Positive Technologies Predicts AI Will Drive Over 50% of Cyberattack Techniques Soon – Security Review Magazine

Published:


Q3 2024 Cybersecurity Threatscape: Rising Attacks on IT Professionals and Supply Chain Vulnerabilities

Cybersecurity Threats Surge in Q3 2024: IT Professionals in the Crosshairs

In a startling revelation, Positive Technologies has unveiled its Q3 2024 cybersecurity threatscape study, highlighting a 15% year-on-year increase in attacks against individuals and organizations. Alarmingly, IT professionals emerged as the most frequent targets, accounting for 13% of individual attacks. Cybercriminals are increasingly exploiting these specialists to infiltrate IT companies and launch devastating supply chain attacks.

The study indicates that malware remains the weapon of choice, with a staggering 72% of attacks utilizing this method. Hackers have employed a variety of tactics, including malicious ads, compromised package managers, and even orchestrated fake interviews to trick IT specialists into downloading harmful software. Valeriya Besedina, Junior Information Security Analyst at Positive Technologies, emphasized the strategic nature of these attacks, stating, “By targeting IT specialists, attackers can breach larger entities and disrupt entire software supply chains.”

The report also highlights the rise of Remote Access Trojans (RATs), which provide cybercriminals with continuous access to compromised systems. Notably, attackers have exploited vulnerabilities in popular package repositories, hijacking over 22,000 packages to spread malware unnoticed.

As organizations grapple with these escalating threats, Positive Technologies advocates for a robust cybersecurity framework. Recommendations include implementing automated defense systems, conducting regular asset inventories, and utilizing advanced monitoring tools like MaxPatrol SIEM. Additionally, IT specialists are urged to remain vigilant, avoiding suspicious links and downloads.

With cyberattacks occurring at an alarming rate—at least once every two days—experts stress the importance of proactive measures to safeguard sensitive data and maintain operational integrity in an increasingly perilous digital landscape.

Related articles

Recent articles