Back in the heady days of dial-up connections and the early internet, a solid antivirus program was considered enough to protect your home or work PC from the handful of threats making the rounds.
Fast forward 20 years and the “threat landscape”, to borrow from cybersecurity parlance, has shifted considerably. Yesteryear’s trojans and worms still exist, but they have been joined by an increasingly sophisticated group of malicious codes that are engineered specifically to bypass the basic cybersecurity most internet users rely on.
Further complicating the risk to today’s net users is just how connected we are. The single home computer has given way to smart devices in our pockets, on our wrists, and even running our thermostats. Greater connectivity is a boon for convenience, but it’s also a boon for cybercriminals seeking to infiltrate networks and garner data.
Antiviruses, while they still have their place and use, are simply not enough to protect individuals and businesses from the level of threats running rife on the interwebs.
Below are some of the developments cybersecurity experts are concerned about in 2020 and a few tools you need in your cybersecurity arsenal.
Artificial Intelligence () enhanced cyber attacks
Machine learning and have triggered significant changes across all industries and to consumers. is in use in manufacturing, security, marketing, and countless other fields. Once the preserve of dystopian fiction, is now mainstream. Have an in your house? You have an -enabled device.
While it might be incredibly helpful to us, is also giving cybercriminals a helping hand. The very same capabilities used to find and prevent cyberattacks are put to clever use by hackers in the form of adaptive malicious threats.
Fuzzing is a practice of exploring a system to expose threats and vulnerabilities and is traditionally carried out by professional cybersecurity experts. fuzzing is the same process but bolstered by the capabilities of smart tools.
Hackers have now begun using AIF to commit crimes, despite the difficulties involved in creating these incredibly complex fuzzing systems. According to research by leading cybersecurity vendor Secure Computing, hackers are actively sharing their fuzzing findings with other cybercriminals in forums and chat rooms, further increasing the threat level.
Machine Learning positioning
Like AIF above, Machine Learning () positioning is another key cybersecurity tool that has been exploited by threat actors.
An database can swiftly pull up information from any malware script that has been detected in that past, so when tweaked or brand new malware is detected, the system can automatically examine and block the code because similar events have been malicious. techniques like this enabled security group Cylance to uncover a campaign by OceanLotus, a hacking group linked to Vietnam, as reported by ZDNet.[…]