ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM

Authors

DOI:

https://doi.org/10.28925/2663-4023.2023.22.5467

Keywords:

threats; cyber security; endpoints; Gartner quadrant; strategic planning

Abstract

Taking into account the process of complication of the geopolitical and geoeconomic landscape space, the development of information technologies and the formation of new security challenges associated with the emergence of new cyber threats, there is a need for constant monitoring and forecasting of them in order to prevent consequences in the form of damage and leakage of valuable and confidential information. The authors analyzed the new predictable cyber security threats to organizations, with special attention paid to the protection of endpoints. Threats identified in the field of artificial intelligence development (underground development of malicious Large Language Models (LLM); “Script Kiddies” update; voice fraud for social engineering, which is created by artificial intelligence); changing trends in the behavior of threat actors (attacks on supply chains against managed file transfer solutions, malware threats that are becoming multilingual); as new emerging threats and attack methods (growing QR code rivalry; stealth attacks on peripheral devices; Python implementation in Excel creating a potentially new vector for attacks; LOL drivers changing action algorithms). The resulting detection of future threats emphasizes the need for strategic planning for the adoption of new technologies and platforms: such as Endpoint Detection and Response (EDR) capabilities, as well as the use of EDR as part of a multi-instrumented enhanced detection and response (XDR) architecture. Gartner’s research has been proven to have a tremendous impact on improving organizations’ threat detection capabilities by providing valuable insight into the strengths and weaknesses of each cybersecurity service provider with respect to emerging threat intelligence, by focusing organizations’ attention on opportunities to identify gaps in their existing security infrastructure and adopt sound decisions to invest in additional solutions or services that effectively address these gaps. The spheres of activity of the world’s leading companies were analyzed, their connection with Ukrainian companies was found, and further cooperation was proposed for the effective protection of national cyberspace.

Downloads

Download data is not yet available.

References

Trellix 2024 Threat Predictions. (2023). https://www.trellix.com/about/newsroom/stories/research/trellix-2024-threat-predictions/

Tripathi, S. Underground Development of Malicious LLMs. https://www.trellix.com/about/newsroom/stories/ research/trellix-2024-threat-predictions/

Ajeeth, S. The Resurrection of Script Kiddies. https://www.trellix.com/about/newsroom/stories /research/trellix-2024-threat-predictions/

Pena, R. AI-generated Voice Scams for Social Engineering. https://www.trellix.com/about/newsroom/stories /research/trellix-2024-threat-predictions/

Fokker, J. Supply Chain Attacks Against Managed File Transfers Solutions. https://www.trellix.com/ about/newsroom/stories/research/trellix-2024-threat-predictions/

Provecho, E. Malware Threats are Becoming Polyglot. https://www.trellix.com/about/newsroom/stories/ research/trellix-2024-threat-predictions/

CLOP. SentinelOne. https://www.sentinelone.com/anthology/clop/

Phuc, P. The Stealthy Assault on Edge Devices. https://www.trellix.com/about/newsroom/stories/research /trellix-2024-threat-predictions/

Kersten, M. Python in Excel Creates a Potential New Vector for Attacks. https://www.trellix.com/about/newsroom/stories/research/trellix-2024-threat-predictions/

Chandra, A. LOL Drivers Are Becoming a Game Changer. https://www.trellix.com/about/newsroom/stories/ research/trellix-2024-threat-predictions/

Firstbrook, P.,& Silva, C. Magic Quadrant for Endpoint Protection Platforms. https://assets.sentinelone.com/ eval/gartner-mq-22?xs=486596

Gartner Magic Quadrant. https://webcitation.org/691VWPAM8?url=http://www.workengine.com/Company/ SitePages/Market%20Recognition.aspx

Hype Cycle for Endpoint Security. (2023). Gartner Research. https://www.gartner.com/en/ documents/4589999

The Impact of Gartner’s XDR Magic Quadrant on Cybersecurity Strategies. (2023). Ask. https://www.ask.com/news/impact-gartner-s-xdr-magic-quadrant-cybersecurity-strategies?utm_content= params%3Aad%3DdirN%26qo%3DserpIndex%26o%3D740004%26ag%3Dfw10&ueid=D7A48E0A-AB46-4B4A-858B-EA9CFA50E92E

Magic Quadrant for Endpoint Protection Platforms. (2022). Gartner. https://www.gartner.com/doc/reprints?id=1-2AJ91JO6&ct=220707&st=sb&culture=ru-ru&country=ru

Shtonda, R., Chernysh, Y., Maltseva, I., Chaika, E., & Polishchuk S. (2023). Practical approaches to cyber protection of mobile devices using the endpoint detection and response solution. Cyber security: education, science, technology, 1(21), 17–29.

Endpoint Protection Platforms. Reviuwes and Ratings. Gartner. https://www.gartner.com/reviews/market/ endpoint-protection-platforms

Gartner named Microsoft a Leader in the 2021 Endpoint Protection Platforms (EPP) Magic Quadrant. (2021). https://www.microsoft.com/en-us/security/blog/2021/05/11/gartner-names-microsoft-a-leader-in-the-2021-endpoint-protection-platforms-magic-quadrant/

Microsoft Digital Defense Report. (2021). https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi

Microsoft Digital Defense Report 2022 Executive Summary. (2022). https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE5bcRe?culture=uk-ua&country=ua

2023 Global threat report. (2023) https://iitd.com.ua/wp-content/uploads/2023/03/ crowdstrike2023globalthreatreport.pdf

Annual Report and Form 10K. (2022). https://www.annualreports.com/HostedData/AnnualReports/ PDF/NYSE_S_2022.pdf

Cybereason. (2023). https://research.contrary.com/reports/cybereason

Rethinking Tactics 2022 Annual Cybersecurity Report. (2022). https://documents.trendmicro.com/assets/rpt/rpt-rethinking-tactics-annual-cybersecurity-roundup-2022.pdf

Maturing criminal marketplaces present new challenges to defenders. Sophos 2023 Threat Report. (2023). https://assets.sophos.com/X24WTUEQ/at/b5n9ntjqmbkb8fg5rn25g4fc/sophos-2023-threat-report.pdf

The McAfee Consumer Mobile Threat Report. (2022). https://www.mcafee.com/content/dam/consumer/en-us/docs/reports/rp-mobile-threat-report-feb-2022.pdf

2022 Annual Report Reimagining the future of connectivity. (2022). https://www.cisco.com/c/dam/ en_us/about/annual-report/cisco-annual-report-2022.pdf

Annual Report & Proxy Statement. (2022). https://investors.paloaltonetworks.com/static-files/137ede42-9e7b-4eac-9a6d-197f697bd96d

The Threat Landscape in 2021. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/threat-landscape-2021

VMware IT Performance Annual Report 2022. https://www.vmware.com/content/dam/digitalmarketing /vmware/en/pdf/docs/vmware-company-it-performance-annual-report-2022.pdf

Global Threat Landscape Report. https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-report-1h-2022.pdf

Key Findings from the 2H 2022 FortiGuard Labs Threat Report. https://www.fortinet.com/blog/threat-research/fortiguard-labs-threat-report-key-findings-2h-2022

Downloads


Abstract views: 737

Published

2023-12-28

How to Cite

Lehominova, S., & Haidur, H. (2023). ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(22), 54–67. https://doi.org/10.28925/2663-4023.2023.22.5467

Most read articles by the same author(s)