{"id":20684,"date":"2024-04-16T03:19:47","date_gmt":"2024-04-16T03:19:47","guid":{"rendered":"https:\/\/interface.media\/?p=20684"},"modified":"2024-04-16T03:19:53","modified_gmt":"2024-04-16T03:19:53","slug":"3-emerging-threats-facing-cybersecurity-leaders-in-2024","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/","title":{"rendered":"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0"},"content":{"rendered":"\n<p>No matter how you look at it, 2024 promises to be, at the very least, an interesting year. <a href=\"https:\/\/interface.media\/blog\/2024\/04\/10\/can-ai-companies-stop-ai-from-interfering-in-the-2024-us-elections-part-one\/\">Major elections<\/a> in ten of the world\u2019s most popular countries have people calling it \u201cdemocracy\u2019s most important year.\u201d At the same time, war in Ukraine, genocide in Gaza, and a drought in the Panama Canal continue to disrupt global supply chains. Domestically, the UK and US have been hit by rising prices and spiralling costs of living, as corporations continue to raise prices, even as inflation subsides.\u00a0<\/p>\n\n\n\n<p>Spikes in economic hardship and sociopolitical unrest have contributed to a huge uptick in the number and severity of cybercrimes over the last few years. That trend is expected to continue into 2024, further accelerated by the adoption of new AI tools by both cybersecurity professionals and the people they are trying to stop.&nbsp;<\/p>\n\n\n\n<p>So, from AI-generated phishing scams to third-party exposure, here are 2024\u2019s biggest cybersecurity threat vectors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-social-engineering-nbsp\">1. Social engineering&nbsp;<\/h3>\n\n\n\n<p>It\u2019s not exactly clear when social engineering attacks became the biggest threat to cybersecurity operations. Maybe it\u2019s always been the case. Still, as threat detection technology, firewalls, and other digital defences get more sophisticated, the risk posed by social engineering attacks is only going to grow more outside compared with network breaches.&nbsp;<\/p>\n\n\n\n<p>More than 75% of targeted cyberattacks in 2023 started with an email, and social engineering attacks have been proven to have had devastating results.<\/p>\n\n\n\n<p>One of the world\u2019s largest casino and hotel chains, MGM Resorts, was targeted by hackers in September of last year. By using social engineering methods to impersonate an employee via LinkedIn and then calling the help desk, the hackers used a 10-minute conversation to compromise the billion-dollar company. The attack on MGM Resorts resulted in paralysed ATMs and slot machines, a crashed website, and a compromised booking system. The event is expected to take a $100 million bite out of MGM\u2019s third-quarter profits. The company is expected to spend another $10 million on recovery alone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-professional-profitable-cybercrime-nbsp\">2. Professional, profitable cybercrime&nbsp;<\/h3>\n\n\n\n<p>Cybercrime is moving out of the basement. The number of ransomware victims doubled in 2023 compared to the previous year.&nbsp;<\/p>\n\n\n\n<p>Over the course of 2024, the professionalisation of cybercrime will reach new levels of maturity. This trend is largely being driven by the proliferation of affordable ransomware-as-a-service tools. According to a <a href=\"https:\/\/sosafe-awareness.com\/resources\/reports\/cybercrime-trends\/?utm_term=cyber%20threat%20report%202024&amp;utm_campaign=UKI_EN_Non-branded_Q12023&amp;utm_source=googlesearch&amp;utm_medium=paid&amp;hsa_acc=2315609737&amp;hsa_cam=19566844529&amp;hsa_grp=145736690872&amp;hsa_ad=667088755914&amp;hsa_src=g&amp;hsa_tgt=kwd-2274010566379&amp;hsa_kw=cyber%20threat%20report%202024&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gclid=Cj0KCQiA84CvBhCaARIsAMkAvkIO_Sf_7rv2lteH3Y0qa5YtRIX127vsJxQSnyX8Z3plkGM2Ag1eMQYaAlP9EALw_wcB\">SoSafe cybercrime trends report<\/a>, these tools are driving the democratisation of cyber-criminality, as they not only lower the barrier of entry for potential cybercriminals but also represent a significant shift in the attack complexity and impact.\u201d&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-generative-ai-deepfakes-and-voice-cloning-nbsp\">3. Generative AI deepfakes and voice cloning&nbsp;<\/h3>\n\n\n\n<p>Artificial intelligence (AI) is <a href=\"https:\/\/interface.media\/blog\/2024\/04\/09\/ai-adoption-excites-and-concerns-cybersecurity-leaders\/\">a gathering storm<\/a> on the horizon for cybersecurity teams. In many areas, its effects are already being felt. Deepfakes and voice cloning are already impacting the public discourse and disrupting businesses. Recent developments that allow bad actors to generate convincing images and video from prompts are already impacting the cybersecurity sector.\u00a0<\/p>\n\n\n\n<p>Police in the US have reported an increase in voice cloning used to perpetrate financial scams. The technology was even used to fake a woman\u2019s kidnapping in April of last year. Families lose an average of $11,000 in each fake-kidnapping scam, Siobhan Johnson, an FBI spokesperson, <a href=\"https:\/\/edition.cnn.com\/2023\/04\/29\/us\/ai-scam-calls-kidnapping-cec\/index.html\">told <em>CNN<\/em><\/a>. Considering the degree to which voice identification software is used to guard financial information and bank accounts, experts at <a href=\"https:\/\/sosafe-awareness.com\/\">SoSafe<\/a> argue we should be worried. According to McAfee, one in four Americans have experienced a voice cloning attack or know someone who has.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.<\/p>\n","protected":false},"author":480,"featured_media":20685,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-04-16T03:19:51Z","apple_news_api_id":"682b866f-f8d9-40a1-965a-a3368acf4340","apple_news_api_modified_at":"2024-04-16T03:19:51Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AaCuGb_jZQKGWWqM2is9DQA","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613,614],"class_list":["post-20684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity","topic-data-ai"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0 - Interface<\/title>\n<meta name=\"description\" content=\"From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T03:19:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-16T03:19:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1305\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/\",\"name\":\"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0 - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg\",\"datePublished\":\"2024-04-16T03:19:47+00:00\",\"dateModified\":\"2024-04-16T03:19:53+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg\",\"width\":1305,\"height\":804,\"caption\":\"Thief getting out of computer monitor. Hacking, cybersecurity, internet fraud concept. Vector illustration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0 - Interface","description":"From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0","og_description":"From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.","og_url":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/","og_site_name":"Interface","article_published_time":"2024-04-16T03:19:47+00:00","article_modified_time":"2024-04-16T03:19:53+00:00","og_image":[{"width":1305,"height":804,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/","url":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/","name":"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0 - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg","datePublished":"2024-04-16T03:19:47+00:00","dateModified":"2024-04-16T03:19:53+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"From AI-generated phishing scams to ransomware-as-a-service, here are 2024\u2019s biggest cybersecurity threat vectors.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/04\/iStock-1822585388.jpg","width":1305,"height":804,"caption":"Thief getting out of computer monitor. Hacking, cybersecurity, internet fraud concept. Vector illustration."},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/04\/16\/3-emerging-threats-facing-cybersecurity-leaders-in-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"3 emerging threats facing cybersecurity leaders in 2024\u00a0\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=20684"}],"version-history":[{"count":2,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20684\/revisions"}],"predecessor-version":[{"id":20693,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20684\/revisions\/20693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/20685"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=20684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=20684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=20684"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=20684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}