2024: AI weaponisation wave to fuel cyber threats, say experts.

December 27, 2023
1 min read

Experts from Egress have predicted that there will be a wave of AI weaponisation in cyber threats by 2024. This prediction reflects the advancements in cybersecurity technology and the increasing creativity of cyber criminals. The experts warn that cyberattacks will become more automated and personalised, with attackers leveraging Open Source Intelligence (OSINT) to create specific templates of phishing attacks. The threat is expanding to target the technology and AI systems used to protect organisations, with attackers exploiting the learning mechanisms of these systems. Compromised business accounts are also becoming a growing threat to supply chains, with multi-channel attacks utilising methods commonly seen in marketing. QR code phishing is expected to surge in 2024, as threat actors have started using QR codes in phishing campaigns to evade traditional defences. Cybercriminals are also harnessing AI technology to target AI systems and bypass Natural Language Processing (NLP) and linguistic checks. As communication and collaboration tools advance, the security and tone of communication could be neglected, leading to a migration of socially-engineered attacks from email to collaboration platforms. Egress’s Chief Customer Officer emphasizes the need for more interoperability between cybersecurity vendors and urges vendors to focus on demonstrating value at every customer interaction.

Latest from Blog

Top 3 Cybersecurity Stocks for May 2024 Buy Now

TLDR: Key Points: Cybersecurity stocks are using AI to enhance their platforms Top cybersecurity stocks to buy now include Crowdstrike, Fortinet, and Palo Alto Networks Article Summary: The cybersecurity market is booming

Get Secure: Know the Basics of Cloud Security Fundamentals Now

TLDR: Cloud security fundamentals are essential for data protection, regulatory compliance, and access management in a cloud environment. Key fundamentals include identifying assets, implementing security controls, conducting risk assessments, managing user access