الرئيس التنفيذي
أشرف الحادي

رئيس التحرير
فاطمة مهران

Google Cloud unveils key insights for cybersecurity planning in 2024

Google Cloud has released its annual Cybersecurity Forecast report for 2024, compiling forward-looking thoughts from security leaders and experts from different teams across Mandiant, Google Cloud and VirusTotal, who are on the frontlines of the latest and largest attacks. Aiming to empower the cybersecurity industry, this comprehensive report provides essential insights and strategies to frame the fight against cyber adversaries in the year ahead.

While new technologies will aid security teams, they can also expand the attack surface. In 2024, the rapidly evolving world of generative AI will provide attackers with new ways to conduct convincing phishing campaigns and information operations at scale. However, defenders will use the same technologies to strengthen detection, response, and attribution of adversaries – and more broadly reduce toil, address threat overload, and close the widening skills gap.

Renze Jongman, Strategic Threat Intelligence Specialist, MEA at Google Cloud says: “While the rapid development of new technologies like AI will allow attackers to speed up and scale their criminal operations, it also offers unique ways for defenders to combat the threat. The ability to scale cybersecurity talent is particularly exciting to me: the GCC region has a growing number of young and talented cybersecurity graduates, keen to contribute to defending their countries and organizations against cyber attacks. They can now start to have an exponential impact and rapidly grow and expand their skill set by leveraging AI in their investigations and operations.”

The cybersecurity landscape is constantly evolving, sometimes in new and unexpected ways. Defenders, often with limited resources, have the monumental task of keeping up. Here are some of the key takeaways from the Google Cloud Cybersecurity Forecast 2024 to help prepare for the year ahead:

  • AI for attack and defense: AI is set to revolutionize cybersecurity for both attackers and defenders. Attackers are expected to leverage generative AI and large language models to create more sophisticated phishing and social engineering tactics, as well as to add scale to information operations. Defenders will utilize AI to enhance threat detection, response and attribution capabilities, as well as speed up analysis and other time-consuming tasks like reverse engineering.
  • Continued use of zero-day exploits: An increased reliance on zero-day vulnerabilities by attackers is anticipated by both nation-state and cybercriminal groups, aiming to evade detection and maintain prolonged access to compromised systems. Edge devices and virtualization software are particularly attractive to threat actors because they are challenging to monitor. Cybercriminals know using a zero-day vulnerability will increase the number of victims and, based on recent mass extortion events, the number of organizations that may pay high ransomware or extortion demands.
  • Growing prevalence of mobile cybercrime: Expect an increase in mobile cybercrime, with scammers using advanced and novel social engineering tactics like fake domestic help services, counterfeit social media, bank, or government communications, and deceptive pop-up alerts to trick victims into installing malicious apps on their mobile devices. Jongman adds: “This type of social engineering has grown rapidly across the Middle East in recent years, and while governments and organizations are already taking measures to protect their customers, this threat is likely to grow both in volume and sophistication across the region.”
  • Maturing of attacks targeting hybrid and multicloud environments: With organizations around the world moving to the cloud, threat actors will look to exploit misconfigurations and identity issues to move laterally across different cloud environments.
  • Escalating espionage and “sleeper botnet” tactics: Espionage activities will evolve and find more ways to scale, including the use of “sleeper botnets” created from vulnerable IoT, and small/home office or end-of-life devices. These botnets can be used and discarded as needed, complicating attribution efforts.
  • Resurgence of older attack techniques: There is an expected revival in using older, less common cyberattack techniques which aren’t widely understood. These methods, often overlooked in modern detection systems, could provide attackers with a stealthy means to breach defenses.

Related Posts:

Second Round of the President’s Cup for Jiu-Jitsu Kicks Off Friday in Abu Dhabi

Beyond ONE Marks New Era: Riyadh Office Opens, Redefining Workspaces in KSA

Duaya acquires EXMGO in six-figure investment deal to advance pharmacy digitization

BRITTEN-NORMAN REACHES MAJOR MILESTONE IN UK-BUILT ISLANDER PRODUCTION

Elite Group Holding, the exclusive partner of Jetour in the UAE, Unveils the G700 at an exclusive Media Night

“Top 50 Women Forum Kicks Off 4th Egyptian Women’s Summit”

Hong Kong is Named the “Most Promising Muslim-Friendly Destination of the Year”

MANSA selected for Hub71’s latest cohort, accelerating stablecoin-powered cross-border payments from Abu Dhabi

آخر الأخبار
"نيميتشك" تكشف عن أحدث ابتكاراتها الرقمية في معرض البنية التحتية العالمي والمدن الذكية السعودي 2025 بروتوكول تعاون بين "الاعتماد والرقابة الصحية" و"البنك الأهلي المصري" لدعم المنشآت الطبية الخاصة رئيس هيئة الرقابة المالية يلتقي المطورين العقاريين ويستعرض آليات التمويل غير المصرفي ودورها في دعم ا... ‘Galaxy AI’ تمنحك التحكم الكامل في بياناتك... خصوصيتك بأمان أكبر كبار تجار التجزئة والموزعين والمشترين العالميين يعززون الزخم في معرضي "ISM الشرق الأوسط" وزير الخارجية يستقبل نائب رئيس الوزراء الروسي المصرية للاتصالات تكرم أبطال الأوليمبياد الخاص المصري المشاركين في المسابقة الإقليمية الأولى للفروسي... وزير الزراعة يشهد توقيع بروتوكول تعاون بين "البحوث الزراعية" و "التصديري للحاصلات الزراعية" الهيئة العامة للاستثمار والمناطق الحرة تشارك في النسخة الثالثة من مؤتمر “The Investor..Real Estate” وزيرا قطاع الأعمال والبترول يشهدان توقيع عقد بين "إيجوث" و"بتروجت" لإعادة تأهيل وتشغيل فندق "جيت بيت... أحمد منصور: المستثمر المحلي خير واجهة استثمارية لمصر.. وتأخير قانون اتحاد المطورين "يثير الاستغراب" مطورون يقترحون آليات جديدة لتنشيط السوق العقاري عبر التمويل والتصدير الإسكان: بناء 3.3 مليون وحدة سكنية في 10 سنوات.. وحزمة حوافز للبناء الأخضر شعبة الذهب: الأونصة تسجل 3,700 دولار للمرة الأولى تاريخيًا وعيار 21 في أعلى مستوى منذ أبريل إحالة بدرية طلبة إلى المحكمة الاقتصادية بتهمة الإساءة للشعب المصرى Second Round of the President’s Cup for Jiu-Jitsu Kicks Off Friday in Abu Dhabi بالصور.. مؤتمر The Investor يكرم وزيرَي المالية والإسكان ورئيس هيئة الاستثمار وأمين عام المؤتمر قرار جمهورى بتعيين علاء حسن الشريف أمينًا عامًا لمجلس الوزراء "ليلي" تطلق منصة TuneLab تتيح لشركات التكنولوجيا الحيوية الوصول إلى نماذج ذكية لاكتشاف وتطوير الأدوي... المحامي أحمد النجار يشارك في النسخة الخامسة من جوائز مصر لريادة الأعمال كشريك للنظام البيئي