Hashtag
Men's Weekly

Simplifying Waste Disposal with Rubbish Removals Melbourne

Managing waste is one of the everyday challenges that homeowners, tenants, and businesses face. In a city as busy and dynamic as...

Breastfeeding After a C-Section: How to Get Started Comfortably

It is quite common that a mom, after a C-section, as she recovers, finds breastfeeding quite challenging. It is a fact that many...

Botox Treatment to Shrink Large Pores

Visible pores are a common frustration. Even with a dedicated cleansing and exfoliating routine or the latest serums, pores can ...

Why Does My Baby Pull Away and Cry While Breastfeeding?

Feeding from the breast is a warm and close time between a mom and her baby. But it can be hard too. Many parents feel sad when th...

How to Choose the Right Earplugs for Sleeping: A Comprehensive Guide

Getting a restful night's sleep is essential for overall health and well-being. For many, external noises—be it a snoring partner...

The Role of an Asbestos Removalist in Melbourne

Hiring an asbestos removalist Melbourne is not just a matter of convenience—it's a legal and health necessity. Asbestos is a haz...



To read Trend Micro's 2024 cybersecurity predictions, please visit: https://www.trendmicro.com/vinfo/hk/security/research-and-analysis/predictions/critical-scalability-trend-micro-security-predictions-for-2024

Eric Skinner, VP of market strategy at Trend: "Advanced large language models (LLMs), proficient in any language, pose a significant threat as they eliminate the traditional indicators of phishing such as odd formatting or grammatical errors, making them exceedingly difficult to detect. Businesses must transition beyond conventional phishing training and prioritize the adoption of modern security controls. These advanced defenses not only exceed human capabilities in detection but also ensure resilience against these tactics."

The widespread availability and improved quality of generative AI, coupled with the use of Generative Adversarial Networks (GANs), are expected to disrupt the phishing market in 2024. This transformation will enable cost-effective creation of hyper-realistic audio and video content—driving a new wave of business email compromise (BEC), virtual kidnapping, and other scams, Trend predicts.

Given the potentially lucrative gains* that threat actors might achieve through malicious activities, threat actors will be incentivized to develop nefarious GenAI tools for these campaigns or to use legitimate ones with stolen credentials and VPNs to hide their identities.

AI models themselves may also come under attack in 2024. While GenAI and LLM datasets are difficult for threat actors to influence, specialized cloud-based machine learning models are a far more attractive target. The more focused datasets they are trained on will be singled out for data poisoning attacks with various outcomes in mind—from exfiltrating sensitive data to disrupting fraud filters and even connected vehicles. Such attacks already cost less than $100 to carry out.

These trends may, in turn, lead to increased regulatory scrutiny and a push from the cybersecurity sector to take matters into its own hands.

"In the coming year, the cyber industry will begin to outpace the government when it comes to developing cybersecurity-specific AI policy or regulations," said Greg Young, VP of cybersecurity at Trend. "The industry is moving quickly to self-regulate on an opt-in basis."

Elsewhere, Trend's 2024 predictions report highlighted:

A surge in cloud-native worm attacks, targeting vulnerabilities and misconfigurations and using a high degree of automation to impact multiple containers, accounts and services with minimal effort.

Cloud security will be crucial for organizations to address security gaps in cloud environments, highlighting the vulnerability of cloud-native applications to automated attacks. Proactive measures, including robust defense mechanisms and thorough security audits, are essential to mitigate risks.

More supply chain attacks will target not only upstream open-source software components but also inventory identity management tools, such as telco SIMs, which are crucial for fleet and inventory systems. Cybercriminals will also likely exploit vendors' software supply chains through CI/CD systems, with a specific focus on third-party components.

Attacks on private blockchains will increase as a result of vulnerabilities in the implementation of a number of private blockchains. Threat actors could use these rights to modify, override, or erase entries and then demand a ransom. Alternatively, they could try to encrypt the entire blockchain if it's possible to seize control of enough nodes.

*BEC cost victims over $2.7bn in 2022, according to the FBI.




Hashtag: #trendmicro #2024predictions #cybersecurity #cloudsecurity #cyberattack





The issuer is solely responsible for the content of this announcement.

About Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

IN THE NEWS

Global Tourism Elites Eye New Opportunities in Hainan, China

SANYA, CHINA - Media OutReach Newswire - 10 June 2025 - On June 8, the Overseas Tour Operators Hainan To.

The elexcon2024 Shenzhen International Electronics Show Is Set to Grandly Open, Showing Full-stack T…

SHENZHEN, CHINA - Media OutReach Newswire - 24 August 2024 - The elexcon2024 Shenzhen International Elec.

JustMarkets Launched a Lunar Contest with Fantastic Prizes

JAKARTA, INDONESIA - Media OutReach Newswire - 27 January 2025 - As the festive season of Lunar New Year.

Ascott activates Citadines brand experience via inaugural global partnership with ClassPass to provi…

Guests can also look forward to refreshing ways to enjoy their favourite cuppa under Citadines brand sign.

7 Startups Selected for "Real Madrid Next Accelerator for Asia" by Creww and RMNext

TOKYO, JAPAN - Media OutReach Newswire - 8 August 2024 - Creww Inc. (Japan Office: Shibuya-ku, Tokyo, Re.

EFT Solutions entered in a MOU with Mongolbank, First Hong Kong ePayment technical partner to accele…

Promoting cross-boundary interconnectivity of e-payments HONG KONG SAR - Media OutReach Newswire - 24 Ju.

Health & Wellness

How to Choose the Right Earplugs for Sleeping: A Comprehensive Guide

Hashtag.net.au - avatar Hashtag.net.au

Getting a restful night's sleep is essential for overall health and well-being. For many, external noises—be it a snoring partner, traffic, or noisy neighbors—can disrupt sleep patterns. One effective...

How Teen Depression Differs from Normal Adolescent Mood Swings

Hashtag.net.au - avatar Hashtag.net.au

Adolescence is often described as a turbulent period of life. Hormonal changes, social pressures, academic stress, and the search for identity all combine to make the teenage years emotionally inten...

Why Regular Visits to a Trusted Dentist Matter More Than You Think

Hashtag.net.au - avatar Hashtag.net.au

Seeing a dentist is often associated with pain or emergency situations. However, routine dental visits play a much larger role in maintaining not only oral health but your overall wellbeing. Whether...