McAfee Labs 2020 threat prediction


PUNE: Cybersecurity McAfee released threat forecasts for 2020 onwards, examining the changing trends in cybercrime, technology and legislation. Cybercriminals are increasing the complexity and volume of their attacks and campaigns, looking for ways to stay one step ahead of cyber practices – and using evolving technology.

"Continuous advances in artificial intelligence and machine learning have led to priceless technological benefits, but threat players are also learning to exploit AI and ML in increasingly threatening ways," said Raj Samani, lead scientist and McAfee. "AI technology has expanded the capabilities of persuasive video production to a less specialized threat group that tries to manipulate individual and public opinion. AI-driven face recognition, a growing security asset, is also used to generate mass media. capable of deceiving people and machines. "

Researchers are also expecting attacks on corporate networks to steal information in two-stage ransom campaigns, he added.

With more businesses turning to cloud services, the need for cloud security is greater than ever. The increasing adoption of robotic process automation and the growing importance of security for system accounts used for automation raise security concerns related to the API (Application Programming Interface) and the wealth of their personal data.

Basic forecasts:

1. Broader depth photography capabilities for less specialized threat agents: The freely available public comment videos can be used to develop a machine learning model that can develop deep zenith videos that depict one person's words coming from another's mouth. Attackers can now create automated, targeted content to increase the likelihood of a person or groups falling for a campaign. In this way, AI and machine learning can be combined to create enormous chaos.

2. Opponents to create deep beaches to bypass face recognition: As technologies are adopted in the coming years, a very viable threat carrier will emerge, and we anticipate that opponents will begin to create deep phrases to bypass face recognition. It will be vital for businesses to understand the security risks posed by face recognition and other biometric systems and invest in risk education as well as hardening critical systems.

3. Ransomware attacks to turn into two-step extortion campaigns: For 2020, we predict that targeted penetration of corporate networks will continue to increase and eventually eliminate two-step extortion attacks. In the first stage, cybercriminals will hand over an illegal ransomware attack, forcing victims to return their files. In the second phase, criminals will again seek to recover ransomware victims with a blackmail attack, but this time they will threaten to reveal sensitive data stolen before the ransomware attack.

4. Application Programming Interfaces (APIs) will be exposed as the weakest link leading to dangerous cloud solutions: Vulnerabilities will continue to include authorization and authentication features, excessive data exposure, and a lack of focus on restriction and attack attacks. resources. Safe consumption-based APIs with no strict percentage limits are among the most vulnerable.

5. DevSecOps will become prominent as container loads shift left security controls: Container-based cloud applications are growing in popularity due to the ease with which DevOps teams can deploy continuously resonant and interactive reusable components as applications. As a result, the number of organizations prioritizing container technologies will continue to grow in 2020.