02.01.2024 Views

The Cyber Defense eMagazine January Edition for 2024

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Another reason why threats keep growing is related to how threat actors evolve their capabilities. Threat<br />

actors are good at advancing their capabilities because they operate as a syndicate. <strong>The</strong> level of<br />

in<strong>for</strong>mation sharing in the "threat community" is far higher than what we have on the defense side. Why?<br />

Threat actors do not have concerns about legal implications, mandates, privacy or IP protection. If sharing<br />

in<strong>for</strong>mation makes sense <strong>for</strong> them to achieve their goal, they will do it, regardless of the implications.<br />

Threat actors also advance their capabilities to counteract the evolution of defense practices, but they<br />

don't necessarily need to produce more advanced attack techniques. <strong>The</strong>y need to produce more<br />

effective techniques. If there's low hanging fruit, they will go <strong>for</strong> it; no need <strong>for</strong> a high tech alternative<br />

when simple and manual will do it. <strong>The</strong>y optimize towards their final objective, not towards a specific path<br />

to it. If they want to make money, they can move from trying to steal it directly from bank accounts to<br />

simple extortion when that produces more money at a lower cost. <strong>The</strong>y don't need to evolve to break all<br />

the barriers put up by defenders around those bank accounts if there is a cheaper and more efficient<br />

manner to get money.<br />

Because of all points above, the threat community acquires a certain evolutionary, Darwinian aspect.<br />

Just as species will not necessarily evolve towards better, advanced eyesight, speed and strength to<br />

survive, threat actors may not produce more advanced TTPs either: <strong>The</strong>y just need to survive - or, in<br />

their context, achieve their objectives. While objectives are easily reachable, no evolution is necessary.<br />

Finally, the potential outcome of threat activity is also something that grows continually. <strong>Cyber</strong>-attacks<br />

are one of the ways criminals can per<strong>for</strong>m financial fraud, <strong>for</strong> example. If there is more money circulating,<br />

it will attract more criminal activity, and criminal activity these days is one of the major drivers behind<br />

cyberthreats. <strong>The</strong>re are more potential targets, as the world becomes increasingly connected. It is natural<br />

to see more attempts to cause harm online when there are more things that can be harmed that way.<br />

<strong>The</strong> ability of threat actors to evolve their practices, more and bigger targets available, combined with<br />

how limited the target organizations are in affecting threat presence or intensity are clear explanations<br />

about why it is so easy to predict that threats will keep growing. So don’t be surprised if you see it, but<br />

also there is no need <strong>for</strong> defeatism. Common criminal activity has been around <strong>for</strong> years, but it doesn’t<br />

mean that our law en<strong>for</strong>cement does not work. Threats, just like crime, are part of our existence in the<br />

connected world. We must do as much as possible to keep the risk of suffering from those threats under<br />

control, but at the same time, keep in mind that it will be a continuous ef<strong>for</strong>t that will never reach a point<br />

where the problem is “solved”.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2024</strong> <strong>Edition</strong> 89<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!