landscape and a coming tsunami of sophisticated social engineering tactics and identity theft powered GenAI tools.

To read Trend Micro's 2024 cybersecurity predictions, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/predictions/critical-scalability-trend-micro-security-predictions-for-2024

Eric Skinner, VP of market strategy at Trend: "Advanced large language models (LLMs), proficient in any language, pose a significant threat as they eliminate the traditional indicators of phishing such as odd formatting or grammatical errors, making them exceedingly difficult to detect. Businesses must transition beyond conventional phishing training and prioritize the adoption of modern security controls. These advanced defenses not only exceed human capabilities in detection but also ensure resilience against these tactics."

The widespread availability and improved quality of generative AI, coupled with the use of Generative Adversarial Networks (GANs), are expected to disrupt the phishing market in 2024. This transformation will enable cost-effective creation of hyper-realistic audio and video content—driving a new wave of business email compromise (BEC), virtual kidnapping, and other scams, Trend predicts.

Given the potentially lucrative gains* that threat actors might achieve through malicious activities, threat actors will be incentivized to develop nefarious GenAI tools for these campaigns or to use legitimate ones with stolen credentials and VPNs to hide their identities.

AI models themselves may also come under attack in 2024. While GenAI and LLM datasets are difficult for threat actors to influence, specialized cloud-based machine learning models are a far more attractive target. The more focused datasets they are trained on will be singled out for data poisoning attacks with various outcomes in mind—from exfiltrating sensitive data to disrupting fraud filters and even connected vehicles. Such attacks already cost less than $100 to carry out.

These trends may, in turn, lead to increased regulatory scrutiny and a push from the cybersecurity sector to take matters into its own hands.

"In the coming year, the cyber industry will begin to outpace the government when it comes to developing cybersecurity-specific AI policy or regulations," said Greg Young, VP of cybersecurity at Trend. "The industry is moving quickly to self-regulate on an opt-in basis."

Elsewhere, Trend's 2024 predictions report highlighted:

A surge in cloud-native worm attacks, targeting vulnerabilities and misconfigurations and using a high degree of automation to impact multiple containers, accounts and services with minimal effort.

Cloud security will be crucial for organizations to address security gaps in cloud environments, highlighting the vulnerability of cloud-native applications to automated attacks. Proactive measures, including robust defense mechanisms and thorough security audits, are essential to mitigate risks.

More supply chain attacks will target not only upstream open-source software components but also inventory identity management tools, such as telco SIMs, which are crucial for fleet and inventory systems. Cybercriminals will also likely exploit vendors' software supply chains through CI/CD systems, with a specific focus on third-party components.

Attacks on private blockchains will increase as a result of vulnerabilities in the implementation of a number of private blockchains. Threat actors could use these rights to modify, override, or erase entries and then demand a ransom. Alternatively, they could try to encrypt the entire blockchain if it's possible to seize control of enough nodes.

*BEC cost victims over $2.7bn in 2022, according to the FBI.




Hashtag: #trendmicro #2024predictions #cybersecurity #cloudsecurity #cyberattack





The issuer is solely responsible for the content of this announcement.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

What to Look for in a Reliable Junk Removal Service

Choosing the right junk removal service can feel overwhelming, especially with so many options available. Every year, households and businesses genera...

Freight Shipping a Motorcycle: Avoid These Common Mistakes

Image by Ultimatetransport123 Shipping a motorcycle can be a relatively simple and smooth process. However, even the smallest error can result in d...

Large Bore Steel Pipes: Applications and Advantages in Industrial Projects

As the name implies, large bore steel pipes are massive, powerful tubes. By massive, we’re referring to their large diameters which typically star...

The Business Case for Installing EV Chargers at Service Stations: ROI and Future Trends

As Australia transitions to a net-zero future, the electric vehicle (EV) market is rapidly gathering momentum. With EV ownership in the country fo...

Wealth Without Boundaries: 5 Location-Independent Income Strategies

Photo: Mesut Kaya / Unsplash Many people dream of working from pristine beaches in Thailand, cosy cabins in the Alps, or the best coworking spaces Me...

High Visibility Work Shirts: A Must-Have for Workplace Safety

Workplace safety is a necessity. Workers from construction sites to manufacturing units should be visible for their well-being and they have it by w...

How to Prepare for Your Wedding Video Shoot: A Step-by-Step Guide

Your wedding video captures one of the most important days of your life, preserving precious memories and moments for years to come. To ensure the d...

Preparing for Debt Collection Amidst Economic Downturn in Australia

Economic downturns bring financial uncertainty, especially for Australian businesses reliant on consistent cash flow. The challenges multiply when c...

How to Enhance the Security of Your E-Commerce Site

In the digital age, e-commerce has become a vital part of the global economy, allowing businesses to reach customers far and wide. However, with thi...

Understanding Disability Service Providers: Roles and Responsibilities

Disability service providers are people who support individuals with disabilities. Their role is pretty simple: help people live their lives more in...

Top 10 Guest Posting and Content Agencies in Massachusetts for 2025

Digital marketing relies on SEO content creation and guest posting to get more people to see your website, increase search engine rankings, and establ...

Same Day Rubbish Removal: Convenience and Efficiency at Your Doorstep

In today’s fast-paced world, convenience is king. From on-demand food delivery to next-day shipping, modern living is all about getting what you n...

Optimising Workforce Efficiency: The Benefits and Implementation of Employee Scheduling Software

"Master workforce management with our guide on Employee Scheduling Software. Streamline tasks & increase efficiency seamlessly!" Employee sched...

Enhancing Road Safety with Technology and Apps

Road safety has always been a critical concern for individuals, organisations, and governments alike. With the rapid advancements in technology, a n...

Best Cleaning Methods and Tools for Solar Panels

Solar panels are a fantastic way to harness renewable energy, but keeping them clean is essential to maximise their efficiency. Dust, grime, bird dr...

The Benefits of Implementing a Uniform Policy

A well-thought-out uniform policy can be a game-changer for organisations of all types. Whether you run a corporate office, a retail store, or a tra...

Why Hiring a Sacramento Car Accident Lawyer Can Maximize Your Compensation

Car accidents can be life-altering, leaving victims with physical injuries, emotional trauma, and significant financial burdens. When faced with suc...

Can Your Air Conditioner Prevent Illness?

When you think about air conditioning, you probably picture cool air on a hot summer day. But what if your AC could do much more than keep you com...