scenarios more convincing and dangerous.
Posted: Wed Jan 22, 2025 8:05 am
However, Vladislav Tushkanov, head of machine learning research and development at Kaspersky Lab, believes that artificial intelligence will not have a major impact on the threat landscape in 2024: “Like any technological advancement, generative AI brings new risks into our lives along with exciting opportunities. Although attackers are actively mastering new technologies, this is unlikely to radically change the attack landscape in 2024. In many cases, new tools are not yet good enough or easy to use.”
"In 2024, attacks on the public iran whatsapp number database sector will have more devastating consequences that may affect critical public services. Russian government organizations will face an increase in the number of highly skilled targeted attacks from APT groups. Hacktivism will continue to gain momentum, and the motives of attackers will remain extortion and disruption of the core activities of organizations in this sector," notes Irina Zinovkina. She also predicted that the intensity of attacks on supply chains will increase.
Head of the Information Security Threat Response Department at PT ESC Denis Goydenko drew attention to such industries as IT and telecom: an attack on one such company will affect not only it, but also significant numbers of their clients from other industries, including fairly well-protected ones. Therefore, he predicts a significant increase in attempts to attack them by attackers, which, however, does not mean that all these attempts will be successful. According to Denis Goydenko, a surge in attacker activity should be expected during the election campaign, which will take place in March 2024.
According to Positive Technologies experts, in the last two years, Russian companies have rapidly grown in maturity in the field of information security. For example, Denis Goydenko noted that companies, having learned about an information security incident at their partners, quite often request an information security audit, which allows them to detect intrusions at an early stage, before it could lead to serious consequences.
Head of the Standoff 365 bug bounty department Anatoly Ivanov noted a noticeable increase in practical interest in vulnerability search programs from medium-sized businesses. However, in his opinion, the example of the Ministry of Digital Development played a major role here: "At the beginning of the year, the Ministry of Digital Development launched a short-term bug bounty to test "Gosuslugi" and the Unified Identification and Authentication System. As a result, 34 vulnerabilities were found, mainly of medium and low severity. In August, our researchers tested the remote electronic voting system. And in November, the Ministry of Digital Development posted the second part of the program: this time the number of services increased to nine, and the term increased to a year. Now the platform also has a program for the Moscow Region government services portal. In general, in many countries around the world, there is a trend towards holding bug bounties for government systems, since the public sector is the most attacked area. In Russia, the public sector can also become a driver for launching public vulnerability search programs."
"In 2024, attacks on the public iran whatsapp number database sector will have more devastating consequences that may affect critical public services. Russian government organizations will face an increase in the number of highly skilled targeted attacks from APT groups. Hacktivism will continue to gain momentum, and the motives of attackers will remain extortion and disruption of the core activities of organizations in this sector," notes Irina Zinovkina. She also predicted that the intensity of attacks on supply chains will increase.
Head of the Information Security Threat Response Department at PT ESC Denis Goydenko drew attention to such industries as IT and telecom: an attack on one such company will affect not only it, but also significant numbers of their clients from other industries, including fairly well-protected ones. Therefore, he predicts a significant increase in attempts to attack them by attackers, which, however, does not mean that all these attempts will be successful. According to Denis Goydenko, a surge in attacker activity should be expected during the election campaign, which will take place in March 2024.
According to Positive Technologies experts, in the last two years, Russian companies have rapidly grown in maturity in the field of information security. For example, Denis Goydenko noted that companies, having learned about an information security incident at their partners, quite often request an information security audit, which allows them to detect intrusions at an early stage, before it could lead to serious consequences.
Head of the Standoff 365 bug bounty department Anatoly Ivanov noted a noticeable increase in practical interest in vulnerability search programs from medium-sized businesses. However, in his opinion, the example of the Ministry of Digital Development played a major role here: "At the beginning of the year, the Ministry of Digital Development launched a short-term bug bounty to test "Gosuslugi" and the Unified Identification and Authentication System. As a result, 34 vulnerabilities were found, mainly of medium and low severity. In August, our researchers tested the remote electronic voting system. And in November, the Ministry of Digital Development posted the second part of the program: this time the number of services increased to nine, and the term increased to a year. Now the platform also has a program for the Moscow Region government services portal. In general, in many countries around the world, there is a trend towards holding bug bounties for government systems, since the public sector is the most attacked area. In Russia, the public sector can also become a driver for launching public vulnerability search programs."