Cyber Insecurity Vol 7 No 12 December 2023 | Page 19

Top 10 emerging cyber dangers in 2024

From sophisticated ransomware attacks to the infiltration of supply chains and the exploitation of artificial intelligence , emerging threats have made the cybersecurity landscape more complex and perilous than ever before , according to GSI , a cybersecurity company . According to GSI ’ s predictions for 2024 , there are at least 10 emerging dangers that demand our attention .

1 . Supply chain software attacks : Cybercriminals have found a sneaky way to infiltrate organizations by targeting their supply chain through trusted vendors and suppliers . They exploit this indirect route by infecting software updates or injecting malicious code into software causing widespread breaches .
2 . Third-party contractor breaches : As the reliance on third parties and independent contractors continues to grow , the threat of third-party breaches becomes even more significant . Cybercriminals can exploit less-protected networks belonging to these third parties , which often have privileged access to the hacker ’ s main target . This issue is exacerbated by the shift to remote work , as organizations are more willing to hire freelancers and work with dispersed teams .
3 . Emerging threats from Artificial Intelligence : AI-powered malware can cleverly adapt to avoid detection , identify vulnerable targets , and tailor attack methods , putting traditional cybersecurity defenses to the test . Adversarial attacks exploit AI vulnerabilities by manipulating algorithms to produce inaccurate results , leading to potential system compromise , data breaches and data poisoning .
4 . Cloud security challenges : Despite the robust infrastructure provided by the cloud , the risk of data loss also looms large . In one data breach , an anonymous Chinese software developer managed to clandestinely scrape user information from Alibaba ’ s popular Chinese shopping website , Taobao , exposing a staggering amount of over 1.1 billion user data pieces .
5 . Skill shortages : Organizations that have unfilled cybersecurity positions will remain prime targets for criminals seeking vulnerabilities to exploit .
6 . Misconfigurations : Security misconfigurations can arise when security settings are not properly implemented or when errors occur during deployment . These misconfigurations create vulnerabilities that can expose applications and their data to potential cyber-attacks or breaches .
7 . Expanding attack surface : The rapid growth of cloud computing , mobile applications , IoT devices , APIs , open-source code , remote work , bring-your-own-device policies and interconnected supply chains has created opportunities for sophisticated attacks and will continue to present new challenges in the future . The attack surface in the digital realm includes hardware , software , applications , code , ports , servers , and websites that connect to an organization ’ s network . It also involves the concept of shadow IT , where unauthorized applications or devices are used .
8 . Zero-day exploits and advanced persistent threats : Sophisticated attackers can stealthily infiltrate networks , evading detection for prolonged periods , leading to data exfiltration and long-term damage . Zero-day exploits are cyber-attacks that target software vulnerabilities that are unknown to the software ven-
CONTINUED ON PAGE 21
19