ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM
DOI:
https://doi.org/10.28925/2663-4023.2023.22.5467Keywords:
threats; cyber security; endpoints; Gartner quadrant; strategic planningAbstract
Taking into account the process of complication of the geopolitical and geoeconomic landscape space, the development of information technologies and the formation of new security challenges associated with the emergence of new cyber threats, there is a need for constant monitoring and forecasting of them in order to prevent consequences in the form of damage and leakage of valuable and confidential information. The authors analyzed the new predictable cyber security threats to organizations, with special attention paid to the protection of endpoints. Threats identified in the field of artificial intelligence development (underground development of malicious Large Language Models (LLM); “Script Kiddies” update; voice fraud for social engineering, which is created by artificial intelligence); changing trends in the behavior of threat actors (attacks on supply chains against managed file transfer solutions, malware threats that are becoming multilingual); as new emerging threats and attack methods (growing QR code rivalry; stealth attacks on peripheral devices; Python implementation in Excel creating a potentially new vector for attacks; LOL drivers changing action algorithms). The resulting detection of future threats emphasizes the need for strategic planning for the adoption of new technologies and platforms: such as Endpoint Detection and Response (EDR) capabilities, as well as the use of EDR as part of a multi-instrumented enhanced detection and response (XDR) architecture. Gartner’s research has been proven to have a tremendous impact on improving organizations’ threat detection capabilities by providing valuable insight into the strengths and weaknesses of each cybersecurity service provider with respect to emerging threat intelligence, by focusing organizations’ attention on opportunities to identify gaps in their existing security infrastructure and adopt sound decisions to invest in additional solutions or services that effectively address these gaps. The spheres of activity of the world’s leading companies were analyzed, their connection with Ukrainian companies was found, and further cooperation was proposed for the effective protection of national cyberspace.
Downloads
References
Trellix 2024 Threat Predictions. (2023). https://www.trellix.com/about/newsroom/stories/research/trellix-2024-threat-predictions/
Tripathi, S. Underground Development of Malicious LLMs. https://www.trellix.com/about/newsroom/stories/ research/trellix-2024-threat-predictions/
Ajeeth, S. The Resurrection of Script Kiddies. https://www.trellix.com/about/newsroom/stories /research/trellix-2024-threat-predictions/
Pena, R. AI-generated Voice Scams for Social Engineering. https://www.trellix.com/about/newsroom/stories /research/trellix-2024-threat-predictions/
Fokker, J. Supply Chain Attacks Against Managed File Transfers Solutions. https://www.trellix.com/ about/newsroom/stories/research/trellix-2024-threat-predictions/
Provecho, E. Malware Threats are Becoming Polyglot. https://www.trellix.com/about/newsroom/stories/ research/trellix-2024-threat-predictions/
CLOP. SentinelOne. https://www.sentinelone.com/anthology/clop/
Phuc, P. The Stealthy Assault on Edge Devices. https://www.trellix.com/about/newsroom/stories/research /trellix-2024-threat-predictions/
Kersten, M. Python in Excel Creates a Potential New Vector for Attacks. https://www.trellix.com/about/newsroom/stories/research/trellix-2024-threat-predictions/
Chandra, A. LOL Drivers Are Becoming a Game Changer. https://www.trellix.com/about/newsroom/stories/ research/trellix-2024-threat-predictions/
Firstbrook, P.,& Silva, C. Magic Quadrant for Endpoint Protection Platforms. https://assets.sentinelone.com/ eval/gartner-mq-22?xs=486596
Gartner Magic Quadrant. https://webcitation.org/691VWPAM8?url=http://www.workengine.com/Company/ SitePages/Market%20Recognition.aspx
Hype Cycle for Endpoint Security. (2023). Gartner Research. https://www.gartner.com/en/ documents/4589999
The Impact of Gartner’s XDR Magic Quadrant on Cybersecurity Strategies. (2023). Ask. https://www.ask.com/news/impact-gartner-s-xdr-magic-quadrant-cybersecurity-strategies?utm_content= params%3Aad%3DdirN%26qo%3DserpIndex%26o%3D740004%26ag%3Dfw10&ueid=D7A48E0A-AB46-4B4A-858B-EA9CFA50E92E
Magic Quadrant for Endpoint Protection Platforms. (2022). Gartner. https://www.gartner.com/doc/reprints?id=1-2AJ91JO6&ct=220707&st=sb&culture=ru-ru&country=ru
Shtonda, R., Chernysh, Y., Maltseva, I., Chaika, E., & Polishchuk S. (2023). Practical approaches to cyber protection of mobile devices using the endpoint detection and response solution. Cyber security: education, science, technology, 1(21), 17–29.
Endpoint Protection Platforms. Reviuwes and Ratings. Gartner. https://www.gartner.com/reviews/market/ endpoint-protection-platforms
Gartner named Microsoft a Leader in the 2021 Endpoint Protection Platforms (EPP) Magic Quadrant. (2021). https://www.microsoft.com/en-us/security/blog/2021/05/11/gartner-names-microsoft-a-leader-in-the-2021-endpoint-protection-platforms-magic-quadrant/
Microsoft Digital Defense Report. (2021). https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi
Microsoft Digital Defense Report 2022 Executive Summary. (2022). https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE5bcRe?culture=uk-ua&country=ua
2023 Global threat report. (2023) https://iitd.com.ua/wp-content/uploads/2023/03/ crowdstrike2023globalthreatreport.pdf
Annual Report and Form 10K. (2022). https://www.annualreports.com/HostedData/AnnualReports/ PDF/NYSE_S_2022.pdf
Cybereason. (2023). https://research.contrary.com/reports/cybereason
Rethinking Tactics 2022 Annual Cybersecurity Report. (2022). https://documents.trendmicro.com/assets/rpt/rpt-rethinking-tactics-annual-cybersecurity-roundup-2022.pdf
Maturing criminal marketplaces present new challenges to defenders. Sophos 2023 Threat Report. (2023). https://assets.sophos.com/X24WTUEQ/at/b5n9ntjqmbkb8fg5rn25g4fc/sophos-2023-threat-report.pdf
The McAfee Consumer Mobile Threat Report. (2022). https://www.mcafee.com/content/dam/consumer/en-us/docs/reports/rp-mobile-threat-report-feb-2022.pdf
2022 Annual Report Reimagining the future of connectivity. (2022). https://www.cisco.com/c/dam/ en_us/about/annual-report/cisco-annual-report-2022.pdf
Annual Report & Proxy Statement. (2022). https://investors.paloaltonetworks.com/static-files/137ede42-9e7b-4eac-9a6d-197f697bd96d
The Threat Landscape in 2021. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/threat-landscape-2021
VMware IT Performance Annual Report 2022. https://www.vmware.com/content/dam/digitalmarketing /vmware/en/pdf/docs/vmware-company-it-performance-annual-report-2022.pdf
Global Threat Landscape Report. https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-report-1h-2022.pdf
Key Findings from the 2H 2022 FortiGuard Labs Threat Report. https://www.fortinet.com/blog/threat-research/fortiguard-labs-threat-report-key-findings-2h-2022
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Світлана Легомінова, Галина Гайдур
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.